diff --git a/i18n/ar/CODE_OF_CONDUCT.md b/i18n/ar/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/ar/CODE_OF_CONDUCT.md +++ b/i18n/ar/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/ar/about/index.md b/i18n/ar/about/index.md index 9c3a0d47..618957d5 100644 --- a/i18n/ar/about/index.md +++ b/i18n/ar/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/ar/about/notices.md b/i18n/ar/about/notices.md index d948a76a..0ef0e6f8 100644 --- a/i18n/ar/about/notices.md +++ b/i18n/ar/about/notices.md @@ -29,7 +29,7 @@ This does not include third-party code embedded in this repository, or code wher This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* +We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ You must not conduct any systematic or automated data collection activities on o --- -*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/ar/about/privacytools.md b/i18n/ar/about/privacytools.md index 512ebb93..0c889f62 100644 --- a/i18n/ar/about/privacytools.md +++ b/i18n/ar/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/ar/advanced/communication-network-types.md b/i18n/ar/advanced/communication-network-types.md index 20bbe9ff..b4dd5552 100644 --- a/i18n/ar/advanced/communication-network-types.md +++ b/i18n/ar/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/ar/advanced/dns-overview.md b/i18n/ar/advanced/dns-overview.md index 21889d85..2ffb67b2 100644 --- a/i18n/ar/advanced/dns-overview.md +++ b/i18n/ar/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/ar/advanced/payments.md b/i18n/ar/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/ar/advanced/payments.md +++ b/i18n/ar/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/ar/advanced/tor-overview.md b/i18n/ar/advanced/tor-overview.md index 8a6ab1ce..cc7a2fad 100644 --- a/i18n/ar/advanced/tor-overview.md +++ b/i18n/ar/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/ar/android.md b/i18n/ar/android.md index 6a650455..2f79dd91 100644 --- a/i18n/ar/android.md +++ b/i18n/ar/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,7 +113,7 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/ar/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/ar/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/ar/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/ar/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/ar/assets/img/how-tor-works/tor-encryption.svg b/i18n/ar/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/ar/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/ar/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/ar/assets/img/how-tor-works/tor-path-dark.svg b/i18n/ar/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/ar/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/ar/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/ar/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/ar/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/ar/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/ar/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/ar/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/ar/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/ar/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/ar/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/ar/assets/img/how-tor-works/tor-path.svg b/i18n/ar/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/ar/assets/img/how-tor-works/tor-path.svg +++ b/i18n/ar/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/ar/basics/account-deletion.md b/i18n/ar/basics/account-deletion.md index cd89ea6f..857a57d8 100644 --- a/i18n/ar/basics/account-deletion.md +++ b/i18n/ar/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/ar/basics/common-misconceptions.md b/i18n/ar/basics/common-misconceptions.md index 74650997..5aeaae95 100644 --- a/i18n/ar/basics/common-misconceptions.md +++ b/i18n/ar/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/ar/basics/common-threats.md b/i18n/ar/basics/common-threats.md index a8102469..67bd483b 100644 --- a/i18n/ar/basics/common-threats.md +++ b/i18n/ar/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacy From Service Providers @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/ar/basics/email-security.md b/i18n/ar/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/ar/basics/email-security.md +++ b/i18n/ar/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/ar/basics/multi-factor-authentication.md b/i18n/ar/basics/multi-factor-authentication.md index 75cb7e9b..92a563d7 100644 --- a/i18n/ar/basics/multi-factor-authentication.md +++ b/i18n/ar/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/ar/basics/passwords-overview.md b/i18n/ar/basics/passwords-overview.md index 63b87498..5a828342 100644 --- a/i18n/ar/basics/passwords-overview.md +++ b/i18n/ar/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/ar/basics/vpn-overview.md b/i18n/ar/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/ar/basics/vpn-overview.md +++ b/i18n/ar/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/ar/basics/why-privacy-matters.md b/i18n/ar/basics/why-privacy-matters.md index ea3729a2..3613f00b 100644 --- a/i18n/ar/basics/why-privacy-matters.md +++ b/i18n/ar/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/ar/calendar.md b/i18n/ar/calendar.md index fd26697b..8390538c 100644 --- a/i18n/ar/calendar.md +++ b/i18n/ar/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/ar/cloud.md b/i18n/ar/cloud.md index 34b98b3d..166e2dd6 100644 --- a/i18n/ar/cloud.md +++ b/i18n/ar/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/ar/cryptocurrency.md b/i18n/ar/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/ar/cryptocurrency.md +++ b/i18n/ar/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/ar/data-redaction.md b/i18n/ar/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/ar/data-redaction.md +++ b/i18n/ar/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/ar/desktop-browsers.md b/i18n/ar/desktop-browsers.md index e461f1d6..ae9e915e 100644 --- a/i18n/ar/desktop-browsers.md +++ b/i18n/ar/desktop-browsers.md @@ -70,8 +70,8 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ We are working on establishing defined criteria for every section of our site, a - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -462,4 +462,4 @@ Our best-case criteria represents what we would like to see from the perfect pro - Must directly impact user privacy, i.e. must not simply provide information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/ar/desktop.md b/i18n/ar/desktop.md index 5252084a..1fac706b 100644 --- a/i18n/ar/desktop.md +++ b/i18n/ar/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/ar/device-integrity.md b/i18n/ar/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/ar/device-integrity.md +++ b/i18n/ar/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/ar/dns.md b/i18n/ar/dns.md index 10234d32..ce9a4525 100644 --- a/i18n/ar/dns.md +++ b/i18n/ar/dns.md @@ -11,14 +11,14 @@ cover: dns.webp ## موفِّرو الخدمة الموصى بهم -| الموفِّر | سياسة الخصوصية | الموافيق | تسجيل الأنشطة | ECS | التصفية | -| ------------------------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | -------------------------------------------------------------------------- | ------- | ----------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**آدجارد**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | بعض منه ١ | Yes | Based on personal configuration. لك العثور على قائمة التصفيات المستخدمة هنا. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**كلاودفلير**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | بعض منه ٢ | لا يوجد | Based on personal configuration. | -| [**كنترول دي**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | اختياري٣ | لا يوجد | Based on personal configuration. | -| [**ملفاد**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | لا يوجد٤ | لا يوجد | Based on personal configuration. لك العثور على قائمة التصفيات المستخدمة هنا. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**نكست‌دي‌إن‌إس**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | اختياري٥ | اختياري | Based on personal configuration. | -| [**كواد٩**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | بعض منه٦ | اختياري | Based on personal configuration, Malware blocking by default. | +| الموفِّر | سياسة الخصوصية | الموافيق | تسجيل الأنشطة | ECS | التصفية | +| ------------------------------------------------------------------------ | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | -------------------------------------------------------------------------- | ------- | ----------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**آدجارد**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | بعض منه ١ | Yes | Based on personal configuration. لك العثور على قائمة التصفيات المستخدمة هنا. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**كلاودفلير**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | بعض منه ٢ | لا يوجد | Based on personal configuration. | +| [**كنترول دي**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | اختياري٣ | لا يوجد | Based on personal configuration. | +| [**ملفاد**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | لا يوجد٤ | لا يوجد | Based on personal configuration. لك العثور على قائمة التصفيات المستخدمة هنا. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**نكست‌دي‌إن‌إس**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | اختياري٥ | اختياري | Based on personal configuration. | +| [**كواد٩**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | بعض منه٦ | اختياري | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ cover: dns.webp #### ملفَّات التعريف الموقَّعة -لا تتيح أبل واجهةً أصيلةً لإنشاء ملفَّات تعريف معمَّاة. [مُنشئ ملفَّات تعريف نظام تسمية النطاقات الآمن](https://dns.notjakob.com/tool.html) هو أداة غير رسمية تتيح لك إنشاء ملفَّات تعريف نظام تسمية النطاقات معمَّاة، ولكن ضع في حسبانك أنها لن توقَّع. تفضَّل ملفَّات التعريف الموقَّعة على غيرها، وذلك ﻷن التوقيع يؤكِّد أصلها وصحَّتها. تعلَّم ملفَّات التعريف الموقَّعة بعلامة «مؤكَّد» خضراء. لتستزيد علمًا عن توقيع الرموز عليك مطالعة [عن توقيع الرموز](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). توفِّر [آدجارد](https://adguard.com/en/blog/encrypted-dns-ios-14.html) و [نكست‌دي‌إن‌إس](https://apple.nextdns.io) و [كواد٩](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/) **ملفَّات تعريف موقَّعةً**. +لا تتيح أبل واجهةً أصيلةً لإنشاء ملفَّات تعريف معمَّاة. [مُنشئ ملفَّات تعريف نظام تسمية النطاقات الآمن](https://dns.notjakob.com/tool.html) هو أداة غير رسمية تتيح لك إنشاء ملفَّات تعريف نظام تسمية النطاقات معمَّاة، ولكن ضع في حسبانك أنها لن توقَّع. تفضَّل ملفَّات التعريف الموقَّعة على غيرها، وذلك ﻷن التوقيع يؤكِّد أصلها وصحَّتها. تعلَّم ملفَّات التعريف الموقَّعة بعلامة «مؤكَّد» خضراء. لتستزيد علمًا عن توقيع الرموز عليك مطالعة [عن توقيع الرموز](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ cover: dns.webp [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -123,9 +123,9 @@ cover: dns.webp
-![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=left } +![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**آدجارد هوم** هو نظام [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) مفتوح المصدر يستخدم [تصفية أنظمة تسمية النطاقات](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) ليحظر محتويات الوِب غير المرغوب بها، كالإعلانات. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. لدى آدجارد هوم واجهة وِب متقنة الصنع ترى فيها المعلومات وتدير ما حُظر. @@ -142,25 +142,25 @@ cover: dns.webp
-![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=left } +![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**باي-هول** هو نظام[DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) مفتوح المصدر يستخدم [تصفية أنظمة تسمية النطاقات](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) ليحظر محتويات الوِب غير المرغوب بها، كالإعلانات. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. صُمِّم باي-هول ليستضاف في جهاز راسبيري باي، ولكنَّه ليس محدودًا به. لهذه البرمجية واجهة وِب سهلة الاستخدام ترى فيها المعلومات وتدير ما حُظر. -[:octicons-home-16: الصفحة الرئيسة](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="سياسة الخصوصية" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=التوثيق} -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="رمز المصدر" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=ساهم } +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
[^1]: تخزِّن آدجارد قياسات الأداء المجمَّعة من خوادم أنظمة تسمية نطاقاتهم، وتتضمَّن عدد الطلبات المكتملة لكلِّ خادم، وعدد الطلبات المحظورة، وسرعة معالجة الطلبات. وتخزِّن أيضًا قاعدة بيانات بها النطاقات المطلوبة خلال آخر ٢٤ ساعة. «نحتاج هذه المعلومات لنتحرَّى ونحظر المتتبِّعات والمخاطر الجديدة.» «وكذلك نسجِّل عدد المرات التي تُحظر فيها المتتبِّعات. نحتاج هذه المعلومات لنزيل القواعد القديمة من تصفياتنا.» [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: تجمِّع وتخزِّن كلاودفلير عددًا قليلًا من استعلامات أنظمة تسمية النطاقات المرسلة للمحلِّل ١٫١٫١٫١. لا تسجِّل خدمة المحلِّل ١٫١٫١٫١ بيانات شخصيةً، وغالب ما تسِّجل من بيانات لا تعرِّف الأشخاص تخزَّن مدَّة ٢٥ ساعةً لا أكثر. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: تجمِّع وتخزِّن كلاودفلير عددًا قليلًا من استعلامات أنظمة تسمية النطاقات المرسلة للمحلِّل ١٫١٫١٫١. لا تسجِّل خدمة المحلِّل ١٫١٫١٫١ بيانات شخصيةً، وغالب ما تسِّجل من بيانات لا تعرِّف الأشخاص تخزَّن مدَّة ٢٥ ساعةً لا أكثر. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: تسجِّل كنترول دي البيانات من المحلِّلات المدفوعة التي لها ملفَّات تعريف مخصَّصة فقط. المحلِّلات المجَّانية لا تسجِّل بيانات. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: خدمة أنظمة تسمية النطاقات من ملفاد متاحة للمشتركين في خدمة الشبكة الخاصة الافتراضية ولغير المشتركين كذلك. تزعم سياسة خصوصيتهم صريحًا أنهم لا يسجِّلون طلبات أنظمة تسمية النطاقات أبدًا. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: خدمة أنظمة تسمية النطاقات من ملفاد متاحة للمشتركين في خدمة الشبكة الخاصة الافتراضية ولغير المشتركين كذلك. تزعم سياسة خصوصيتهم صريحًا أنهم لا يسجِّلون طلبات أنظمة تسمية النطاقات أبدًا. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. لك اختيار مدَّة الاحتفاظ ومواضع تخزين التسجيل لأيِّ سجِّلات أردت. إن لم يُطلب تسجيل بيانات فلن تسجَّل. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: تجمع كواد٩ بعض البيانات لمراقبة المخاطر والاستجابات. ويمكن لتلك البيانات أن تُخلط وتُشارك، وغرض ذلك قد يكون لأبحاث الأمن. لا تجمع كواد٩ ولا تسجِّل عناوين IP أو أيَّ بيانات تصنِّفها معرِّفةً شخصيًّا. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: تجمع كواد٩ بعض البيانات لمراقبة المخاطر والاستجابات. ويمكن لتلك البيانات أن تُخلط وتُشارك، وغرض ذلك قد يكون لأبحاث الأمن. لا تجمع كواد٩ ولا تسجِّل عناوين IP أو أيَّ بيانات تصنِّفها معرِّفةً شخصيًّا. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/ar/email-clients.md b/i18n/ar/email-clients.md index 7434f6bb..c7051cdb 100644 --- a/i18n/ar/email-clients.md +++ b/i18n/ar/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/ar/email.md b/i18n/ar/email.md index c5712933..eacfaa21 100644 --- a/i18n/ar/email.md +++ b/i18n/ar/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the #### :material-check:{ .pg-green } النطاقات المخصَّصة والكنى -بإمكان مشتركي بريد بروتون استخدام أسماء نطاق من عندهم أو لهم استخدام عنوان [جامع](https://proton.me/support/catch-all). وكذلك يدعم بريد بروتون [العنونة الفرعية](https://proton.me/support/creating-aliases)، وهي مفيدة لمن لا يريد شراء نطاق. +بإمكان مشتركي بريد بروتون استخدام أسماء نطاق من عندهم أو لهم استخدام عنوان [جامع](https://proton.me/support/catch-all). Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } سُبُل الدفع الخاصَّة @@ -129,7 +129,7 @@ Proton Mail also publishes the public keys of Proton accounts via HTTP from thei #### :material-check:{ .pg-green } النطاقات المخصَّصة والكنى -تتيح لك Mailbox.org استخدام اسم نطاق من عندك، وكذلك تدعم العناوين [الجامعة](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain). وزد على ذلك أنهم يدعمون [العنونة الفرعية](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it)، وهي مفيدة لمن لا يريد شراء نطاق. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } سُبُل الدفع الخاصَّة @@ -137,17 +137,17 @@ Proton Mail also publishes the public keys of Proton accounts via HTTP from thei #### :material-check:{ .pg-green } أمن الحساب -تدعم Mailbox.org [الاستيثاق بخطوتين](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) في موقعهم فقط. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). بعض معايير الوِب مثل [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) ليست مدعومةً بعد. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). بعض معايير الوِب مثل [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) ليست مدعومةً بعد. #### :material-information-outline:{ .pg-blue } أمن البيانات -تتيح Mailbox.org تعمية الرسائل الواردة باستخدام [صندوق البريد المعمَّى](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). تعمَّى الرسائل الواردة باستخدام مفتاحك العامِّ فورًا. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). تعمَّى الرسائل الواردة باستخدام مفتاحك العامِّ فورًا. -ولكن [أوبن-إكستشينج](https://en.wikipedia.org/wiki/Open-Xchange)، وهي منصَّة البرمجيات التي تستخدمها Mailbox.org، [ لا تدعم](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) تعمية دفتر عناوينك وتقويمك. لعلَّ [خيارًا مستقلًّا](calendar.md) أفضل لهذه المعلومات. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. لعلَّ [خيارًا مستقلًّا](calendar.md) أفضل لهذه المعلومات. #### :material-check:{ .pg-green } تعمية البريد الإلكتروني -لدى Mailbox.org [تعمية مدمجة](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) في موقعهم، وهذا ييسِّر إرسال الرسائل باستخدام مفاتيح أوبن‌بي‌جي‌بي العامَّة. وكذلك يتيحون [لمستقبلي الرسائل من خارج خوادمهم كشف تعمية رسالة](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) في خوادم Mailbox.org. فائدة هذا تظهر في حال كان المستقبل ليس لديه أوبن‌بي‌جي‌بي ولا يستطيع كشف تعمية نسخة من الرسالة في صندوق بريده. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. فائدة هذا تظهر في حال كان المستقبل ليس لديه أوبن‌بي‌جي‌بي ولا يستطيع كشف تعمية نسخة من الرسالة في صندوق بريده. تدعم Mailbox.org اكتشاف المفتايح العامَّة باستخدام HTTP من [دليل مفاتيح الوِب (WKD)](https://wiki.gnupg.org/WKD) التابع لهم. ويتيح هذا لمن ليس عنده Mailbox.org العثور على مفاتيح أوبن‌بي‌جي‌بي لحسابات Mailbox.org بسهولة، وذلك لتمكين التعمية بين الأطراف بين موفِّري خدمة البريد الإلكترونيِّ. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Proton Mail also publishes the public keys of Proton accounts via HTTP from thei #### :material-information-outline:{ .pg-blue } وظائف إضافية -بإمكانك الوصول لحسابك في Mailbox.org باستخدام IMAP/SMTP عبر [خدمة .onion](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). ولكن لا يمكن الوصول لواجهة موقعهم باستخدام خدمة .onion، وقد تواجه أخطاء شهادة TLS. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). ولكن لا يمكن الوصول لواجهة موقعهم باستخدام خدمة .onion، وقد تواجه أخطاء شهادة TLS. -عند كلِّ الحسابات مساحة تخزين قليلة، [وتمكن تعميتها](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). وتوفِّر Mailbox.org الكنية [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely)، وهو تفرض تعمية TLS على الاتصال بين خوادم البريد، وإن لم يعمَّ فلن ترسل الرسائل. تدعم Mailbox.org [إكستشينج-أكتف‌سنك](https://en.wikipedia.org/wiki/Exchange_ActiveSync)، وكذلك تدعم معايير الوصول القياسية مثل IMAP و POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. تدعم Mailbox.org [إكستشينج-أكتف‌سنك](https://en.wikipedia.org/wiki/Exchange_ActiveSync)، وكذلك تدعم معايير الوصول القياسية مثل IMAP و POP3. عند Mailbox.org ميزة الإرث الرقميِّ لكلِّ الاشتراكات. فبوسعك اختيار ما إن أردت أن تورِّث أيَّ بيانات لك، وذلك إن سجَّل ذلك ورثاؤك وشهدت بذلك. غير ذلك فيمكنك ترشيح شخص باسمه وعنوانه. @@ -185,18 +185,18 @@ Proton Mail also publishes the public keys of Proton accounts via HTTP from thei [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } النطاقات المخصَّصة والكنى -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } سُبُل الدفع الخاصَّة @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). وهي تضمن أن اتصال العميل بعمل معمًّى بين الأطراف. يكلِّف هذا ٢٤٠ يورو لكلِّ سنة. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). وهي تضمن أن اتصال العميل بعمل معمًّى بين الأطراف. يكلِّف هذا ٢٤٠ يورو لكلِّ سنة. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criteria @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/ar/encryption.md b/i18n/ar/encryption.md index d774167a..aa3ee158 100644 --- a/i18n/ar/encryption.md +++ b/i18n/ar/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/ar/file-sharing.md b/i18n/ar/file-sharing.md index d7cd5832..f6732765 100644 --- a/i18n/ar/file-sharing.md +++ b/i18n/ar/file-sharing.md @@ -15,7 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/ar/financial-services.md b/i18n/ar/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/ar/financial-services.md +++ b/i18n/ar/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/ar/frontends.md b/i18n/ar/frontends.md index 01d5ea76..1769b24a 100644 --- a/i18n/ar/frontends.md +++ b/i18n/ar/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/ar/index.md b/i18n/ar/index.md index 09d764d9..b3d9db8a 100644 --- a/i18n/ar/index.md +++ b/i18n/ar/index.md @@ -62,12 +62,12 @@ schema: ## نحتاجُك! إليك كيفية المشاركة: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="انضم إلى منتدانا" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="تابعنا على ماستودون" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="ساهم في هذا الموقع" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="ساعد في ترجمة هذا الموقع" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="تحدث معنا على ماتريكس" } -[:material-information-outline:](about/index.md){ title="تعلم المزيد عنا" } -[:material-hand-coin-outline:](about/donate.md){ title="ادعم المشروع" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } من المهم أن يُحدَّث موقع ويب مثل إرشادات الخصوصية بشكل مستمر. نحتاج إلى أن يراقب جمهورنا تحديثات برمجيات التطبيقات المدرجة على موقعنا ومتابعة آخر الأخبار حول مقدمي الخدمة الذين نوصي بهم. من الصعب مواكبة الوتيرة السريعة للإنترنت، لكننا نبذل قصارى جهدنا. إذا اكتشفت خطأً، اعتقدت أنه لا يجب إدراج مقدم خدمة، لاحظت اختفاء مزود مؤهَّل، اعتقدت أن المكون الإضافي للمتصفح لم يعد هو الخيار الأفضل، أو اكتشفت أي مشكلة أخرى، يرجى إبلاغنا بذلك. diff --git a/i18n/ar/kb-archive.md b/i18n/ar/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/ar/kb-archive.md +++ b/i18n/ar/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/ar/meta/admonitions.md b/i18n/ar/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/ar/meta/admonitions.md +++ b/i18n/ar/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/ar/meta/translations.md b/i18n/ar/meta/translations.md index 30b4c572..60261b1c 100644 --- a/i18n/ar/meta/translations.md +++ b/i18n/ar/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/ar/meta/uploading-images.md b/i18n/ar/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/ar/meta/uploading-images.md +++ b/i18n/ar/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/ar/meta/writing-style.md b/i18n/ar/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/ar/meta/writing-style.md +++ b/i18n/ar/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/ar/mobile-browsers.md b/i18n/ar/mobile-browsers.md index 57ae950f..e1875e1a 100644 --- a/i18n/ar/mobile-browsers.md +++ b/i18n/ar/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ These are our currently recommended mobile web browsers and configurations for s ## Android -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/ar/multi-factor-authentication.md b/i18n/ar/multi-factor-authentication.md index 830c33c8..ee60af63 100644 --- a/i18n/ar/multi-factor-authentication.md +++ b/i18n/ar/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/ar/news-aggregators.md b/i18n/ar/news-aggregators.md index 17438718..00b22c26 100644 --- a/i18n/ar/news-aggregators.md +++ b/i18n/ar/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/ar/notebooks.md b/i18n/ar/notebooks.md index 2131e5e0..0eb1ebef 100644 --- a/i18n/ar/notebooks.md +++ b/i18n/ar/notebooks.md @@ -34,7 +34,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ If you are currently using an application like Evernote, Google Keep, or Microso Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/ar/os/android-overview.md b/i18n/ar/os/android-overview.md index 1ffa3cdc..f866b6cb 100644 --- a/i18n/ar/os/android-overview.md +++ b/i18n/ar/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/ar/os/ios-overview.md b/i18n/ar/os/ios-overview.md index 949d360e..d2744bad 100644 --- a/i18n/ar/os/ios-overview.md +++ b/i18n/ar/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/ar/os/linux-overview.md b/i18n/ar/os/linux-overview.md index da9fa962..56db7195 100644 --- a/i18n/ar/os/linux-overview.md +++ b/i18n/ar/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/ar/os/macos-overview.md b/i18n/ar/os/macos-overview.md index 584d1acc..aa5541ea 100644 --- a/i18n/ar/os/macos-overview.md +++ b/i18n/ar/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Recommended Configuration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/ar/os/qubes-overview.md b/i18n/ar/os/qubes-overview.md index c76924d9..fcea270b 100644 --- a/i18n/ar/os/qubes-overview.md +++ b/i18n/ar/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/ar/passwords.md b/i18n/ar/passwords.md index da2b5d77..1514d105 100644 --- a/i18n/ar/passwords.md +++ b/i18n/ar/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/ar/photo-management.md b/i18n/ar/photo-management.md index a041bdcb..1bb46cae 100644 --- a/i18n/ar/photo-management.md +++ b/i18n/ar/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/ar/productivity.md b/i18n/ar/productivity.md index c63e28bb..1612e148 100644 --- a/i18n/ar/productivity.md +++ b/i18n/ar/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/ar/real-time-communication.md b/i18n/ar/real-time-communication.md index bb96b9c2..6a1f7de0 100644 --- a/i18n/ar/real-time-communication.md +++ b/i18n/ar/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/ar/router.md b/i18n/ar/router.md index 870cd79e..a54378c6 100644 --- a/i18n/ar/router.md +++ b/i18n/ar/router.md @@ -35,10 +35,10 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/ar/search-engines.md b/i18n/ar/search-engines.md index 7fc05e18..9ffdbb0b 100644 --- a/i18n/ar/search-engines.md +++ b/i18n/ar/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/ar/tools.md b/i18n/ar/tools.md index e10a0165..3c0afbab 100644 --- a/i18n/ar/tools.md +++ b/i18n/ar/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Learn more :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/ar/tor.md b/i18n/ar/tor.md index f8d41b2c..6bc3759f 100644 --- a/i18n/ar/tor.md +++ b/i18n/ar/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: متصفِّح تور image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: شبكة **تور** هي خوادم يديرها متطوِّعون تتيح لك الاتصال بها مجَّانًا وتحسِّن خصوصيتك وأمنك في الإنترنت. ويمكن للأفراد والمؤسسات مشاركة المعلومات عبرها باستخدام «خدمات .onion الخفية»، وذلك دون نهك خصوصيتهم. فكون اتصالات تور صعبة الحظر والتتبع يجعل تور أداةً فعَّالةً لتجاوز الرقابة. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } يعمل تور عن طريق توجيه اتصالاتك عبر خوادم المتطوِّعين، وذلك بدلًا من الاتصال بالموقع الذي تريد مباشرةً. يلبِّس هذا أصل الاتصال، وليس بوسع أي خادم في سبيل الاتصال رؤيته من بدايته لمقصده، مما يعني أن حتى الخوادم المستخدمة للاتصال لا تنتهك مجهوليتك. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **متصفِّح تور** خير خيار إن أردت المجهولية، فهو يمكِّنك من الاتصال بشبكة تور وجسورها، وفيه إعدادات مبدئية تُضبط حسب مستوى الأمن: *قياسي* و*أأمن* و*أشدُّ أمن*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ If more complete anonymity is paramount to your situation, you should **only** b -صمِّم متصفِّح تور لمكافحة التبصيم، أو كشف هويَّتك حسب ضبط متصفِّحك. وزبدة القول أنه عليك **ألا** تعدِّل المتصفِّح خلا [مستويات الأمن](https://tb-manual.torproject.org/security-settings/) المبدئية. +صمِّم متصفِّح تور لمكافحة التبصيم، أو كشف هويَّتك حسب ضبط متصفِّحك. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **أربوت** هو شبكة تور افتراضية خاصة للأجهزة الذكية، وما يفعله هو توجيه اتصالاتك من أيِّ تطبيق عبر شبكة تور. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ We previously recommended enabling the *Isolate Destination Address* preference ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ We previously recommended enabling the *Isolate Destination Address* preference يستطيع من يخضع للرقابة أن يستعمل وسطاء سنوفليك ليتَّصل بشبكة تور. ييسِّر سنوفليك المساهمة في شبكة تور، فلا تحتاج لمعلومات تقنية لتشغِّل مرحِّل تور أو جسرًا له. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ You can enable Snowflake in your browser by opening it in another tab and turnin إن تشغيل وسيط سنوفليك ليس منذرًا بالخطر، بل أقلُّ خطرًا من تشغيل مرحِّل تور أو جسر له، وهذا ليس بذاك الخطر أصلًا. ولكنه يوسِّط الاتصالات عبر شبكتك، ولعلَّ لهذا تبعات، خاصَّةً إن كانت شبكتك محدودةً. عليك تمعُّن [سبيل عمل سنوفليك](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) قبل أن تقرِّر تشغيل وسيط. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/ar/vpn.md b/i18n/ar/vpn.md index b7e7fada..964e4529 100644 --- a/i18n/ar/vpn.md +++ b/i18n/ar/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. إذا كنت تبحث عن **أمان** إضافي، يجب التأكد من الاتصال بمواقع الويب باستخدام ميفاق HTTPS. الشبكات الخاصة الافتراضية ليست بديلاً للممارسات الأمنية الجيدة. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ If you are looking for **anonymity**, you should use the Tor Browser. **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### ملفاد @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria diff --git a/i18n/bn-IN/CODE_OF_CONDUCT.md b/i18n/bn-IN/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/bn-IN/CODE_OF_CONDUCT.md +++ b/i18n/bn-IN/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/bn-IN/about/index.md b/i18n/bn-IN/about/index.md index 9c3a0d47..618957d5 100644 --- a/i18n/bn-IN/about/index.md +++ b/i18n/bn-IN/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/bn-IN/about/notices.md b/i18n/bn-IN/about/notices.md index d948a76a..0ef0e6f8 100644 --- a/i18n/bn-IN/about/notices.md +++ b/i18n/bn-IN/about/notices.md @@ -29,7 +29,7 @@ This does not include third-party code embedded in this repository, or code wher This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* +We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ You must not conduct any systematic or automated data collection activities on o --- -*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/bn-IN/about/privacytools.md b/i18n/bn-IN/about/privacytools.md index 512ebb93..0c889f62 100644 --- a/i18n/bn-IN/about/privacytools.md +++ b/i18n/bn-IN/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/bn-IN/advanced/communication-network-types.md b/i18n/bn-IN/advanced/communication-network-types.md index 1f07a2c4..f6444ca4 100644 --- a/i18n/bn-IN/advanced/communication-network-types.md +++ b/i18n/bn-IN/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/bn-IN/advanced/dns-overview.md b/i18n/bn-IN/advanced/dns-overview.md index 21889d85..2ffb67b2 100644 --- a/i18n/bn-IN/advanced/dns-overview.md +++ b/i18n/bn-IN/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/bn-IN/advanced/payments.md b/i18n/bn-IN/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/bn-IN/advanced/payments.md +++ b/i18n/bn-IN/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/bn-IN/advanced/tor-overview.md b/i18n/bn-IN/advanced/tor-overview.md index 8a6ab1ce..cc7a2fad 100644 --- a/i18n/bn-IN/advanced/tor-overview.md +++ b/i18n/bn-IN/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/bn-IN/android.md b/i18n/bn-IN/android.md index f592bdc7..2dff48b3 100644 --- a/i18n/bn-IN/android.md +++ b/i18n/bn-IN/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. রেকমেন্ডেশন @@ -113,7 +113,7 @@ We recommend installing one of these custom Android operating systems on your de GrapheneOS তে কিছু বাড়তি [সিকিউরিটি](https://en.wikipedia.org/wiki/Hardening_(computing)) এবং প্রাইভেসি রয়েছে। It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS তে কিছু বাড়তি [সিকিউরিটি]( -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/bn-IN/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/bn-IN/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/bn-IN/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/bn-IN/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/bn-IN/assets/img/how-tor-works/tor-encryption.svg b/i18n/bn-IN/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/bn-IN/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/bn-IN/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/bn-IN/assets/img/how-tor-works/tor-path-dark.svg b/i18n/bn-IN/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/bn-IN/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/bn-IN/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/bn-IN/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/bn-IN/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/bn-IN/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/bn-IN/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/bn-IN/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/bn-IN/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/bn-IN/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/bn-IN/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/bn-IN/assets/img/how-tor-works/tor-path.svg b/i18n/bn-IN/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/bn-IN/assets/img/how-tor-works/tor-path.svg +++ b/i18n/bn-IN/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/bn-IN/basics/account-deletion.md b/i18n/bn-IN/basics/account-deletion.md index cd89ea6f..857a57d8 100644 --- a/i18n/bn-IN/basics/account-deletion.md +++ b/i18n/bn-IN/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/bn-IN/basics/common-misconceptions.md b/i18n/bn-IN/basics/common-misconceptions.md index 74650997..5aeaae95 100644 --- a/i18n/bn-IN/basics/common-misconceptions.md +++ b/i18n/bn-IN/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/bn-IN/basics/common-threats.md b/i18n/bn-IN/basics/common-threats.md index a8102469..67bd483b 100644 --- a/i18n/bn-IN/basics/common-threats.md +++ b/i18n/bn-IN/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacy From Service Providers @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/bn-IN/basics/email-security.md b/i18n/bn-IN/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/bn-IN/basics/email-security.md +++ b/i18n/bn-IN/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/bn-IN/basics/multi-factor-authentication.md b/i18n/bn-IN/basics/multi-factor-authentication.md index fb7d2b0e..25c422f1 100644 --- a/i18n/bn-IN/basics/multi-factor-authentication.md +++ b/i18n/bn-IN/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you সময়-সাপেক্ষ কোড তারপর শেয়ার্ড সিক্রেট এবং সময় থেকে জেনারেট হয়। As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -যদি আপনার কাছে TOTP সহ একটি হার্ডওয়্যার সিকিউরিটি কী থাকে (যেমন Yubico অথেন্টিকেটর সাথে একটি YubiKey), আমরা সুপারিশ করি যে আপনি হার্ডওয়্যারে আপনার "শেয়ার্ড সিক্রেট " রাখুন৷ YubiKey-এর মতো হার্ডওয়্যার এমনভাবে তৈরী করা হয়েছিল যাতে "শেয়ারড সিক্রেট" বের করা এবং কপি করা কঠিন হয় একটি YubiKey ইন্টারনেটের সাথে যুক্ত থাকে না, কিন্তু TOTP যুক্ত একটি ফোন ইন্টারনেট এর সাথে যুক্ত থাকে। +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. YubiKey-এর মতো হার্ডওয়্যার এমনভাবে তৈরী করা হয়েছিল যাতে "শেয়ারড সিক্রেট" বের করা এবং কপি করা কঠিন হয় একটি YubiKey ইন্টারনেটের সাথে যুক্ত থাকে না, কিন্তু TOTP যুক্ত একটি ফোন ইন্টারনেট এর সাথে যুক্ত থাকে। [WebAuthn](#fido-fast-identity-online) এর অপরপক্ষে TOTP [ফিশিং](https://en.wikipedia.org/wiki/Phishing) বা রি-উজ এটাক এর বিরুদ্ধে কোন সুরক্ষা প্রদান করে না। If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### সময়-সাপেক্ষ ওয়ান-টাইম পাসওয়ার্ড (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/bn-IN/basics/passwords-overview.md b/i18n/bn-IN/basics/passwords-overview.md index 63b87498..5a828342 100644 --- a/i18n/bn-IN/basics/passwords-overview.md +++ b/i18n/bn-IN/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/bn-IN/basics/vpn-overview.md b/i18n/bn-IN/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/bn-IN/basics/vpn-overview.md +++ b/i18n/bn-IN/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/bn-IN/basics/why-privacy-matters.md b/i18n/bn-IN/basics/why-privacy-matters.md index b89423e0..b48c26e5 100644 --- a/i18n/bn-IN/basics/why-privacy-matters.md +++ b/i18n/bn-IN/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/bn-IN/calendar.md b/i18n/bn-IN/calendar.md index fd26697b..8390538c 100644 --- a/i18n/bn-IN/calendar.md +++ b/i18n/bn-IN/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/bn-IN/cloud.md b/i18n/bn-IN/cloud.md index 34b98b3d..166e2dd6 100644 --- a/i18n/bn-IN/cloud.md +++ b/i18n/bn-IN/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/bn-IN/cryptocurrency.md b/i18n/bn-IN/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/bn-IN/cryptocurrency.md +++ b/i18n/bn-IN/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/bn-IN/data-redaction.md b/i18n/bn-IN/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/bn-IN/data-redaction.md +++ b/i18n/bn-IN/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/bn-IN/desktop-browsers.md b/i18n/bn-IN/desktop-browsers.md index 65743bb4..90f25c19 100644 --- a/i18n/bn-IN/desktop-browsers.md +++ b/i18n/bn-IN/desktop-browsers.md @@ -70,8 +70,8 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ We are working on establishing defined criteria for every section of our site, a - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -462,4 +462,4 @@ Our best-case criteria represents what we would like to see from the perfect pro - Must directly impact user privacy, i.e. must not simply provide information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/bn-IN/desktop.md b/i18n/bn-IN/desktop.md index 5252084a..1fac706b 100644 --- a/i18n/bn-IN/desktop.md +++ b/i18n/bn-IN/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/bn-IN/device-integrity.md b/i18n/bn-IN/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/bn-IN/device-integrity.md +++ b/i18n/bn-IN/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/bn-IN/dns.md b/i18n/bn-IN/dns.md index 86d78006..6eb845a8 100644 --- a/i18n/bn-IN/dns.md +++ b/i18n/bn-IN/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## Recommended Providers -| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | +| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ After installation of either a configuration profile or an app that uses the DNS #### Signed Profiles -Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home features a polished web interface to view insights and manage blocked content. @@ -144,13 +144,13 @@ AdGuard Home features a polished web interface to view insights and manage block ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -159,8 +159,8 @@ Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to suc
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/bn-IN/email-clients.md b/i18n/bn-IN/email-clients.md index 7434f6bb..c7051cdb 100644 --- a/i18n/bn-IN/email-clients.md +++ b/i18n/bn-IN/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/bn-IN/email.md b/i18n/bn-IN/email.md index c0374704..c4637e6b 100644 --- a/i18n/bn-IN/email.md +++ b/i18n/bn-IN/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail has internal crash reports that they **do not** share with third par #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. +Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -129,7 +129,7 @@ Proton Mail doesn't offer a digital legacy feature. #### :material-check:{ .pg-green } Custom Domains and Aliases -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -137,17 +137,17 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro #### :material-check:{ .pg-green } Account Security -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security -Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } Email Encryption -Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Your account will be set to a restricted user account when your contract ends, a #### :material-information-outline:{ .pg-blue } Additional Functionality -You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. -All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criteria @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/bn-IN/encryption.md b/i18n/bn-IN/encryption.md index d774167a..aa3ee158 100644 --- a/i18n/bn-IN/encryption.md +++ b/i18n/bn-IN/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/bn-IN/file-sharing.md b/i18n/bn-IN/file-sharing.md index d7cd5832..f6732765 100644 --- a/i18n/bn-IN/file-sharing.md +++ b/i18n/bn-IN/file-sharing.md @@ -15,7 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/bn-IN/financial-services.md b/i18n/bn-IN/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/bn-IN/financial-services.md +++ b/i18n/bn-IN/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/bn-IN/frontends.md b/i18n/bn-IN/frontends.md index 01d5ea76..1769b24a 100644 --- a/i18n/bn-IN/frontends.md +++ b/i18n/bn-IN/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/bn-IN/index.md b/i18n/bn-IN/index.md index 507e0a7f..7ba76abf 100644 --- a/i18n/bn-IN/index.md +++ b/i18n/bn-IN/index.md @@ -62,7 +62,7 @@ Trying to protect all your data from everyone all the time is impractical, expen ## We need you! Here's how to get involved: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } [:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } [:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } [:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } diff --git a/i18n/bn-IN/kb-archive.md b/i18n/bn-IN/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/bn-IN/kb-archive.md +++ b/i18n/bn-IN/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/bn-IN/meta/admonitions.md b/i18n/bn-IN/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/bn-IN/meta/admonitions.md +++ b/i18n/bn-IN/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/bn-IN/meta/translations.md b/i18n/bn-IN/meta/translations.md index 30b4c572..60261b1c 100644 --- a/i18n/bn-IN/meta/translations.md +++ b/i18n/bn-IN/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/bn-IN/meta/uploading-images.md b/i18n/bn-IN/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/bn-IN/meta/uploading-images.md +++ b/i18n/bn-IN/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/bn-IN/meta/writing-style.md b/i18n/bn-IN/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/bn-IN/meta/writing-style.md +++ b/i18n/bn-IN/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/bn-IN/mobile-browsers.md b/i18n/bn-IN/mobile-browsers.md index 67146f0d..1b365cfb 100644 --- a/i18n/bn-IN/mobile-browsers.md +++ b/i18n/bn-IN/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ These are our currently recommended mobile web browsers and configurations for s ## অ্যান্ড্রয়েড -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/bn-IN/multi-factor-authentication.md b/i18n/bn-IN/multi-factor-authentication.md index 830c33c8..ee60af63 100644 --- a/i18n/bn-IN/multi-factor-authentication.md +++ b/i18n/bn-IN/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/bn-IN/news-aggregators.md b/i18n/bn-IN/news-aggregators.md index 17438718..00b22c26 100644 --- a/i18n/bn-IN/news-aggregators.md +++ b/i18n/bn-IN/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/bn-IN/notebooks.md b/i18n/bn-IN/notebooks.md index 2131e5e0..0eb1ebef 100644 --- a/i18n/bn-IN/notebooks.md +++ b/i18n/bn-IN/notebooks.md @@ -34,7 +34,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ If you are currently using an application like Evernote, Google Keep, or Microso Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/bn-IN/os/android-overview.md b/i18n/bn-IN/os/android-overview.md index 1ffa3cdc..f866b6cb 100644 --- a/i18n/bn-IN/os/android-overview.md +++ b/i18n/bn-IN/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/bn-IN/os/ios-overview.md b/i18n/bn-IN/os/ios-overview.md index 949d360e..d2744bad 100644 --- a/i18n/bn-IN/os/ios-overview.md +++ b/i18n/bn-IN/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/bn-IN/os/linux-overview.md b/i18n/bn-IN/os/linux-overview.md index da9fa962..56db7195 100644 --- a/i18n/bn-IN/os/linux-overview.md +++ b/i18n/bn-IN/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/bn-IN/os/macos-overview.md b/i18n/bn-IN/os/macos-overview.md index 584d1acc..aa5541ea 100644 --- a/i18n/bn-IN/os/macos-overview.md +++ b/i18n/bn-IN/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Recommended Configuration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/bn-IN/os/qubes-overview.md b/i18n/bn-IN/os/qubes-overview.md index c76924d9..fcea270b 100644 --- a/i18n/bn-IN/os/qubes-overview.md +++ b/i18n/bn-IN/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/bn-IN/passwords.md b/i18n/bn-IN/passwords.md index 59e13d42..b140b7aa 100644 --- a/i18n/bn-IN/passwords.md +++ b/i18n/bn-IN/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: অ্যান্ড্রয়েড subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/bn-IN/photo-management.md b/i18n/bn-IN/photo-management.md index a041bdcb..1bb46cae 100644 --- a/i18n/bn-IN/photo-management.md +++ b/i18n/bn-IN/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/bn-IN/productivity.md b/i18n/bn-IN/productivity.md index c63e28bb..1612e148 100644 --- a/i18n/bn-IN/productivity.md +++ b/i18n/bn-IN/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/bn-IN/real-time-communication.md b/i18n/bn-IN/real-time-communication.md index bb96b9c2..6a1f7de0 100644 --- a/i18n/bn-IN/real-time-communication.md +++ b/i18n/bn-IN/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/bn-IN/router.md b/i18n/bn-IN/router.md index 870cd79e..a54378c6 100644 --- a/i18n/bn-IN/router.md +++ b/i18n/bn-IN/router.md @@ -35,10 +35,10 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/bn-IN/search-engines.md b/i18n/bn-IN/search-engines.md index 7fc05e18..9ffdbb0b 100644 --- a/i18n/bn-IN/search-engines.md +++ b/i18n/bn-IN/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/bn-IN/tools.md b/i18n/bn-IN/tools.md index e10a0165..3c0afbab 100644 --- a/i18n/bn-IN/tools.md +++ b/i18n/bn-IN/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Learn more :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/bn-IN/tor.md b/i18n/bn-IN/tor.md index 62f48b06..d0ac4665 100644 --- a/i18n/bn-IN/tor.md +++ b/i18n/bn-IN/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a -The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake does not increase your privacy in any way, nor is it used to connect t Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/bn-IN/vpn.md b/i18n/bn-IN/vpn.md index caeab50a..e7bc610a 100644 --- a/i18n/bn-IN/vpn.md +++ b/i18n/bn-IN/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria diff --git a/i18n/bn/CODE_OF_CONDUCT.md b/i18n/bn/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/bn/CODE_OF_CONDUCT.md +++ b/i18n/bn/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/bn/about/index.md b/i18n/bn/about/index.md index 9c3a0d47..618957d5 100644 --- a/i18n/bn/about/index.md +++ b/i18n/bn/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/bn/about/notices.md b/i18n/bn/about/notices.md index d948a76a..0ef0e6f8 100644 --- a/i18n/bn/about/notices.md +++ b/i18n/bn/about/notices.md @@ -29,7 +29,7 @@ This does not include third-party code embedded in this repository, or code wher This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* +We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ You must not conduct any systematic or automated data collection activities on o --- -*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/bn/about/privacytools.md b/i18n/bn/about/privacytools.md index 512ebb93..0c889f62 100644 --- a/i18n/bn/about/privacytools.md +++ b/i18n/bn/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/bn/advanced/communication-network-types.md b/i18n/bn/advanced/communication-network-types.md index 1f07a2c4..f6444ca4 100644 --- a/i18n/bn/advanced/communication-network-types.md +++ b/i18n/bn/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/bn/advanced/dns-overview.md b/i18n/bn/advanced/dns-overview.md index 21889d85..2ffb67b2 100644 --- a/i18n/bn/advanced/dns-overview.md +++ b/i18n/bn/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/bn/advanced/payments.md b/i18n/bn/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/bn/advanced/payments.md +++ b/i18n/bn/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/bn/advanced/tor-overview.md b/i18n/bn/advanced/tor-overview.md index 8a6ab1ce..cc7a2fad 100644 --- a/i18n/bn/advanced/tor-overview.md +++ b/i18n/bn/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/bn/android.md b/i18n/bn/android.md index 6a650455..2f79dd91 100644 --- a/i18n/bn/android.md +++ b/i18n/bn/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,7 +113,7 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/bn/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/bn/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/bn/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/bn/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/bn/assets/img/how-tor-works/tor-encryption.svg b/i18n/bn/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/bn/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/bn/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/bn/assets/img/how-tor-works/tor-path-dark.svg b/i18n/bn/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/bn/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/bn/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/bn/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/bn/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/bn/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/bn/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/bn/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/bn/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/bn/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/bn/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/bn/assets/img/how-tor-works/tor-path.svg b/i18n/bn/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/bn/assets/img/how-tor-works/tor-path.svg +++ b/i18n/bn/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/bn/basics/account-deletion.md b/i18n/bn/basics/account-deletion.md index cd89ea6f..857a57d8 100644 --- a/i18n/bn/basics/account-deletion.md +++ b/i18n/bn/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/bn/basics/common-misconceptions.md b/i18n/bn/basics/common-misconceptions.md index 74650997..5aeaae95 100644 --- a/i18n/bn/basics/common-misconceptions.md +++ b/i18n/bn/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/bn/basics/common-threats.md b/i18n/bn/basics/common-threats.md index a8102469..67bd483b 100644 --- a/i18n/bn/basics/common-threats.md +++ b/i18n/bn/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacy From Service Providers @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/bn/basics/email-security.md b/i18n/bn/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/bn/basics/email-security.md +++ b/i18n/bn/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/bn/basics/multi-factor-authentication.md b/i18n/bn/basics/multi-factor-authentication.md index 75cb7e9b..92a563d7 100644 --- a/i18n/bn/basics/multi-factor-authentication.md +++ b/i18n/bn/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/bn/basics/passwords-overview.md b/i18n/bn/basics/passwords-overview.md index 63b87498..5a828342 100644 --- a/i18n/bn/basics/passwords-overview.md +++ b/i18n/bn/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/bn/basics/vpn-overview.md b/i18n/bn/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/bn/basics/vpn-overview.md +++ b/i18n/bn/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/bn/basics/why-privacy-matters.md b/i18n/bn/basics/why-privacy-matters.md index 8c6a1ed7..fe051cb4 100644 --- a/i18n/bn/basics/why-privacy-matters.md +++ b/i18n/bn/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/bn/calendar.md b/i18n/bn/calendar.md index fd26697b..8390538c 100644 --- a/i18n/bn/calendar.md +++ b/i18n/bn/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/bn/cloud.md b/i18n/bn/cloud.md index 34b98b3d..166e2dd6 100644 --- a/i18n/bn/cloud.md +++ b/i18n/bn/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/bn/cryptocurrency.md b/i18n/bn/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/bn/cryptocurrency.md +++ b/i18n/bn/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/bn/data-redaction.md b/i18n/bn/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/bn/data-redaction.md +++ b/i18n/bn/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/bn/desktop-browsers.md b/i18n/bn/desktop-browsers.md index 65743bb4..90f25c19 100644 --- a/i18n/bn/desktop-browsers.md +++ b/i18n/bn/desktop-browsers.md @@ -70,8 +70,8 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ We are working on establishing defined criteria for every section of our site, a - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -462,4 +462,4 @@ Our best-case criteria represents what we would like to see from the perfect pro - Must directly impact user privacy, i.e. must not simply provide information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/bn/desktop.md b/i18n/bn/desktop.md index 5252084a..1fac706b 100644 --- a/i18n/bn/desktop.md +++ b/i18n/bn/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/bn/device-integrity.md b/i18n/bn/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/bn/device-integrity.md +++ b/i18n/bn/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/bn/dns.md b/i18n/bn/dns.md index 61171598..4a78760f 100644 --- a/i18n/bn/dns.md +++ b/i18n/bn/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## Recommended Providers -| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | +| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ After installation of either a configuration profile or an app that uses the DNS #### Signed Profiles -Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home features a polished web interface to view insights and manage blocked content. @@ -144,13 +144,13 @@ AdGuard Home features a polished web interface to view insights and manage block ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -159,8 +159,8 @@ Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to suc
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/bn/email-clients.md b/i18n/bn/email-clients.md index 7434f6bb..c7051cdb 100644 --- a/i18n/bn/email-clients.md +++ b/i18n/bn/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/bn/email.md b/i18n/bn/email.md index c0374704..c4637e6b 100644 --- a/i18n/bn/email.md +++ b/i18n/bn/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail has internal crash reports that they **do not** share with third par #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. +Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -129,7 +129,7 @@ Proton Mail doesn't offer a digital legacy feature. #### :material-check:{ .pg-green } Custom Domains and Aliases -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -137,17 +137,17 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro #### :material-check:{ .pg-green } Account Security -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security -Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } Email Encryption -Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Your account will be set to a restricted user account when your contract ends, a #### :material-information-outline:{ .pg-blue } Additional Functionality -You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. -All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criteria @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/bn/encryption.md b/i18n/bn/encryption.md index d774167a..aa3ee158 100644 --- a/i18n/bn/encryption.md +++ b/i18n/bn/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/bn/file-sharing.md b/i18n/bn/file-sharing.md index d7cd5832..f6732765 100644 --- a/i18n/bn/file-sharing.md +++ b/i18n/bn/file-sharing.md @@ -15,7 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/bn/financial-services.md b/i18n/bn/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/bn/financial-services.md +++ b/i18n/bn/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/bn/frontends.md b/i18n/bn/frontends.md index 01d5ea76..1769b24a 100644 --- a/i18n/bn/frontends.md +++ b/i18n/bn/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/bn/index.md b/i18n/bn/index.md index 7f67aa14..3243aa03 100644 --- a/i18n/bn/index.md +++ b/i18n/bn/index.md @@ -62,7 +62,7 @@ Trying to protect all your data from everyone all the time is impractical, expen ## We need you! Here's how to get involved: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } [:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } [:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } [:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } diff --git a/i18n/bn/kb-archive.md b/i18n/bn/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/bn/kb-archive.md +++ b/i18n/bn/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/bn/meta/admonitions.md b/i18n/bn/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/bn/meta/admonitions.md +++ b/i18n/bn/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/bn/meta/translations.md b/i18n/bn/meta/translations.md index 30b4c572..60261b1c 100644 --- a/i18n/bn/meta/translations.md +++ b/i18n/bn/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/bn/meta/uploading-images.md b/i18n/bn/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/bn/meta/uploading-images.md +++ b/i18n/bn/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/bn/meta/writing-style.md b/i18n/bn/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/bn/meta/writing-style.md +++ b/i18n/bn/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/bn/mobile-browsers.md b/i18n/bn/mobile-browsers.md index 57ae950f..e1875e1a 100644 --- a/i18n/bn/mobile-browsers.md +++ b/i18n/bn/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ These are our currently recommended mobile web browsers and configurations for s ## Android -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/bn/multi-factor-authentication.md b/i18n/bn/multi-factor-authentication.md index 830c33c8..ee60af63 100644 --- a/i18n/bn/multi-factor-authentication.md +++ b/i18n/bn/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/bn/news-aggregators.md b/i18n/bn/news-aggregators.md index 17438718..00b22c26 100644 --- a/i18n/bn/news-aggregators.md +++ b/i18n/bn/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/bn/notebooks.md b/i18n/bn/notebooks.md index 2131e5e0..0eb1ebef 100644 --- a/i18n/bn/notebooks.md +++ b/i18n/bn/notebooks.md @@ -34,7 +34,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ If you are currently using an application like Evernote, Google Keep, or Microso Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/bn/os/android-overview.md b/i18n/bn/os/android-overview.md index 1ffa3cdc..f866b6cb 100644 --- a/i18n/bn/os/android-overview.md +++ b/i18n/bn/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/bn/os/ios-overview.md b/i18n/bn/os/ios-overview.md index 949d360e..d2744bad 100644 --- a/i18n/bn/os/ios-overview.md +++ b/i18n/bn/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/bn/os/linux-overview.md b/i18n/bn/os/linux-overview.md index da9fa962..56db7195 100644 --- a/i18n/bn/os/linux-overview.md +++ b/i18n/bn/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/bn/os/macos-overview.md b/i18n/bn/os/macos-overview.md index 584d1acc..aa5541ea 100644 --- a/i18n/bn/os/macos-overview.md +++ b/i18n/bn/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Recommended Configuration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/bn/os/qubes-overview.md b/i18n/bn/os/qubes-overview.md index c76924d9..fcea270b 100644 --- a/i18n/bn/os/qubes-overview.md +++ b/i18n/bn/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/bn/passwords.md b/i18n/bn/passwords.md index da2b5d77..1514d105 100644 --- a/i18n/bn/passwords.md +++ b/i18n/bn/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/bn/photo-management.md b/i18n/bn/photo-management.md index a041bdcb..1bb46cae 100644 --- a/i18n/bn/photo-management.md +++ b/i18n/bn/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/bn/productivity.md b/i18n/bn/productivity.md index c63e28bb..1612e148 100644 --- a/i18n/bn/productivity.md +++ b/i18n/bn/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/bn/real-time-communication.md b/i18n/bn/real-time-communication.md index bb96b9c2..6a1f7de0 100644 --- a/i18n/bn/real-time-communication.md +++ b/i18n/bn/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/bn/router.md b/i18n/bn/router.md index 870cd79e..a54378c6 100644 --- a/i18n/bn/router.md +++ b/i18n/bn/router.md @@ -35,10 +35,10 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/bn/search-engines.md b/i18n/bn/search-engines.md index 7fc05e18..9ffdbb0b 100644 --- a/i18n/bn/search-engines.md +++ b/i18n/bn/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/bn/tools.md b/i18n/bn/tools.md index e10a0165..3c0afbab 100644 --- a/i18n/bn/tools.md +++ b/i18n/bn/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Learn more :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/bn/tor.md b/i18n/bn/tor.md index d10636e6..6b8a0163 100644 --- a/i18n/bn/tor.md +++ b/i18n/bn/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a -The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake does not increase your privacy in any way, nor is it used to connect t Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/bn/vpn.md b/i18n/bn/vpn.md index caeab50a..e7bc610a 100644 --- a/i18n/bn/vpn.md +++ b/i18n/bn/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria diff --git a/i18n/cs/CODE_OF_CONDUCT.md b/i18n/cs/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/cs/CODE_OF_CONDUCT.md +++ b/i18n/cs/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/cs/about/index.md b/i18n/cs/about/index.md index 9c3a0d47..618957d5 100644 --- a/i18n/cs/about/index.md +++ b/i18n/cs/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/cs/about/notices.md b/i18n/cs/about/notices.md index d948a76a..0ef0e6f8 100644 --- a/i18n/cs/about/notices.md +++ b/i18n/cs/about/notices.md @@ -29,7 +29,7 @@ This does not include third-party code embedded in this repository, or code wher This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* +We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ You must not conduct any systematic or automated data collection activities on o --- -*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/cs/about/privacytools.md b/i18n/cs/about/privacytools.md index 512ebb93..0c889f62 100644 --- a/i18n/cs/about/privacytools.md +++ b/i18n/cs/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/cs/advanced/communication-network-types.md b/i18n/cs/advanced/communication-network-types.md index 1f07a2c4..f6444ca4 100644 --- a/i18n/cs/advanced/communication-network-types.md +++ b/i18n/cs/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/cs/advanced/dns-overview.md b/i18n/cs/advanced/dns-overview.md index 21889d85..2ffb67b2 100644 --- a/i18n/cs/advanced/dns-overview.md +++ b/i18n/cs/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/cs/advanced/payments.md b/i18n/cs/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/cs/advanced/payments.md +++ b/i18n/cs/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/cs/advanced/tor-overview.md b/i18n/cs/advanced/tor-overview.md index 8a6ab1ce..cc7a2fad 100644 --- a/i18n/cs/advanced/tor-overview.md +++ b/i18n/cs/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/cs/android.md b/i18n/cs/android.md index 6a650455..2f79dd91 100644 --- a/i18n/cs/android.md +++ b/i18n/cs/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,7 +113,7 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/cs/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/cs/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/cs/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/cs/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/cs/assets/img/how-tor-works/tor-encryption.svg b/i18n/cs/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/cs/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/cs/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/cs/assets/img/how-tor-works/tor-path-dark.svg b/i18n/cs/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/cs/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/cs/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/cs/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/cs/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/cs/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/cs/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/cs/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/cs/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/cs/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/cs/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/cs/assets/img/how-tor-works/tor-path.svg b/i18n/cs/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/cs/assets/img/how-tor-works/tor-path.svg +++ b/i18n/cs/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/cs/basics/account-deletion.md b/i18n/cs/basics/account-deletion.md index cd89ea6f..857a57d8 100644 --- a/i18n/cs/basics/account-deletion.md +++ b/i18n/cs/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/cs/basics/common-misconceptions.md b/i18n/cs/basics/common-misconceptions.md index 74650997..5aeaae95 100644 --- a/i18n/cs/basics/common-misconceptions.md +++ b/i18n/cs/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/cs/basics/common-threats.md b/i18n/cs/basics/common-threats.md index a8102469..67bd483b 100644 --- a/i18n/cs/basics/common-threats.md +++ b/i18n/cs/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacy From Service Providers @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/cs/basics/email-security.md b/i18n/cs/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/cs/basics/email-security.md +++ b/i18n/cs/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/cs/basics/multi-factor-authentication.md b/i18n/cs/basics/multi-factor-authentication.md index 75cb7e9b..92a563d7 100644 --- a/i18n/cs/basics/multi-factor-authentication.md +++ b/i18n/cs/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/cs/basics/passwords-overview.md b/i18n/cs/basics/passwords-overview.md index 63b87498..5a828342 100644 --- a/i18n/cs/basics/passwords-overview.md +++ b/i18n/cs/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/cs/basics/vpn-overview.md b/i18n/cs/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/cs/basics/vpn-overview.md +++ b/i18n/cs/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/cs/basics/why-privacy-matters.md b/i18n/cs/basics/why-privacy-matters.md index 96fdffb7..18e77a66 100644 --- a/i18n/cs/basics/why-privacy-matters.md +++ b/i18n/cs/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/cs/calendar.md b/i18n/cs/calendar.md index fd26697b..8390538c 100644 --- a/i18n/cs/calendar.md +++ b/i18n/cs/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/cs/cloud.md b/i18n/cs/cloud.md index 34b98b3d..166e2dd6 100644 --- a/i18n/cs/cloud.md +++ b/i18n/cs/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/cs/cryptocurrency.md b/i18n/cs/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/cs/cryptocurrency.md +++ b/i18n/cs/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/cs/data-redaction.md b/i18n/cs/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/cs/data-redaction.md +++ b/i18n/cs/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/cs/desktop-browsers.md b/i18n/cs/desktop-browsers.md index a3737588..4f82c305 100644 --- a/i18n/cs/desktop-browsers.md +++ b/i18n/cs/desktop-browsers.md @@ -70,8 +70,8 @@ Pokud potřebujete procházet internet anonymně, měli byste místo toho použ **Mullvad prohlížeč** je verze prohlížeče [Tor](tor.md#tor-browser) s odstraněnou integrací sítě Tor, jehož cílem je poskytnout technologie prohlížeče Tor proti otisku prohlížeče uživatelům VPN. Je vyvinut projektem Tor a distribuován společností [Mullvad](vpn.md#mullvad) a **nevyžaduje** používání sítě VPN Mullvad. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ Pokud potřebujete procházet internet anonymně, měli byste místo toho použ -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ We are working on establishing defined criteria for every section of our site, a - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -462,4 +462,4 @@ Our best-case criteria represents what we would like to see from the perfect pro - Must directly impact user privacy, i.e. must not simply provide information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/cs/desktop.md b/i18n/cs/desktop.md index 5252084a..1fac706b 100644 --- a/i18n/cs/desktop.md +++ b/i18n/cs/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/cs/device-integrity.md b/i18n/cs/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/cs/device-integrity.md +++ b/i18n/cs/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/cs/dns.md b/i18n/cs/dns.md index aa5699bf..b8f35a6b 100644 --- a/i18n/cs/dns.md +++ b/i18n/cs/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## Recommended Providers -| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Some[^2] | Ne | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | Ne | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | Ne | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | +| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Some[^2] | Ne | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | Ne | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | No[^4] | Ne | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ After installation of either a configuration profile or an app that uses the DNS #### Signed Profiles -Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home features a polished web interface to view insights and manage blocked content. @@ -144,13 +144,13 @@ AdGuard Home features a polished web interface to view insights and manage block ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -159,8 +159,8 @@ Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to suc
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/cs/email-clients.md b/i18n/cs/email-clients.md index 7434f6bb..c7051cdb 100644 --- a/i18n/cs/email-clients.md +++ b/i18n/cs/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/cs/email.md b/i18n/cs/email.md index c0374704..c4637e6b 100644 --- a/i18n/cs/email.md +++ b/i18n/cs/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail has internal crash reports that they **do not** share with third par #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. +Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -129,7 +129,7 @@ Proton Mail doesn't offer a digital legacy feature. #### :material-check:{ .pg-green } Custom Domains and Aliases -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -137,17 +137,17 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro #### :material-check:{ .pg-green } Account Security -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security -Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } Email Encryption -Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Your account will be set to a restricted user account when your contract ends, a #### :material-information-outline:{ .pg-blue } Additional Functionality -You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. -All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criteria @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/cs/encryption.md b/i18n/cs/encryption.md index d774167a..aa3ee158 100644 --- a/i18n/cs/encryption.md +++ b/i18n/cs/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/cs/file-sharing.md b/i18n/cs/file-sharing.md index d7cd5832..f6732765 100644 --- a/i18n/cs/file-sharing.md +++ b/i18n/cs/file-sharing.md @@ -15,7 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/cs/financial-services.md b/i18n/cs/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/cs/financial-services.md +++ b/i18n/cs/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/cs/frontends.md b/i18n/cs/frontends.md index 01d5ea76..1769b24a 100644 --- a/i18n/cs/frontends.md +++ b/i18n/cs/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/cs/index.md b/i18n/cs/index.md index 3a2f6d41..188fca0d 100644 --- a/i18n/cs/index.md +++ b/i18n/cs/index.md @@ -62,12 +62,12 @@ Snažit se neustále chránit všechna data před všemi je nepraktické, nákla ## Potřebujeme vás! Zde je návod, jak začít: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Zapojte se na našem fóru" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Sledujte nás na Mastodonu" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Připějte na této stránce" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Pomožte s překladem stránky" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Napište nám na Matrixu" } -[:material-information-outline:](about/index.md){ title="Dozvěťte se o nás více" } -[:material-hand-coin-outline:](about/donate.md){ title="Podpořte projekt" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } Pro webové stránky jako je Privacy Guides je důležité, aby byly vždy aktuální. We need our audience to keep an eye on software updates for the applications listed on our site and follow recent news about providers that we recommend. It's hard to keep up with the fast pace of the internet, but we try our best. If you spot an error, think a provider should not be listed, notice a qualified provider is missing, believe a browser plugin is no longer the best choice, or uncover any other issue, please let us know. diff --git a/i18n/cs/kb-archive.md b/i18n/cs/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/cs/kb-archive.md +++ b/i18n/cs/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/cs/meta/admonitions.md b/i18n/cs/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/cs/meta/admonitions.md +++ b/i18n/cs/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/cs/meta/translations.md b/i18n/cs/meta/translations.md index 30b4c572..60261b1c 100644 --- a/i18n/cs/meta/translations.md +++ b/i18n/cs/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/cs/meta/uploading-images.md b/i18n/cs/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/cs/meta/uploading-images.md +++ b/i18n/cs/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/cs/meta/writing-style.md b/i18n/cs/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/cs/meta/writing-style.md +++ b/i18n/cs/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/cs/mobile-browsers.md b/i18n/cs/mobile-browsers.md index 57ae950f..e1875e1a 100644 --- a/i18n/cs/mobile-browsers.md +++ b/i18n/cs/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ These are our currently recommended mobile web browsers and configurations for s ## Android -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/cs/multi-factor-authentication.md b/i18n/cs/multi-factor-authentication.md index 830c33c8..ee60af63 100644 --- a/i18n/cs/multi-factor-authentication.md +++ b/i18n/cs/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/cs/news-aggregators.md b/i18n/cs/news-aggregators.md index 17438718..00b22c26 100644 --- a/i18n/cs/news-aggregators.md +++ b/i18n/cs/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/cs/notebooks.md b/i18n/cs/notebooks.md index 2131e5e0..0eb1ebef 100644 --- a/i18n/cs/notebooks.md +++ b/i18n/cs/notebooks.md @@ -34,7 +34,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ If you are currently using an application like Evernote, Google Keep, or Microso Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/cs/os/android-overview.md b/i18n/cs/os/android-overview.md index 1ffa3cdc..f866b6cb 100644 --- a/i18n/cs/os/android-overview.md +++ b/i18n/cs/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/cs/os/ios-overview.md b/i18n/cs/os/ios-overview.md index 949d360e..d2744bad 100644 --- a/i18n/cs/os/ios-overview.md +++ b/i18n/cs/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/cs/os/linux-overview.md b/i18n/cs/os/linux-overview.md index da9fa962..56db7195 100644 --- a/i18n/cs/os/linux-overview.md +++ b/i18n/cs/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/cs/os/macos-overview.md b/i18n/cs/os/macos-overview.md index 584d1acc..aa5541ea 100644 --- a/i18n/cs/os/macos-overview.md +++ b/i18n/cs/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Recommended Configuration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/cs/os/qubes-overview.md b/i18n/cs/os/qubes-overview.md index c76924d9..fcea270b 100644 --- a/i18n/cs/os/qubes-overview.md +++ b/i18n/cs/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/cs/passwords.md b/i18n/cs/passwords.md index da2b5d77..1514d105 100644 --- a/i18n/cs/passwords.md +++ b/i18n/cs/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/cs/photo-management.md b/i18n/cs/photo-management.md index a041bdcb..1bb46cae 100644 --- a/i18n/cs/photo-management.md +++ b/i18n/cs/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/cs/productivity.md b/i18n/cs/productivity.md index c63e28bb..1612e148 100644 --- a/i18n/cs/productivity.md +++ b/i18n/cs/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/cs/real-time-communication.md b/i18n/cs/real-time-communication.md index bb96b9c2..6a1f7de0 100644 --- a/i18n/cs/real-time-communication.md +++ b/i18n/cs/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/cs/router.md b/i18n/cs/router.md index 870cd79e..a54378c6 100644 --- a/i18n/cs/router.md +++ b/i18n/cs/router.md @@ -35,10 +35,10 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/cs/search-engines.md b/i18n/cs/search-engines.md index 7fc05e18..9ffdbb0b 100644 --- a/i18n/cs/search-engines.md +++ b/i18n/cs/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/cs/tools.md b/i18n/cs/tools.md index e10a0165..3c0afbab 100644 --- a/i18n/cs/tools.md +++ b/i18n/cs/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Learn more :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/cs/tor.md b/i18n/cs/tor.md index 04bc51b7..3c240ddc 100644 --- a/i18n/cs/tor.md +++ b/i18n/cs/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a -The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake does not increase your privacy in any way, nor is it used to connect t Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/cs/vpn.md b/i18n/cs/vpn.md index caeab50a..e7bc610a 100644 --- a/i18n/cs/vpn.md +++ b/i18n/cs/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria diff --git a/i18n/de/CODE_OF_CONDUCT.md b/i18n/de/CODE_OF_CONDUCT.md index 30bf663a..bb84f3b3 100644 --- a/i18n/de/CODE_OF_CONDUCT.md +++ b/i18n/de/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ Was wir von den Mitgliedern unserer Gemeinschaften erwarten: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Positiv und konstruktiv verhalten** diff --git a/i18n/de/about/index.md b/i18n/de/about/index.md index b33377da..92d98bed 100644 --- a/i18n/de/about/index.md +++ b/i18n/de/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** ist eine sozial motivierte Website, die [Informationen](/kb) zum Schutz der eigenen Datensicherheit und Privatsphäre bereitstellt. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. Wir sind ein gemeinnütziges Kollektiv, welches ausschließlich von freiwilligen [Teammitgliedern](https://discuss.privacyguides.net/g/team) und Mitwirkenden betrieben wird. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > Um [datenschutzfreundliche alternative] Apps zu finden, besuchen Sie Websites wie Good Reports und **Privacy Guides**, die datenschutzfreundliche Apps in einer Vielzahl von Kategorien auflisten, darunter auch E-Mail-Anbieter (in der Regel mit kostenpflichtigen Tarifen), die nicht von den großen Technologieunternehmen betrieben werden. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/de/about/notices.md b/i18n/de/about/notices.md index ba2e0ea6..18f0efda 100644 --- a/i18n/de/about/notices.md +++ b/i18n/de/about/notices.md @@ -29,7 +29,7 @@ Dies gilt nicht für den in diesem Repository eingebetteten Code von Drittanbiet This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* +We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ You must not conduct any systematic or automated data collection activities on o --- -*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/de/about/privacytools.md b/i18n/de/about/privacytools.md index d848eee1..4206455d 100644 --- a/i18n/de/about/privacytools.md +++ b/i18n/de/about/privacytools.md @@ -14,13 +14,13 @@ Nachdem der organisatorische Umzug abgeschlossen war, kehrte der Gründer von Pr PrivacyTools wurde 2015 von "BurungHantu" ins Leben gerufen, der nach den Snowden-Enthüllungen eine Informationsquelle/Hilfreiche Tools zum Datenschutz schaffen wollte. Die Website entwickelte sich zu einem florierenden Open-Source-Projekt mit [vielen Mitwirkenden](https://github.com/privacytools/privacytools.io/graphs/contributors), von denen einige schließlich verschiedene organisatorische Aufgaben übernahmen, z. B. den Betrieb von Online-Diensten wie Matrix und Mastodon, die Verwaltung und Überprüfung von Änderungen an der Webseite auf GitHub, die Suche nach Sponsoren für das Projekt, das Schreiben von Blogbeiträgen und den Betrieb von Social-Media-Plattformen wie Twitter usw. -Ab 2019 entfernte sich BurungHantu immer mehr von der aktiven Entwicklung der Website und der Communities und begann, die Zahlungen, für die er im Zusammenhang mit den von uns betriebenen Servern verantwortlich war, zu verzögern. Um zu vermeiden, dass unser Systemadministrator die Serverkosten aus eigener Tasche bezahlen muss, haben wir die auf der Website aufgeführten Spendenmethoden von BurungHantus persönlichen PayPal- und Krypto-Konten am [31. Oktober 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/) auf eine neue OpenCollective-Seite umgestellt. Dies hatte den zusätzlichen Vorteil, dass unsere Finanzen völlig transparent waren - ein Wert, an den wir fest glauben - und in den Vereinigten Staaten steuerlich absetzbar, da sie von der Open Collective Foundation 501(c)3 verwaltet wurden. Diese Änderung wurde vom Team einstimmig beschlossen und war unumstritten. +Ab 2019 entfernte sich BurungHantu immer mehr von der aktiven Entwicklung der Website und der Communities und begann, die Zahlungen, für die er im Zusammenhang mit den von uns betriebenen Servern verantwortlich war, zu verzögern. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). Dies hatte den zusätzlichen Vorteil, dass unsere Finanzen völlig transparent waren - ein Wert, an den wir fest glauben - und in den Vereinigten Staaten steuerlich absetzbar, da sie von der Open Collective Foundation 501(c)3 verwaltet wurden. Diese Änderung wurde vom Team einstimmig beschlossen und war unumstritten. ## Warum wir weitergezogen sind Im Jahr 2020 wurde die Abwesenheit von BurungHantu noch auffälliger. In einem Fall mussten die Nameserver der Domain auf Nameserver geändert werden, die von unserem Systemadministrator kontrolliert werden, um künftige Störungen zu vermeiden, und diese Änderung wurde erst über einen Monat nach der ersten Anfrage abgeschlossen. Er verschwand monatelang aus dem öffentlichen Chat und den privaten Team-Chaträumen auf Matrix, tauchte gelegentlich auf, um ein kleines Feedback zu geben oder zu versprechen, aktiver zu sein, bevor er wieder verschwand. -Im Oktober 2020 [verließ](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) der PrivacyTools-Systemadministrator (Jonah) das Projekt aufgrund dieser Schwierigkeiten und übergab die Kontrolle an einen anderen langjährigen Mitstreiter. Jonah hatte fast alle PrivacyTools-Dienste betrieben und in der Abwesenheit von BurungHantu als *de facto* Projektleiter für die Webseitenentwicklung fungiert, so dass sein Austritt eine bedeutende Veränderung in der Organisation darstellte. Aufgrund dieser bedeutenden organisatorischen Veränderungen versprach BurungHantu damals dem verbleibenden Team, dass er zurückkehren würde, um die Kontrolle über das Projekt in Zukunft zu übernehmen. ==Das PrivacyTools-Team versuchte in den folgenden Monaten, über verschiedene Kommunikationswege Kontakt aufzunehmen, erhielt jedoch keine Antwort.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah hatte fast alle PrivacyTools-Dienste betrieben und in der Abwesenheit von BurungHantu als *de facto* Projektleiter für die Webseitenentwicklung fungiert, so dass sein Austritt eine bedeutende Veränderung in der Organisation darstellte. Aufgrund dieser bedeutenden organisatorischen Veränderungen versprach BurungHantu damals dem verbleibenden Team, dass er zurückkehren würde, um die Kontrolle über das Projekt in Zukunft zu übernehmen. ==Das PrivacyTools-Team versuchte in den folgenden Monaten, über verschiedene Kommunikationswege Kontakt aufzunehmen, erhielt jedoch keine Antwort.== ## Vertrauen in den Domainnamen @@ -34,25 +34,25 @@ Mitte 2021 wandte sich das PrivacyTools-Team an Jonah, der sich bereit erklärte ## Gemeinschaftlicher Aufruf zum Handeln -Ende Juli 2021 haben wir die PrivacyTools-Community über unsere Absicht [informiert](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/), einen neuen Namen zu wählen und das Projekt unter einer neuen Domain fortzuführen, die am 2. August 2022 [gewählt](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) werden soll. Die Wahl fiel schließlich auf "Privacy Guides", wobei die Domain `privacyguides.org` bereits im Besitz von Jonah für ein Nebenprojekt aus dem Jahr 2020 war, das nicht weiterentwickelt wurde. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. Die Wahl fiel schließlich auf "Privacy Guides", wobei die Domain `privacyguides.org` bereits im Besitz von Jonah für ein Nebenprojekt aus dem Jahr 2020 war, das nicht weiterentwickelt wurde. ## Kontrolle über r/privacytoolsIO -Gleichzeitig mit den anhaltenden Problemen mit der Website privacytools.io stand das Moderationsteam von r/privacytoolsIO vor Herausforderungen bei der Verwaltung des Subreddits. Das Subreddit wurde schon immer weitgehend unabhängig von der Entwicklung der Website betrieben, aber BurungHantu war auch der Hauptmoderator des Subreddits, und er war der einzige Moderator, der über die "volle Kontrolle" verfügte. u/trai_dep war zu diesem Zeitpunkt der einzige aktive Moderator, und [stellte am 28. Juni 2021 einem Antrag an die Reddit-Administratoren](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/), in der er darum bat, die Position des Hauptmoderators und volle Kontrollrechte zu erhalten, um notwendige Änderungen am Subreddit vornehmen zu können. +Gleichzeitig mit den anhaltenden Problemen mit der Website privacytools.io stand das Moderationsteam von r/privacytoolsIO vor Herausforderungen bei der Verwaltung des Subreddits. Das Subreddit wurde schon immer weitgehend unabhängig von der Entwicklung der Website betrieben, aber BurungHantu war auch der Hauptmoderator des Subreddits, und er war der einzige Moderator, der über die "volle Kontrolle" verfügte. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit verlangt, dass Subreddits aktive Moderatoren haben. Wenn der Hauptmoderator über einen längeren Zeitraum (z. B. ein Jahr) inaktiv ist, kann der Posten des Hauptmoderators an den nächsten Moderator in der Reihe vergeben werden. Damit diesem Antrag stattgegeben werden konnte, musste BurungHantu über einen längeren Zeitraum hinweg vollständig von allen Reddit-Aktivitäten abwesend sein, was seinem Verhalten auf anderen Plattformen entsprach. > Wenn du als Moderator aus einem Subreddit über eine Reddit-Anfrage entfernt wurdest, liegt das daran, dass deine mangelnde Reaktion und fehlende Aktivität das Subreddit für eine r/redditrequest-Übertragung qualifiziert hat. > -> r/redditrequest ist Reddits Methode, um sicherzustellen, dass Communities aktive Moderatoren haben, und ist Teil des [Verhaltenskodex für Moderatoren](https://www.redditinc.com/de-de/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginn des Übergangs -Am 14. September 2021 [kündigten](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) wir den Beginn unserer Migration zu dieser neuen Domain an: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] wir hielten es für notwendig, diese Umstellung lieber früher als später vorzunehmen, um sicherzustellen, dass die Menschen so früh wie möglich von der Umstellung erfuhren. Dies verschafft uns ausreichend Zeit für die Umstellung des Domainnamens, der derzeit auf www.privacyguides.org umgeleitet wird, und gibt hoffentlich allen genügend Zeit, die Änderung zu bemerken und Lesezeichen, Webseiten usw. zu aktualisieren. -Diese Änderung [erforderte:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Die Umleitung von www.privacytools.io auf [www.privacyguides.org](https://www.privacyguides.org). - Die Archivierung des Source Codes auf GitHub, um unsere bisherige Arbeit und den Issue Tracker zu bewahren, den wir für die zukünftige Entwicklung dieser Seite monatelang weiter nutzten. @@ -63,11 +63,11 @@ Die Dinge schienen reibungslos zu verlaufen, und die meisten unserer aktiven Mit ## Die folgenden Ereignisse -Etwa eine Woche nach der Umstellung war BurungHantu zum ersten Mal seit fast einem Jahr wieder online, aber niemand in unserem Team war bereit, wegen seiner bisherigen Unzuverlässigkeit zu PrivacyTools zurückzukehren. Anstatt sich für seine lange Abwesenheit zu entschuldigen, ging er sofort in die Offensive und stellte den Übergang zu Privacy Guides als einen Angriff auf ihn und sein Projekt dar. Er [löschte](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) daraufhin viele Beiträge, in denen die Community darauf hinwies, dass er abwesend sei und das Projekt aufgegeben habe. +Etwa eine Woche nach der Umstellung war BurungHantu zum ersten Mal seit fast einem Jahr wieder online, aber niemand in unserem Team war bereit, wegen seiner bisherigen Unzuverlässigkeit zu PrivacyTools zurückzukehren. Anstatt sich für seine lange Abwesenheit zu entschuldigen, ging er sofort in die Offensive und stellte den Übergang zu Privacy Guides als einen Angriff auf ihn und sein Projekt dar. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. Zu diesem Zeitpunkt behauptete BurungHantu, er wolle allein an privacytools.io weiterarbeiten und bat uns, die Weiterleitung von www.privacytools.io auf [www.privacyguides.org](https://www.privacyguides.org)zu entfernen. Wir haben uns dazu bereit erklärt und ihn gebeten, die Subdomains für Matrix, Mastodon und PeerTube zumindest für ein paar Monate als öffentlichen Service für unsere Community aktiv zu halten, damit die Nutzer dieser Plattformen problemlos auf andere Accounts umsteigen können. Aufgrund des föderalen Charakters der von uns angebotenen Dienste waren diese an bestimmte Domainnamen gebunden, was eine Migration sehr schwierig (und in einigen Fällen unmöglich) machte. -Unglücklicherweise wurde die Kontrolle über das Subreddit r/privacytoolsIO nicht an BurungHantu zurückgegeben (weitere Informationen weiter unten), so dass die Subdomains Anfang Oktober [abgeschaltet](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) wurden und alle Nutzer, die diese Dienste noch nutzen, nicht mehr migrieren konnten. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Daraufhin erhob BurungHantu falsche Anschuldigungen, wonach Jonah Spendengelder für das Projekt gestohlen haben soll. BurungHantu hatte mehr als ein Jahr Zeit, den angeblichen Vorfall zu melden, und dennoch hat er erst nach der Migration von Privacy Guides jemanden darauf aufmerksam gemacht. BurungHantu wurde vom Team und [der Community](https://twitter.com/TommyTran732/status/1526153536962281474) wiederholt um Beweise und eine Stellungnahme zu den Gründen für sein Schweigen gebeten, doch er hat sich nicht dazu geäußert. @@ -77,11 +77,11 @@ BurungHantu veröffentlichte zudem einen [Twitter-Beitrag](https://twitter.com/p Seit dem 25. September 2022 sehen wir, wie die Pläne von BurungHantu auf privacytools.io in die Tat umgesetzt werden, und das ist der Grund, warum wir uns entschieden haben, heute diese Erklärungsseite zu erstellen. Bei der von ihm betriebenen Webseite scheint es sich um eine stark SEO-optimierte Version der Website zu handeln, auf der Tools gegen eine finanzielle Vergütung empfohlen werden. Vor kurzem wurden IVPN und Mullvad, zwei VPN-Anbieter, die von der Datenschutz-Community nahezu universell [empfohlen](../vpn.md) werden und sich durch ihre Ablehnung von Partnerprogrammen auszeichnen, von PrivacyTools entfernt. An ihrer Stelle? NordVPN, Surfshark, ExpressVPN und hide.me: Riesige VPN-Unternehmen mit unseriösen Plattformen und Geschäftspraktiken, berüchtigt für ihr aggressives Marketing und ihre Partnerprogramme. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Diejenigen von uns, die tatsächlich für den Schutz der Privatsphäre kämpfen, kämpfen nicht gegeneinander und holen sich ihre Ratschläge nicht vom Meistbietenden. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Diejenigen von uns, die tatsächlich für den Schutz der Privatsphäre kämpfen, kämpfen nicht gegeneinander und holen sich ihre Ratschläge nicht vom Meistbietenden. ## r/privacytoolsIO heute -Nach dem Start von [r/PrivacyGuides](https://www.reddit.com/r/privacyguides) war es für u/trai_dep unpraktisch, weiterhin beide Subreddits zu moderieren. Da die Community mit der Umstellung einverstanden war, wurde r/privacytoolsIO in einem Beitrag am 1. November 2021 zu einem [eingeschränkten Subreddit](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/): +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] Das Wachstum dieses Subreddits war das Ergebnis großer Anstrengungen, die das Team von PrivacyGuides.org über mehrere Jahre hinweg unternommen hat. Und jedem einzelnen von euch. > @@ -89,7 +89,7 @@ Nach dem Start von [r/PrivacyGuides](https://www.reddit.com/r/privacyguides) war Subreddits gehören niemandem, und sie gehören vor allem nicht den Markeninhabern. Sie gehören zu ihren Communities, und die Community und ihre Moderatoren haben die Entscheidung getroffen, den Umzug zu r/PrivacyGuides zu unterstützen. -In den Monaten seither hat BurungHantu gedroht und darum gebettelt, die Kontrolle über das Subreddit wieder an seinen Account zurückzugeben, was gegen die Reddit-Regeln [verstößt](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/): +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Vergeltungsmaßnahmen seitens eines Moderators im Zusammenhang mit Entfernungsanträgen sind unzulässig. @@ -107,12 +107,12 @@ Daher gehören die OpenCollective-Gelder Privacy Guides, sie wurden unserem Proj Dieses Thema wurde in unseren Communities an verschiedenen Stellen ausgiebig diskutiert, und es ist wahrscheinlich, dass die meisten, die diese Seite lesen, bereits mit den Ereignissen vertraut sind, die zum Wechsel zu Privacy Guides geführt haben. Einige unserer früheren Beiträge zu diesem Thema enthalten möglicherweise zusätzliche Details, die wir hier der Kürze halber weggelassen haben. Der Vollständigkeit halber sind sie unten verlinkt. -- [28. Juni 2021 Antrag auf Übernahme von r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [27. Juli 2021 Ankündigung unserer Umzugsabsichten auf dem PrivacyTools-Blog, geschrieben vom Team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [13. September 2021 Ankündigung des Beginns unseres Übergangs zu Privacy Guides auf r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [28. Juni 2021 Antrag auf Übernahme von r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [27. Juli 2021 Ankündigung unserer Umzugsabsichten auf dem PrivacyTools-Blog, geschrieben vom Team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [13. September 2021 Ankündigung des Beginns unseres Übergangs zu Privacy Guides auf r/privacytoolsIO](https://reddit.com/pnql46) - [17. September 2021 Ankündigung auf OpenCollective von Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [30. September 2021 Twitter-Thread mit den meisten der jetzt auf dieser Seite beschriebenen Ereignisse](https://twitter.com/privacy_guides/status/1443633412800225280) -- [1. Oktober 2021 Beitrag von u/dng99 mit Hinweis auf Subdomainfehler](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [2. April 2022 Antwort von u/dng99 auf PrivacyTools' vorwurfsvollen Blogbeitrag](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [1. Oktober 2021 Beitrag von u/dng99 mit Hinweis auf Subdomainfehler](https://reddit.com/comments/pymthv/comment/hexwrps) +- [2. April 2022 Antwort von u/dng99 auf PrivacyTools' vorwurfsvollen Blogbeitrag](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [16. Mai 2022 Antwort von @TommyTran732 auf Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [3. September 2022 Beitrag im Techlore-Forum von @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/de/advanced/communication-network-types.md b/i18n/de/advanced/communication-network-types.md index b65ff69f..b6f8547e 100644 --- a/i18n/de/advanced/communication-network-types.md +++ b/i18n/de/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/de/advanced/dns-overview.md b/i18n/de/advanced/dns-overview.md index 73bf99d3..8d68693b 100644 --- a/i18n/de/advanced/dns-overview.md +++ b/i18n/de/advanced/dns-overview.md @@ -18,7 +18,7 @@ Im Folgenden erörtern wir, was ein außenstehender Beobachter mit Hilfe von nor ### Unverschlüsselter DNS -1. Mit [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (Teil des [Wireshark](https://de.wikipedia.org/wiki/Wireshark)-Projekts) können wir den Internet-Paketfluss überwachen und aufzeichnen. Dieser Befehl zeichnet Pakete auf, die den angegebenen Regeln entsprechen: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. Dieser Befehl zeichnet Pakete auf, die den angegebenen Regeln entsprechen: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Im Folgenden erörtern wir, was ein außenstehender Beobachter mit Hilfe von nor nslookup privacyguides.org 8.8.8.8 ``` -3. Als Nächstes wollen wir die Ergebnisse [analysieren](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs): +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Verschlüsseltes DNS kann sich auf eine Reihe von Protokollen beziehen, von dene ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/de/advanced/payments.md b/i18n/de/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/de/advanced/payments.md +++ b/i18n/de/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/de/advanced/tor-overview.md b/i18n/de/advanced/tor-overview.md index 8a6ab1ce..cc7a2fad 100644 --- a/i18n/de/advanced/tor-overview.md +++ b/i18n/de/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/de/android.md b/i18n/de/android.md index 6a650455..2f79dd91 100644 --- a/i18n/de/android.md +++ b/i18n/de/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,7 +113,7 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/de/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/de/assets/img/how-tor-works/tor-encryption-dark.svg index 4002190d..0f1e0716 100644 --- a/i18n/de/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/de/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Dein - - Gerät - - - - Übermittlung von Daten an eine Website - - - - - Daten von einer Website empfangen - - - - - Dein - - Gerät - - - - Eingang - - - - - Mitte - - - - - Ausgang - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Eingang - - - - - Mitte - - - - - Ausgang - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/de/assets/img/how-tor-works/tor-encryption.svg b/i18n/de/assets/img/how-tor-works/tor-encryption.svg index 2a0a68c5..f954fb0f 100644 --- a/i18n/de/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/de/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Dein - - Gerät - - - - Übermittlung von Daten an eine Website - - - - - Daten von einer Website empfangen - - - - - Dein - - Gerät - - - - Eingang - - - - - Mitte - - - - - Ausgang - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Eingang - - - - - Mitte - - - - - Ausgang - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/de/assets/img/how-tor-works/tor-path-dark.svg b/i18n/de/assets/img/how-tor-works/tor-path-dark.svg index 0c97d473..9268ba68 100644 --- a/i18n/de/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/de/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Dein - Gerät - - - - Eingang - - - - - Mitte - - - - - Ausgang - - - - - PrivacyGuides.org - - - - - - - - + + + + Dein + Gerät + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/de/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/de/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index 94677568..ce51beee 100644 --- a/i18n/de/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/de/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Dein - - - Gerät - - - - - - Wächter - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Eingang - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/de/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/de/assets/img/how-tor-works/tor-path-hidden-service.svg index 75563343..8d008447 100644 --- a/i18n/de/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/de/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Dein - - - Gerät - - - - - - Wächter - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Eingang - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/de/assets/img/how-tor-works/tor-path.svg b/i18n/de/assets/img/how-tor-works/tor-path.svg index 07ea0dad..48380042 100644 --- a/i18n/de/assets/img/how-tor-works/tor-path.svg +++ b/i18n/de/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + @@ -25,7 +25,7 @@ Dein - Gerät + Gerät diff --git a/i18n/de/basics/account-deletion.md b/i18n/de/basics/account-deletion.md index cd89ea6f..857a57d8 100644 --- a/i18n/de/basics/account-deletion.md +++ b/i18n/de/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/de/basics/common-misconceptions.md b/i18n/de/basics/common-misconceptions.md index 74650997..5aeaae95 100644 --- a/i18n/de/basics/common-misconceptions.md +++ b/i18n/de/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/de/basics/common-threats.md b/i18n/de/basics/common-threats.md index 30cbdd92..0d71db43 100644 --- a/i18n/de/basics/common-threats.md +++ b/i18n/de/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacy From Service Providers @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/de/basics/email-security.md b/i18n/de/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/de/basics/email-security.md +++ b/i18n/de/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/de/basics/multi-factor-authentication.md b/i18n/de/basics/multi-factor-authentication.md index 6aa21122..1cf3c9b4 100644 --- a/i18n/de/basics/multi-factor-authentication.md +++ b/i18n/de/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/de/basics/passwords-overview.md b/i18n/de/basics/passwords-overview.md index d814fc19..acb5cfbd 100644 --- a/i18n/de/basics/passwords-overview.md +++ b/i18n/de/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/de/basics/vpn-overview.md b/i18n/de/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/de/basics/vpn-overview.md +++ b/i18n/de/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/de/basics/why-privacy-matters.md b/i18n/de/basics/why-privacy-matters.md index 4e2c137c..f2dce114 100644 --- a/i18n/de/basics/why-privacy-matters.md +++ b/i18n/de/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/de/calendar.md b/i18n/de/calendar.md index fd26697b..8390538c 100644 --- a/i18n/de/calendar.md +++ b/i18n/de/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/de/cloud.md b/i18n/de/cloud.md index 34b98b3d..166e2dd6 100644 --- a/i18n/de/cloud.md +++ b/i18n/de/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/de/cryptocurrency.md b/i18n/de/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/de/cryptocurrency.md +++ b/i18n/de/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/de/data-redaction.md b/i18n/de/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/de/data-redaction.md +++ b/i18n/de/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/de/desktop-browsers.md b/i18n/de/desktop-browsers.md index 4103b888..9696f291 100644 --- a/i18n/de/desktop-browsers.md +++ b/i18n/de/desktop-browsers.md @@ -70,8 +70,8 @@ Wenn du anonym im Internet surfen möchtest, solltest du stattdessen [Tor](tor.m **Mullvad Browser** ist eine Version des [Tor Browsers](tor.md#tor-browser), bei der die Tor-Netzwerk-Integration entfernt wurde, um VPN-Nutzern die Anti-Fingerprinting-Technologien vom Tor Browser zur Verfügung zu stellen. Es wird vom Tor-Projekt entwickelt, von [Mullvad](vpn.md#mullvad) vertrieben, erfordert aber **nicht** die Verwendung von Mullvads VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ Wenn du anonym im Internet surfen möchtest, solltest du stattdessen [Tor](tor.m -Wie der [Tor Browser](tor.md) ist Mullvad Browser so konzipiert, dass er Fingerprinting verhindert, indem er deinen Browser-Fingerabdruck mit dem aller anderen Mullvad Browser-Benutzer identisch macht. Außerdem wird er mit Starndard-Einstellungen und -Erweiterungen ausgeliefert, die automatisch an die drei vorkonfigurierten Sicherheitsstufen angepasst werden: *Standard*, *Sicherer* und *Am Sichersten*. Daher ist es zwingend erforderlich, dass Sie den Browser in keiner Weise verändern, abgesehen von der Anpassung der [Standard-Sicherheitsstufen](https://tb-manual.torproject.org/security-settings/). Andere Änderungen würden Ihren Fingerabdruck einzigartig machen und damit den Zweck dieses Browsers zunichtemachen. Wenn du deinen Browser stärker konfigurieren möchtest und Fingerprinting für dich kein Thema ist, empfehlen wir stattdessen [Firefox](#firefox). +Wie der [Tor Browser](tor.md) ist Mullvad Browser so konzipiert, dass er Fingerprinting verhindert, indem er deinen Browser-Fingerabdruck mit dem aller anderen Mullvad Browser-Benutzer identisch macht. Außerdem wird er mit Starndard-Einstellungen und -Erweiterungen ausgeliefert, die automatisch an die drei vorkonfigurierten Sicherheitsstufen angepasst werden: *Standard*, *Sicherer* und *Am Sichersten*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Andere Änderungen würden Ihren Fingerabdruck einzigartig machen und damit den Zweck dieses Browsers zunichtemachen. Wenn du deinen Browser stärker konfigurieren möchtest und Fingerprinting für dich kein Thema ist, empfehlen wir stattdessen [Firefox](#firefox). ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser wird mit DuckDuckGo als Standard [Suchmaschine](search-engines.m **Firefox** bietet starke Datenschutzeinstellungen wie [Enhanced Tracking Protection](https://support.mozilla.org/de/kb/verbesserter-schutz-aktivitatenverfolgung-desktop), mit denen verschiedene [Arten von Tracking](https://support.mozilla.org/de/kb/verbesserter-schutz-aktivitatenverfolgung-desktop#w_welche-elemente-blockiert-der-verbesserte-schutz-vor-aktivitatenverfolgung) blockiert werden können. [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser wird mit DuckDuckGo als Standard [Suchmaschine](search-engines.m

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Dies schützt dich, indem Social-Media-Tracker, Fingerprinting-Skripte (beachte, ##### Firefox Suggest (nur US) -[Firefox Suggest](https://support.mozilla.org/de/kb/anpassung-der-einstellungen-von-firefox-suggest) ist eine Funktion, die den Suchvorschlägen ähnelt und nur in den USA verfügbar ist. Wir empfehlen das Deaktivieren aus demselben Grund, aus dem wir die Deaktivierung von Suchvorschlägen empfehlen. Wenn du diese Optionen im Abschnitt **Adressleiste** nicht siehst, ist dieses neue Feature bei dir noch nicht verfügbar, du kannst die beschriebenen Änderungen also ignorieren. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. Wir empfehlen das Deaktivieren aus demselben Grund, aus dem wir die Deaktivierung von Suchvorschlägen empfehlen. Wenn du diese Optionen im Abschnitt **Adressleiste** nicht siehst, ist dieses neue Feature bei dir noch nicht verfügbar, du kannst die beschriebenen Änderungen also ignorieren. - [ ] Deaktiviere **Vorschläge aus dem Internet** - [ ] Deaktiviere **Vorschläge aus dem Internet** @@ -183,7 +183,7 @@ Dies schützt dich vor dauerhaften Cookies, aber nicht vor Cookies, die während > Firefox sendet Daten über deine Firefox-Version und -Sprache, das Betriebssystem und die Hardware-Konfiguration deines Geräts, den Arbeitsspeicher, grundlegende Informationen über Abstürze und Fehler sowie die Ergebnisse automatisierter Prozesse wie Updates, Safebrowsing und Aktivierung an Mozilla. Wenn Firefox Daten an Mozilla sendet, wird deine IP-Adresse vorübergehend als Teil von Mozillas Serverprotokollen erfasst. -Zusätzlich sammelt der Firefox-Konten-Dienst [einige technische Daten](https://www.mozilla.org/de/privacy/firefox/#firefox-konten). Wenn du ein Firefox-Konto verwendest, kannst du dich abmelden: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). Wenn du ein Firefox-Konto verwendest, kannst du dich abmelden: 1. Öffnen deine [Profileinstellungen auf accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Deaktiviere **Datenerfassung und -nutzung** > **Helfen Sie, Firefox-Konten zu verbessern** @@ -204,7 +204,7 @@ Maximaler Schutz erzwingt die Verwendung von DNS über HTTPS, und es wird eine S #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) ermöglicht den Zugriff auf deine Browsing-Daten (Verlauf, Lesezeichen usw.) auf all deinen Geräten und schützt dich mit E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (fortgeschritten) @@ -215,7 +215,7 @@ Maximaler Schutz erzwingt die Verwendung von DNS über HTTPS, und es wird eine S -Das [Arkenfox-Projekt](https://github.com/arkenfox/user.js) bietet eine Reihe von sorgfältig durchdachten Optionen für Firefox. Wenn du dich [für Arkenfox entscheidest](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not), sind einige [Optionen](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) subjektiv streng und/oder können dazu führen, dass einige Websites nicht richtig funktionieren - diese kannst du deinen Bedürfnissen entsprechend [ändern](https://github.com/arkenfox/user.js/wiki/3.1-Overrides). Wir **empfehlen nachdrücklich** das vollständige [Wiki](https://github.com/arkenfox/user.js/wiki) zu lesen. Arkenfox ermöglicht auch die Unterstützung von [Containern](https://support.mozilla.org/de/kb/firefox-tab-container). +Das [Arkenfox-Projekt](https://github.com/arkenfox/user.js) bietet eine Reihe von sorgfältig durchdachten Optionen für Firefox. Wenn du dich [für Arkenfox entscheidest](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not), sind einige [Optionen](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) subjektiv streng und/oder können dazu führen, dass einige Websites nicht richtig funktionieren - diese kannst du deinen Bedürfnissen entsprechend [ändern](https://github.com/arkenfox/user.js/wiki/3.1-Overrides). Wir **empfehlen nachdrücklich** das vollständige [Wiki](https://github.com/arkenfox/user.js/wiki) zu lesen. Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox zielt nur darauf ab, einfache oder naive Tracking-Skripte durch Canvas-Randomisierung und die in Firefox integrierten Konfigurationseinstellungen für Fingerabdruck-Resistenz zu vereiteln. Er zielt nicht darauf ab, deinen Browser mit einer großen Menge anderer Arkenfox-Benutzer zu verschmelzen, wie es der Mullvad-Browser oder der Tor-Browser tun, was die einzige Möglichkeit ist, fortgeschrittene Skripte zur Verfolgung von Fingerabdrücken zu vereiteln. Denke daran, dass du immer noch mehrere Browser verwenden kannst. Du könntest z. B. Firefox+Arkenfox für einige Websites verwenden, bei denen du eingeloggt bleiben möchtest, oder denen du vertraust, und Mullvad Browser für das allgemeine Surfen. @@ -223,25 +223,25 @@ Arkenfox zielt nur darauf ab, einfache oder naive Tracking-Skripte durch Canvas-
-![Brave-Logo](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** enthält einen eingebauten Inhaltsblocker und [Datenschutzfunktionen](https://brave.com/privacy-features/), von denen viele standardmäßig aktiviert sind. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave basiert auf dem Chromium-Webbrowser-Projekt, sollte sich also vertraut anfühlen und nur minimale Probleme mit der Website-Kompatibilität haben. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ Diese Optionen sind unter :material-menu: → **Einstellungen** zu finden. ##### Shields -Brave bietet einige Anti-Fingerprinting-Maßnamen in seinem [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-)-Feature. Wir empfehlen, diese Optionen [global](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) für alle Seiten, die du besuchst, zu konfigurieren. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Die Optionen von Shields können je nach Bedarf für jede Website heruntergestuft werden, aber als Standardeinstellung empfehlen wir Folgendes: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave
-1. Diese Option bietet eine ähnliche Funktionalität wie die erweiterten Blockierungsmodi von uBlock Origin [](https://github.com/gorhill/uBlock/wiki/Blocking-mode) oder die Erweiterung [NoScript](https://noscript.net/). +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privatsphäre und Sicherheit
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave ist **nicht** so resistent gegen Fingerabdrücke wie der Tor-Browser. Außerdem nutzen viel weniger Leute Brave zusammen mit Tor, du wirst also auffallen. Wenn [starke Anonymität erforderlich ist](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-), verwende den [Tor Browser](tor.md#tor-browser). +1. Brave ist **nicht** so resistent gegen Fingerabdrücke wie der Tor-Browser. Außerdem nutzen viel weniger Leute Brave zusammen mit Tor, du wirst also auffallen. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Die Web3-Funktionen von Brave können deinen Browser-Fingerabdruck und deine Ang #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) ermöglicht den Zugriff auf deine Browsing-Daten (Verlauf, Lesezeichen usw.) auf all deinen Geräten und schützt dich mit E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards und Wallet @@ -371,7 +371,7 @@ Generell raten wir dir, möglichst wenig Erweiterungen zu verwenden; diese haben
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ Wir arbeiten aktuell daran, Kriterien für jeden Bereich unserer Webseite festzu - Verfügbar für Linux, macOS und Windows. - Alle Änderungen, die erforderlich sind, um den Browser datenschutzfreundlicher zu machen, sollten die Benutzerfreundlichkeit nicht beeinträchtigen. - Blockiert standardmäßig Cookies von Drittanbietern. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Im besten Fall Unsere Best-Case-Kriterien stellen dar, was wir uns von einem perfekten Projekt in dieser Kategorie wünschen würden. Unsere Empfehlungen enthalten möglicherweise keine oder nicht alle dieser Funktionen, aber diejenigen, die sie enthalten, werden auf dieser Seite möglicherweise höher eingestuft als jene, die sie nicht enthalten. - Enthält eine integrierte Funktion zum Sperren von Inhalten. -- Unterstützt die Aufteilung von Cookies (à la [Multi-Account Containers](https://support.mozilla.org/de/kb/firefox-tab-container)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. Dies kann Vorteile gegenüber der Installation von Electron-basierten Anwendungen haben, da Sie von den regelmäßigen Sicherheitsupdates Ihres Browsers profitieren. - Enthält keine Zusatzfunktionen (Bloatware), die die Privatsphäre der Benutzer nicht beeinträchtigen. - Erfasst standardmäßig keine Telemetrie. @@ -462,4 +462,4 @@ Unsere Best-Case-Kriterien stellen dar, was wir uns von einem perfekten Projekt - Muss sich direkt auf die Privatsphäre der Nutzer auswirken, d. h. es dürfen nicht einfach nur Informationen geliefert werden. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/de/desktop.md b/i18n/de/desktop.md index 5252084a..1fac706b 100644 --- a/i18n/de/desktop.md +++ b/i18n/de/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/de/device-integrity.md b/i18n/de/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/de/device-integrity.md +++ b/i18n/de/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/de/dns.md b/i18n/de/dns.md index e15a3e6d..f82c8982 100644 --- a/i18n/de/dns.md +++ b/i18n/de/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## Empfohlene DNS-Anbieter -| DNS-Anbieter | Datenschutzerklärung | Protokolle | Logging | ECS | Filter | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | ----------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Die verwendete Filterliste findest du hier. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Klartext
DoH/3
DoT | Some[^2] | Nein | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Klartext
DoH/3
DoT
DoQ | Optional[^3] | Nein | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | Nein[^4] | Nein | Based on personal configuration. Die verwendete Filterliste findest du hier. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Klartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Klartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | +| DNS-Anbieter | Datenschutzerklärung | Protokolle | Logging | ECS | Filter | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | ----------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Die verwendete Filterliste findest du hier. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Klartext
DoH/3
DoT | Some[^2] | Nein | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Klartext
DoH/3
DoT
DoQ | Optional[^3] | Nein | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | Nein[^4] | Nein | Based on personal configuration. Die verwendete Filterliste findest du hier. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Klartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Klartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ Nach der Installation eines Konfigurationsprofils oder einer Anwendung, die die #### Signierte Profile -Apple bietet keine native Schnittstelle zur Erstellung von Profilen mit verschlüsseltem DNS. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) ist ein inoffizielles Tool zur Erstellung eigener Profile mit verschlüsseltem DNS, diese sind jedoch nicht signiert. Signierte Profile sind zu bevorzugen; das Signieren bestätigt die Herkunft eines Profils und trägt dazu bei, die Integrität der Profile zu gewährleisten. Signierte Konfigurationsprofile erhalten ein grünes "Verifiziert"-Label. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple bietet keine native Schnittstelle zur Erstellung von Profilen mit verschlüsseltem DNS. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) ist ein inoffizielles Tool zur Erstellung eigener Profile mit verschlüsseltem DNS, diese sind jedoch nicht signiert. Signierte Profile sind zu bevorzugen; das Signieren bestätigt die Herkunft eines Profils und trägt dazu bei, die Integrität der Profile zu gewährleisten. Signierte Konfigurationsprofile erhalten ein grünes "Verifiziert"-Label. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Verschlüsseltes DNS-Proxy-Software bietet einen lokalen Proxy, an den der [unve [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ Eine selbst gehostete DNS-Lösung ist nützlich für die Filterung auf kontrolli ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** ist ein Open-Source [DNS-Sinkhole](https://de.wikipedia.org/wiki/DNS-Sinkhole), das [DNS-Filterung](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) verwendet, um unerwünschte Webinhalte wie Werbung zu blockieren. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home bietet eine ausgefeilte Weboberfläche, über die Einblicke erhalten und blockierte Inhalte verwalten werden können. @@ -144,13 +144,13 @@ AdGuard Home bietet eine ausgefeilte Weboberfläche, über die Einblicke erhalte ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** ist ein Open-Source [DNS-Sinkhole](https://de.wikipedia.org/wiki/DNS-Sinkhole), das [DNS-Filterung](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) verwendet, um unerwünschte Webinhalte wie Werbung zu blockieren. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole ist für den Betrieb auf einem Raspberry Pi konzipiert, ist aber nicht auf diese Hardware beschränkt. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -159,8 +159,8 @@ Pi-hole ist für den Betrieb auf einem Raspberry Pi konzipiert, ist aber nicht a
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/de/email-clients.md b/i18n/de/email-clients.md index 8b4e60c0..8db5bc08 100644 --- a/i18n/de/email-clients.md +++ b/i18n/de/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/de/email.md b/i18n/de/email.md index 3d359578..3b89f3fc 100644 --- a/i18n/de/email.md +++ b/i18n/de/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail hat interne Absturzberichte, die sie **nicht** mit Dritten teilen. D #### :material-check:{ .pg-green } Eigene Domains und Aliase -Nutzer eines kostenpflichtigen Proton Mail Tarifs können ihre eigene Domain oder eine [Catch-All](https://proton.me/support/catch-all) Adresse nutzen. Proton Mail unterstützt auch [Unteradressierung](https://proton.me/support/creating-aliases), dieses ist für Leute nützlich, die keine Domain kaufen möchten. +Nutzer eines kostenpflichtigen Proton Mail Tarifs können ihre eigene Domain oder eine [Catch-All](https://proton.me/support/catch-all) Adresse nutzen. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Diskrete Zahlungsmöglichkeiten @@ -129,7 +129,7 @@ Proton Mail bietet keine Funktion für deinen digitalen Nachlass. #### :material-check:{ .pg-green } Eigene Domains und Aliase -Bei Mailbox.org kannst du deine eigene Domain verwenden, und sie unterstützen [Catch-All](https://kb.mailbox.org/de/privat/e-mail-mit-eigener-domain/eine-eigene-domain-mit-catch-all-benutzen) Adressen. Mailbox.org unterstützt auch die [Subadressierung/Aliasse](https://kb.mailbox.org/de/privat/e-mail-artikel/was-sind-aliasse-und-wie-nutze-ich-sie), was hilfreich ist, wenn du keine Domain kaufen möchtest. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Diskrete Zahlungsmöglichkeiten @@ -137,17 +137,17 @@ Mailbox.org akzeptiert keine Kryptowährungen, da deren Zahlungsanbieter BitPay #### :material-check:{ .pg-green } Kontosicherheit -Mailbox.org unterstützt [Zwei-Faktor-Authentifizierung](https://kb.mailbox.org/de/privat/sicherheit-privatsphaere-artikel/die-zwei-faktor-authentifizierung-einrichten) nur für Webmail. Du kannst entweder TOTP oder einen [YubiKey](https://de.wikipedia.org/wiki/Yubikey) über die [YubiCloud](https://www.yubico.com/products/services-software/yubicloud)verwenden. Webstandards wie [WebAuthn](https://de.wikipedia.org/wiki/WebAuthn) werden noch nicht unterstützt. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Webstandards wie [WebAuthn](https://de.wikipedia.org/wiki/WebAuthn) werden noch nicht unterstützt. #### :material-information-outline:{ .pg-blue } Datensicherheit -Mailbox.org ermöglicht die Verschlüsselung eingehender E-Mails mit ihrem [verschlüsselten Postfach](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). Neue eingehende Nachrichten werden dann sofort mit deinem öffentlichen Schlüssel verschlüsselt. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). Neue eingehende Nachrichten werden dann sofort mit deinem öffentlichen Schlüssel verschlüsselt. -Allerdings unterstützt [Open-Exchange](https://de.wikipedia.org/wiki/Open-Xchange), die von Mailbox.org verwendete Softwareplattform, [nicht](https://kb.mailbox.org/de/business/sicherheit-privatsphaere-artikel/sind-kalender-und-adressbuch-verschluesselt) die Verschlüsselung deines Adressbuchs und Kalenders. Eine [eigenständige Lösung](calendar.md) könnte für diese Informationen besser geeignet sein. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. Eine [eigenständige Lösung](calendar.md) könnte für diese Informationen besser geeignet sein. #### :material-check:{ .pg-green } E-Mail-Verschlüsselung -Mailbox.org hat [eine Verschlüsselung](https://kb.mailbox.org/de/privat/verschluesselung-mit-mailbox-org-guard/verschluesselte-nachrichten-versenden) in ihr Webmail integriert, die den Versand von Nachrichten an Personen mit öffentlichen OpenPGP-Schlüsseln vereinfacht. Sie ermöglichen auch [Empfängern, die kein Mailbox.org Konto besitzen, eine E-Mail auf den Servern von Mailbox.org zu entschlüsseln](https://kb.mailbox.org/de/privat/verschluesselung-mit-mailbox-org-guard/verschluesselte-nachrichten-versenden#VerschluesselteNachrichtenversenden-Waspassiert,wennderEmpf%C3%A4ngerkeinPGPnutzt?). Diese Funktion ist nützlich, wenn der Empfänger OpenPGP nicht nutzt und daher eine Kopie der E-Mail in seinem eigenen Postfach nicht entschlüsseln kann. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. Diese Funktion ist nützlich, wenn der Empfänger OpenPGP nicht nutzt und daher eine Kopie der E-Mail in seinem eigenen Postfach nicht entschlüsseln kann. Mailbox.org unterstützt auch die Suche nach öffentlichen Schlüsseln über HTTP von ihrem [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). Dies ermöglicht es Personen, die Mailbox.org nicht verwenden, die OpenPGP-Schlüssel von Mailbox.org-Konten für anbieterübergreifende E2EE leicht zu finden. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Ihr Konto wird bei Vertragsende auf ein eingeschränktes Benutzerkonto umgestell #### :material-information-outline:{ .pg-blue } Zusätzliche Funktionen -Du kannst auf dein Mailbox.org-Konto über IMAP/SMTP zugreifen, indem du den [.onion-Dienst](https://kb.mailbox.org/de/privat/sicherheit-privatsphaere-artikel/den-tor-exit-node-von-mailbox-org-verwenden) nutzt. Auf die Webmail-Schnittstelle kann jedoch nicht über den .onion-Dienst zugegriffen werden und es können TLS-Zertifikatsfehler auftreten. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). Auf die Webmail-Schnittstelle kann jedoch nicht über den .onion-Dienst zugegriffen werden und es können TLS-Zertifikatsfehler auftreten. -Alle Konten verfügen über einen begrenzten Cloud-Speicher, der [verschlüsselt werden kann](https://kb.mailbox.org/de/privat/datei-cloud-mailbox-org-drive/verschluesselung-im-drive). Mailbox.org bietet auch den Alias [@secure.mailbox.org](https://kb.mailbox.org/de/privat/e-mail-artikel/e-mails-definitiv-sicher-versenden) an, der die TLS-Verschlüsselung der Verbindung zwischen den Mailservern erzwingt, da die Nachricht sonst gar nicht gesendet wird. Mailbox.org unterstützt neben den Standardzugriffsprotokollen wie IMAP und POP3 auch [Exchange ActiveSync](https://de.wikipedia.org/wiki/Exchange_ActiveSync). +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org unterstützt neben den Standardzugriffsprotokollen wie IMAP und POP3 auch [Exchange ActiveSync](https://de.wikipedia.org/wiki/Exchange_ActiveSync). Mailbox.org bietet für alle Tarife eine digitale Hinterlassenschaft an. Du kannst wählen, ob deine Daten an die Erben weitergegeben werden sollen, sofern diese einen Antrag stellen und dein Testament vorlegen. Alternativ kannst du auch eine Person mit Namen und Adresse benennen. @@ -185,18 +185,18 @@ Diese Anbieter speichern deine E-Mails mit Zero-Knowledge-Verschlüsselung und s [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Eigene Domains und Aliase -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Zahlungsmöglichkeiten @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). Dadurch wird sichergestellt, dass der Kundenkontakt zum Unternehmen über E2EE erfolgt. Das Feature kostet 240 €/Jahr. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). Dadurch wird sichergestellt, dass der Kundenkontakt zum Unternehmen über E2EE erfolgt. Das Feature kostet 240 €/Jahr. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Mit **addy.io** können sie gratis 10 verschiedene Aliase auf einem geteilten Do - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-Mit dem gratis-Plan ist die Anzahl der geteilten Aliase (welche in einer geteilten Domäne, wie z.B. @addy.io, enden) auf 10 beschränkt. Für 1$ im Monat erhalten sie 50, und für 4$ im Monat unendlich viele (3$ pro Monat wenn sie jährlich zahlen). Sie können unendlich viele standard Aliase (welche in einer Domäne wie @[Nutzername].addy.io oder einer benutzerdefinierten Domäne mit Abo enden) erstellen, allerdings sind diese, wie schon gesagt, weniger anonym, da schon allein über den Domainnamen alle Aliase miteinander auf eine Person zurückgeführt werden können. Standard Aliase sind sinnvoll, wenn geteilte Domänen von einer Website geblockt werden. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +Mit dem gratis-Plan ist die Anzahl der geteilten Aliase (welche in einer geteilten Domäne, wie z.B. @addy.io, enden) auf 10 beschränkt. Für 1$ im Monat erhalten sie 50, und für 4$ im Monat unendlich viele (3$ pro Monat wenn sie jährlich zahlen). Sie können unendlich viele standard Aliase (welche in einer Domäne wie @[Nutzername].addy.io oder einer benutzerdefinierten Domäne mit Abo enden) erstellen, allerdings sind diese, wie schon gesagt, weniger anonym, da schon allein über den Domainnamen alle Aliase miteinander auf eine Person zurückgeführt werden können. Standard Aliase sind sinnvoll, wenn geteilte Domänen von einer Website geblockt werden. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Bemerkenswerte kostenlose Funktionen: @@ -310,8 +310,8 @@ Bemerkenswerte kostenlose Funktionen: **SimpleLogin** ist ein kostenloser Dienst, der E-Mail-Aliase für eine Vielzahl von gemeinsam genutzten Domänennamen bereitstellt und optional kostenpflichtige Funktionen wie unbegrenzte Aliase und benutzerdefinierte Domänen bietet. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Bemerkenswerte kostenlose Funktionen: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin wurde zum 8. April 2022 [von der Proton AG übernommen](https://proton.me/news/proton-and-simplelogin-join-forces). Wenn du Proton Mail für dein Hauptpostfach verwendest, ist SimpleLogin eine gute Wahl. Da beide Produkte nun demselben Unternehmen gehören, musst du nur noch einem einzigen Unternehmen vertrauen. Wir gehen außerdem davon aus, dass SimpleLogin in Zukunft enger mit den Angeboten von Proton integriert werden wird. SimpleLogin unterstützt weiterhin die Weiterleitung an einen E-Mail-Anbieter deiner Wahl. Securitum hat SimpleLogin Anfang 2022 [geprüft](https://simplelogin.io/blog/security-audit/) und alle Probleme [wurden behoben](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin wurde zum 8. April 2022 [von der Proton AG übernommen](https://proton.me/news/proton-and-simplelogin-join-forces). Wenn du Proton Mail für dein Hauptpostfach verwendest, ist SimpleLogin eine gute Wahl. Da beide Produkte nun demselben Unternehmen gehören, musst du nur noch einem einzigen Unternehmen vertrauen. Wir gehen außerdem davon aus, dass SimpleLogin in Zukunft enger mit den Angeboten von Proton integriert werden wird. SimpleLogin unterstützt weiterhin die Weiterleitung an einen E-Mail-Anbieter deiner Wahl. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). Du kannst dein SimpleLogin-Konto in den Einstellungen mit deinem Proton-Konto verknüpfen. Wenn du den Proton Unlimited, Business oder Visionary Tarif nutzt, erhältst du zusätzlich SimpleLogin Premium kostenlos dazu. @@ -352,9 +352,9 @@ Fortgeschrittene Systemadministratoren können die Einrichtung eines eigenen E-M **Mailcow** ist ein fortgeschrittener Mailserver, perfekt für diejenigen mit ein wenig mehr Linux-Erfahrung. Es vereinigt alles was du brauchst in einem Docker-Container: Einen Mailserver mit DKIM-Unterstützung, Virenschutz und Spam-Überwachung, Webmail und ActiveSync mit SOGo, sowie eine webbasierte Verwaltung mit 2FA-Unterstützung. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Dokumentation} -[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title=Datenschutz } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Mitwirken } +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Fortgeschrittene Systemadministratoren können die Einrichtung eines eigenen E-M Für einen eher manuellen Ansatz haben wir diese beiden Artikel herausgesucht: -- [Einrichten eines Mailservers mit OpenSMTPD, Dovecot und Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [Wie Sie Ihren eigenen Mailserver betreiben](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Kriterien @@ -386,7 +386,7 @@ Wir halten diese Merkmale für wichtig, um einen sicheren und optimalen Service **Mindestvoraussetzung um sich zu qualifizieren:** - Verschlüsselt die Daten von E-Mail-Konten im Ruhezustand mit Zero-Access-Verschlüsselung. -- Exportmöglichkeit als [Mbox](https://de.wikipedia.org/wiki/Mbox) oder individuelle .eml mit [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) Standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Erlaubt es dem Nutzer, seinen eigenen [Domainnamen](https://de.wikipedia.org/wiki/Domain_(Internet)) zu verwenden. Benutzerdefinierte Domänennamen sind für die Nutzer wichtig, da du so deine Identität von dem Dienst fernhalten kannst, falls dieser sich als schlecht erweist oder von einem anderen Unternehmen übernommen wird, bei dem der Datenschutz keine Rolle spielt. - Arbeitet auf einer eigenen Infrastruktur, d.h. nicht auf der eines Drittanbieters von E-Mail-Diensten. @@ -397,7 +397,7 @@ Wir halten diese Merkmale für wichtig, um einen sicheren und optimalen Service - Unterstützung für [WKD](https://wiki.gnupg.org/WKD), um die Suche nach öffentlichen OpenPGP-Schlüsseln über HTTP zu verbessern. GnuPG-Benutzer können einen Schlüssel erhalten, indem sie Folgendes eingeben: `gpg --locate-key beispiel_nutzer@example.com` - Unterstützung für eine temporäre Mailbox für externe Benutzer. Dies ist nützlich, wenn du eine verschlüsselte E-Mail versenden möchtest, ohne eine Kopie an den Empfänger zu senden. Diese E-Mails haben in der Regel eine begrenzte Lebensdauer und werden dann automatisch gelöscht. Sie erfordern auch nicht, dass der Empfänger eine Kryptographie wie OpenPGP konfiguriert. - Verfügbarkeit der Dienste des E-Mail-Anbieters über einen [onion service](https://de.wikipedia.org/wiki/.onion). -- [Unterstützung von Unteradressen](https://en.wikipedia.org/wiki/Email_address#Subaddressing). +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-All- oder Alias-Funktionalität für diejenigen, die ihre eigenen Domains besitzen. - Verwendung von Standard-E-Mail-Zugangsprotokollen wie IMAP, SMTP oder [JMAP](https://de.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standardzugriffsprotokolle stellen sicher, dass die Kunden alle ihre E-Mails problemlos herunterladen können, sollten sie zu einem anderen Anbieter wechseln wollen. @@ -425,13 +425,13 @@ Auf E-Mail-Servern werden viele sehr sensible Daten verarbeitet. Wir erwarten, d - Schutz von Webmail mit 2FA, wie TOTP. - Zero-Access-Verschlüsselung, baut auf Verschlüsselung im Ruhezustand auf. Der Anbieter verfügt nicht über die Entschlüsselungsschlüssel zu den Daten, die er besitzt. So wird verhindert, dass ein abtrünniger Mitarbeitender Daten preisgibt, auf die er/sie Zugriff hat, oder dass ein Angreifender Daten freigibt, die er/sie gestohlen hat, indem er/sie sich unbefugt Zugang zum Server verschafft. - [DNSSEC](https://de.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) Unterstützung. -- Keine TLS-Fehler oder -Schwachstellen beim Profiling durch Tools wie [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/)oder [Qualys SSL Labs](https://www.ssllabs.com/ssltest); dies schließt zertifikatsbezogene Fehler und schwache DH-Parameter ein, wie z. B. die, die zu [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)) führten. +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - Eine Server-Suite-Präferenz (optional bei TLSv1.3) für starke Cipher-Suites, die Forward Secrecy und authentifizierte Verschlüsselung unterstützen. - Eine gültige [MTA-STS](https://tools.ietf.org/html/rfc8461) und [TLS-RPT](https://tools.ietf.org/html/rfc8460) Richtlinie. - Gültige [DANE](https://de.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) Datensätze. - Gültige [SPF](https://de.wikipedia.org/wiki/Sender_Policy_Framework) und [DKIM](https://de.wikipedia.org/wiki/DomainKeys_Identified_Mail) Einträge. - Besitzen eines ordnungsgemäßen [DMARC](https://de.wikipedia.org/wiki/DMARC) Datensatzes und einer Richtlinie oder verwenden von [ARC](https://de.wikipedia.org/wiki/Authenticated_Received_Chain) für die Authentifizierung. Wenn die DMARC-Authentifizierung verwendet wird, muss die Richtlinie auf `reject` oder `quarantine` eingestellt sein. -- Eine bevorzugte Server-Suite mit TLS 1.2 oder höher und ein Plan für [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://de.wikipedia.org/wiki/SMTPS) Übermittlung, vorausgesetzt, SMTP wird verwendet. - Website-Sicherheitsstandards wie z. B.: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Auf E-Mail-Servern werden viele sehr sensible Daten verarbeitet. Wir erwarten, d - Bug-Bounty-Programme und/oder ein koordiniertes Verfahren zur Offenlegung von Sicherheitslücken. - Website-Sicherheitsstandards wie z. B.: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Vertrauen diff --git a/i18n/de/encryption.md b/i18n/de/encryption.md index d774167a..aa3ee158 100644 --- a/i18n/de/encryption.md +++ b/i18n/de/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/de/file-sharing.md b/i18n/de/file-sharing.md index d7cd5832..f6732765 100644 --- a/i18n/de/file-sharing.md +++ b/i18n/de/file-sharing.md @@ -15,7 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/de/financial-services.md b/i18n/de/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/de/financial-services.md +++ b/i18n/de/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/de/frontends.md b/i18n/de/frontends.md index 01d5ea76..1769b24a 100644 --- a/i18n/de/frontends.md +++ b/i18n/de/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/de/index.md b/i18n/de/index.md index 16dde68a..6118a0e5 100644 --- a/i18n/de/index.md +++ b/i18n/de/index.md @@ -62,12 +62,12 @@ Der Versuch, alle unsere Daten ständig vor allen zu schützen, ist unpraktisch, ## Wir brauchen dich! So kannst du mitmachen: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Trete unserem Forum bei" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Folge uns auf Mastodon" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Trage zu dieser Website bei" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Hilf diese Website zu Übersetze" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chatte mit uns auf Matrix" } -[:material-information-outline:](about/index.md){ title="Erfahre mehr über uns" } -[:material-hand-coin-outline:](about/donate.md){ title="Unterstütze das Projekt" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } Es ist wichtig, dass eine Website wie Privacy Guides immer auf dem neuesten Stand bleibt. Wir brauchen unser Publikum um Software-Updates für die auf unserer Website aufgeführten Anwendungen im Auge zu behalten und die neuesten Nachrichten über die von uns empfohlenen Anbieter zu verfolgen. Es ist schwer, mit der Schnelllebigkeit des Internets Schritt zu halten, aber wir versuchen unser Bestes. Solltest du einen Fehler entdecken, der Meinung sein, dass ein Anbieter nicht aufgelistet sein sollte, ein qualifizierter Anbieter fehlt, ein Browser-Plugin nicht mehr die beste Wahl ist oder du ein anderes Problem finden, lass es uns bitte wissen. diff --git a/i18n/de/kb-archive.md b/i18n/de/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/de/kb-archive.md +++ b/i18n/de/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/de/meta/admonitions.md b/i18n/de/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/de/meta/admonitions.md +++ b/i18n/de/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/de/meta/translations.md b/i18n/de/meta/translations.md index fc32d8e3..1e194cd3 100644 --- a/i18n/de/meta/translations.md +++ b/i18n/de/meta/translations.md @@ -2,9 +2,9 @@ title: Übersetzungen --- -Crowdin verfügt über eine gute Dokumentation, und wir empfehlen einen Blick in den Leitfaden [Erste Schritte](https://support.crowdin.com/crowdin-intro/) . Unsere Website ist größtenteils in [Markdown](https://de.wikipedia.org/wiki/Markdown) geschrieben, so dass es einfach sein sollte, etwas beizutragen. Diese Seite enthält einige hilfreiche Hinweise zur Übersetzung bestimmter Syntax, die dir auf unserer Website begegnen können. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Unsere Website ist größtenteils in [Markdown](https://de.wikipedia.org/wiki/Markdown) geschrieben, so dass es einfach sein sollte, etwas beizutragen. Diese Seite enthält einige hilfreiche Hinweise zur Übersetzung bestimmter Syntax, die dir auf unserer Website begegnen können. -Bitte tritt unserem Lokalisierungsraum auf Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) bei, wenn du weitere Fragen hast, und lies unseren [Ankündigungs-Blogpost](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) für weitere Informationen über das Projekt. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Bitte beachte, dass die englische Version der Website die primäre Version ist, d.h. Änderungen werden dort zuerst vorgenommen. Wenn du bemerkst, dass eine Sprache hinter der englischen Version liegt, hilf bitte mit. Wir können nicht für die Richtigkeit aller unserer Übersetzungen garantieren. Wenn du einen Vorschlag zu Inhalten hast, die speziell für deine Region gelten, öffne bitte ein Issue oder einen Pull Request in unserem [Main-Repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK Schreibsysteme neigen dazu, alternative "Vollbreite"-Varianten von gängigen - Links müssen reguläre Klammern verwenden, d. h. `(` (Linke Parenthese U+0028) und `)` (Rechte Parenthese U+0029) und nicht `(` (Linke Parenthese in voller Breite U+FF08) oder `)` (volle Breite der rechten Klammer U+FF09) - Eingerückter Text in Anführungszeichen muss `:` (Doppelpunkt U+003A) und nicht `:` (Doppelpunkt mit voller Breite U+FF1A) verwenden -- Bilder müssen `!` (Ausrufezeichen U+0021) und nicht `!` (Ausrufezeichen in voller Breite U+FF01) verwenden +- Bilder müssen `!` (Ausrufezeichen U+0021) und nicht `!` (Ausrufezeichen in voller Breite U+FF01) verwenden diff --git a/i18n/de/meta/uploading-images.md b/i18n/de/meta/uploading-images.md index 7babe638..66a58d9d 100644 --- a/i18n/de/meta/uploading-images.md +++ b/i18n/de/meta/uploading-images.md @@ -17,7 +17,7 @@ Firmenlogos haben eine Leinwandgröße von: ### PNG -Verwende [OptiPNG](https://sourceforge.net/projects/optipng/) um das PNG-Bild zu optimieren: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/de/meta/writing-style.md b/i18n/de/meta/writing-style.md index f289184b..6e585d2e 100644 --- a/i18n/de/meta/writing-style.md +++ b/i18n/de/meta/writing-style.md @@ -4,11 +4,11 @@ title: Schreibstil Privacy Guides ist in amerikanischem Englisch verfasst, und du solltest im Zweifelsfall die [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) zu Rate ziehen. -Im Allgemeinen bieten die [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) einen guten Überblick darüber, wie man klar und prägnant schreibt. Im Folgenden werden einige wichtige Punkte aus diesen Richtlinien hervorgehoben. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. Im Folgenden werden einige wichtige Punkte aus diesen Richtlinien hervorgehoben. ## Schreiben für unser Publikum -Die Privacy Guides [Zielgruppe](https://www.plainlanguage.gov/guidelines/audience/) besteht hauptsächlich aus durchschnittlichen, technikaffinen Erwachsenen. Vereinfache den Inhalt nicht zu sehr, als würdest du dich an eine Schulklasse wenden, aber verwende auch nicht zu viele komplizierte Begriffe für Konzepte, mit denen der durchschnittliche Computerbenutzer nicht vertraut ist. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Vereinfache den Inhalt nicht zu sehr, als würdest du dich an eine Schulklasse wenden, aber verwende auch nicht zu viele komplizierte Begriffe für Konzepte, mit denen der durchschnittliche Computerbenutzer nicht vertraut ist. ### Nur das ansprechen, was die Leute wissen wollen @@ -24,7 +24,7 @@ Wir schreiben *für* für eine Vielzahl von Menschen, aber wir schreiben *an* di > > Wenn du die Nutzer mit "Du" ansprichst, werden sie eher verstehen, was ihre Verantwortung ist. -Quelle: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Vermeide "Benutzer" @@ -37,7 +37,7 @@ Organisieren ist der Schlüssel. Inhalte sollten von den wichtigsten zu den am w - Beschränke das Dokument auf etwa fünf oder sechs Abschnitte. Lange Dokumente sollten wahrscheinlich in einzelne Seiten aufgeteilt werden. - Markiere wichtige Ideen mit **Fettschrift** oder *Kursivschrift*. -Quelle: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Mit einem thematischen Satz beginnen @@ -45,7 +45,7 @@ Quelle: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > Wir schreiben oft so, wie wir denken, indem wir zuerst unsere Prämissen und dann unsere Schlussfolgerung formulieren. Es mag die natürliche Art sein, Gedanken zu entwickeln, aber wir enden mit dem Themensatz am Ende des Absatzes. Setze es nach vorne und lass die Nutzer wissen, worauf du hinaus willst. Zwinge die Leser nicht, viele Informationen im Kopf zu behalten, bevor du auf den Punkt kommst. -Quelle: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Wähle deine Worte sorgfältig @@ -65,7 +65,7 @@ Wir sollten versuchen, Abkürzungen so weit wie möglich zu vermeiden, aber Tech > Unnötige Worte verschwenden die Zeit deines Publikums. Gutes Schreiben ist wie ein Gespräch. Lass Informationen weg, die das Publikum nicht wissen muss. Als Fachexperte kann dies schwierig sein, daher ist es wichtig, dass jemand die Informationen aus der Perspektive des Publikums betrachtet. -Quelle: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Texte konversationell halten @@ -77,7 +77,7 @@ Quelle: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Der Aktivsatz macht deutlich, wer was tun soll. Er beseitigt Unklarheiten über die Zuständigkeiten. Nicht "Es muss getan werden", sondern "Du musst es tun." -Quelle: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Verwendung von "muss" für Anforderungen diff --git a/i18n/de/mobile-browsers.md b/i18n/de/mobile-browsers.md index 2b3516aa..d8db8624 100644 --- a/i18n/de/mobile-browsers.md +++ b/i18n/de/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,22 +41,22 @@ Wir empfehlen aktuell diese mobilen Browser und Konfigurationen für normales bz ## Android -Unter Android ist Firefox immer noch weniger sicher als Chromium-basierte Alternativen: Mozillas Engine, [GeckoView](https://mozilla.github.io/geckoview/), hat noch keine Unterstützung für [Site Isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) oder muss noch [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196) aktivieren. +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave
-![Brave-Logo](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** enthält einen eingebauten Inhaltsblocker und [Datenschutzfunktionen](https://brave.com/privacy-features/), von denen viele standardmäßig aktiviert sind. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave basiert auf dem Chromium-Webbrowser-Projekt, sollte sich also vertraut anfühlen und nur minimale Probleme mit der Website-Kompatibilität haben. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ Diese Optionen findest du unter :material-menu: → **Einstellungen** → **Brav ##### Shields -Brave bietet einige Anti-Fingerprinting-Maßnamen in seinem [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-)-Feature. Wir empfehlen, diese Optionen [global](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) für alle Seiten, die du besuchst, zu konfigurieren. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave Shields' globale Standardeinstellungen @@ -100,7 +100,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Diese Option bietet eine ähnliche Funktionalität wie die erweiterten Blockierungsmodi von uBlock Origin [](https://github.com/gorhill/uBlock/wiki/Blocking-mode) oder die Erweiterung [NoScript](https://noscript.net/). +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Browserdaten löschen @@ -114,7 +114,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -128,7 +128,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) ermöglicht den Zugriff auf deine Browsing-Daten (Verlauf, Lesezeichen usw.) auf all deinen Geräten und schützt dich mit E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -140,10 +140,10 @@ Unter iOS [muss](https://developer.apple.com/app-store/review/guidelines) jede A ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** ist der Standard-Browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** ist der Standard-Browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Webseite](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Safari & Datenschutz" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -184,7 +184,7 @@ Der Datenschutzbericht ist über das Menü "Website-Einstellungen" zugänglich. - [ ] Disable **Privacy Preserving Ad Measurement** -Bei der Messung von Anzeigenklicks werden traditionell Tracking-Technologien eingesetzt, die die Privatsphäre der Nutzer verletzen. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) ist eine WebKit-Funktion und ein vorgeschlagener Webstandard, der es Werbetreibenden ermöglichen soll, die Effektivität von Web-Kampagnen zu messen, ohne die Privatsphäre der Nutzer zu gefährden. +Bei der Messung von Anzeigenklicks werden traditionell Tracking-Technologien eingesetzt, die die Privatsphäre der Nutzer verletzen. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. Die Funktion hat an sich wenig Datenschutzbedenken. Du kannst sie zwar aktiviert lassen, aber die Tatsache, dass sie beim Privaten Surfen automatisch deaktiviert wird, ist unserer Meinung nach ein Indikator für die Deaktivierung der Funktion. @@ -200,9 +200,9 @@ Beachte, dass Private Browsing keine Cookies und Website-Daten speichert, sodass ##### iCloud Sync -Die Synchronisierung von Safari-Verlauf, Tab-Gruppen, iCloud-Tabs und gespeicherten Kennwörtern erfolgt über E2EE. Standardmäßig sind die Lesezeichen jedoch [nicht](https://support.apple.com/en-us/HT202303) auf diese Weise geschützt. Apple kann sie entschlüsseln und in Übereinstimmung mit der [Datenschutzrichtlinie](https://www.apple.com/legal/privacy/en-ww/) darauf zugreifen. +Die Synchronisierung von Safari-Verlauf, Tab-Gruppen, iCloud-Tabs und gespeicherten Kennwörtern erfolgt über E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -226,7 +226,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/de/multi-factor-authentication.md b/i18n/de/multi-factor-authentication.md index 830c33c8..ee60af63 100644 --- a/i18n/de/multi-factor-authentication.md +++ b/i18n/de/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/de/news-aggregators.md b/i18n/de/news-aggregators.md index 17438718..00b22c26 100644 --- a/i18n/de/news-aggregators.md +++ b/i18n/de/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/de/notebooks.md b/i18n/de/notebooks.md index 2131e5e0..0eb1ebef 100644 --- a/i18n/de/notebooks.md +++ b/i18n/de/notebooks.md @@ -34,7 +34,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ If you are currently using an application like Evernote, Google Keep, or Microso Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/de/os/android-overview.md b/i18n/de/os/android-overview.md index 1ffa3cdc..f866b6cb 100644 --- a/i18n/de/os/android-overview.md +++ b/i18n/de/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/de/os/ios-overview.md b/i18n/de/os/ios-overview.md index e6ee4ff5..fa3d3bcf 100644 --- a/i18n/de/os/ios-overview.md +++ b/i18n/de/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/de/os/linux-overview.md b/i18n/de/os/linux-overview.md index 3641399b..363bc276 100644 --- a/i18n/de/os/linux-overview.md +++ b/i18n/de/os/linux-overview.md @@ -15,12 +15,12 @@ Auf unserer Website wird der Begriff "Linux" im Allgemeinen zur Beschreibung von Es gibt einige Datenschutzprobleme bei Linux, die Sie beachten sollten. Trotz dieser Nachteile sind Desktop-Linux-Distributionen immer noch großartig für die meisten Menschen, die: - Telemetrie vermeiden wollen, die oft mit proprietären Betriebssystemen einhergeht -- [Freie Software](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) bevorzugen -- Datenschutzfreundliche Systeme wie [Whonix](https://www.whonix.org) oder [Tails](https://tails.boum.org/) verwenden +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -Es ist ein [verbreiteter Irrglaube](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure), dass Linux und andere Open-Source-Software von Natur aus sicher ist, nur weil der Quellcode verfügbar ist. Es wird erwartet, dass eine regelmäßige Überprüfung durch die Community erfolgt, aber das ist nicht immer der Fall. +Es ist ein [verbreiteter Irrglaube](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure), dass Linux und andere Open-Source-Software von Natur aus sicher ist, nur weil der Quellcode verfügbar ist. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). Tatsächlich hängt die Sicherheit einer Distribution von einer Reihe von Faktoren ab, wie z. B. der Projektaktivität, der Erfahrung der Entwickler, der Sorgfalt, mit der Code-Reviews durchgeführt werden, und der Häufigkeit, mit der bestimmte Teile der Codebase überprüft werden, die möglicherweise jahrelang unangetastet bleiben. @@ -30,9 +30,9 @@ Zurzeit bleibt Desktop-Linux bei [bestimmten Sicherheitsfunktionen hinter Altern - **Verified Boot** unter Linux ist nicht so robust wie Alternativen wie Apples [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) oder Androids [Verified Boot](https://source.android.com/security/verifiedboot). Verified Boot verhindert anhaltende Manipulationen durch Malware und [evil maid-Angriffe](https://en.wikipedia.org/wiki/Evil_Maid_attack), ist aber selbst bei den [fortschrittlichsten Distributionen größtenteils noch nicht verfügbar](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Einige Distributionen wie Fedora und Tumbleweed verwenden es standardmäßig, und einige andere könnten dies in Zukunft tun, da sich X11 im ["hard maintenance mode"](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly) befindet. If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/de/os/macos-overview.md b/i18n/de/os/macos-overview.md index 5e50277f..822bfd40 100644 --- a/i18n/de/os/macos-overview.md +++ b/i18n/de/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Empfohlene Konfiguration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/de/os/qubes-overview.md b/i18n/de/os/qubes-overview.md index c76924d9..fcea270b 100644 --- a/i18n/de/os/qubes-overview.md +++ b/i18n/de/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/de/passwords.md b/i18n/de/passwords.md index da2b5d77..1514d105 100644 --- a/i18n/de/passwords.md +++ b/i18n/de/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/de/photo-management.md b/i18n/de/photo-management.md index a041bdcb..1bb46cae 100644 --- a/i18n/de/photo-management.md +++ b/i18n/de/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/de/productivity.md b/i18n/de/productivity.md index c63e28bb..1612e148 100644 --- a/i18n/de/productivity.md +++ b/i18n/de/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/de/real-time-communication.md b/i18n/de/real-time-communication.md index bb96b9c2..6a1f7de0 100644 --- a/i18n/de/real-time-communication.md +++ b/i18n/de/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/de/router.md b/i18n/de/router.md index 3c6bd9bb..e18c9de6 100644 --- a/i18n/de/router.md +++ b/i18n/de/router.md @@ -35,10 +35,10 @@ Sie können in der [table of hardware](https://openwrt.org/toh/start) von OpenWr **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense wird in der Regel als Perimeter-Firewall, Router, Wireless Access Point, DHCP-Server, DNS-Server und VPN-Endpunkt eingesetzt. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/de/search-engines.md b/i18n/de/search-engines.md index ecfc2408..b1892ece 100644 --- a/i18n/de/search-engines.md +++ b/i18n/de/search-engines.md @@ -10,7 +10,7 @@ Verwende eine Suchmaschine, die kein Werbeprofil auf Grundlage deiner Suchanfrag Die hier gegebenen Empfehlungen beruhen auf den Datenschutzbestimmungen der einzelnen Dienste. Es gibt **keine Garantie**, dass diese Datenschutzbestimmungen auch eingehalten werden. -Erwäge die Verwendung eines [VPN](vpn.md) oder [Tor](https://www.torproject.org/), wenn dein Bedrohungsmodell das Verbergen deiner IP-Adresse vor dem Suchanbieter erfordert. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,10 +24,10 @@ Brave Search verfügt über einzigartige Funktionen, wie etwa Diskussionen, die Wir emfehlen dir, [Anonyme Nutzungsstatistiken](https://search.brave.com/help/usage-metrics) zu deaktivieren, da sie standardmäßig aktiviert sind und in den Einstellungen deaktiviert werden können. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Datenschutzbestimmungen" } -[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Dokumentation} +[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation}
@@ -41,14 +41,14 @@ Brave Search hat seinen Sitz in den Vereinigten Staaten. Die [Datenschutzbestimm ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** ist eine der gängigeren Optionen für private Suchmaschinen. Zu den erwähnenswerten Suchfunktionen von DuckDuckGo gehören [Bangs](https://duckduckgo.com/bang) und zahlreiche [Sofortantworten](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). Die Suchmaschine stützt sich auf die kommerzielle Bing-API, um die meisten Ergebnisse zu liefern, nutzt aber auch zahlreiche [andere Quellen](https://help.duckduckgo.com/results/sources/) für Sofortantworten und andere nicht primäre Ergebnisse. +**DuckDuckGo** ist eine der gängigeren Optionen für private Suchmaschinen. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo ist die Standardsuchmaschine für den Tor-Browser und eine der wenigen verfügbaren Optionen für den Safari-Browser von Apple. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Datenschutzbestimmungen" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Dokumentation} +[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo ist die Standardsuchmaschine für den Tor-Browser und eine der wenige DuckDuckGo hat seinen Sitz in den Vereinigten Staaten. Ihre [Datenschutzbestimmungen](https://duckduckgo.com/privacy) besagen, dass sie deine Suchanfragen zum Zwecke der Produktverbesserung **protokollieren**, aber weder deine IP-Adresse noch andere personenbezogene Daten speichern. -DuckDuckGo bietet zwei [andere Versionen](https://help.duckduckgo.com/features/non-javascript/) ihrer Suchmaschine an, für die beide kein JavaScript benötigt wird. Allerdings fehlen diesen Versionen einige Funktionen. Diese Versionen können auch in Verbindung mit ihrer [Tor-Onion-Adresse](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) verwendet werden, indem man [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) oder [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) für die jeweilige Version anfügt. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. Allerdings fehlen diesen Versionen einige Funktionen. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo bietet zwei [andere Versionen](https://help.duckduckgo.com/features/n **SearXNG** ist eine quelloffene, selbstständig hostbare Metasuchmaschine, die die Ergebnisse anderer Suchmaschinen zusammenfasst, ohne selbst Informationen zu speichern. Es ist ein aktiv betreuter Fork von [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Öffentliche Instanzen"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ Wenn du eine SearXNG-Instanz verwendest, beachte unbedingt deren Datenschutzbest ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** ist eine private Suchmaschine, die dafür bekannt ist, dass sie Suchergebnisse von [Google und Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) liefert. Eine der einzigartigen Funktionen von Startpage ist die [Anonyme Ansicht](https://www.startpage.com/de/anonymous-view/), die sich bemüht, die Benutzeraktivitäten zu standardisieren, um eine eindeutige Identifizierung zu erschweren. Die Funktion kann nützlich sein, um [einige](https://support.startpage.com/hc/de/articles/4455540212116-Der-Anonyme-Ansicht-Proxy-Technische-Details) Netzwerk- und Browsereigenschaften zu verbergen. Anders als der Name vermuten lässt, sollte man sich jedoch nicht auf diese Funktion verlassen, um anonym zu bleiben. Wenn du Anonymität suchst, verwende stattdessen den [Tor Browser](tor.md#tor-browser). +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Anders als der Name vermuten lässt, sollte man sich jedoch nicht auf diese Funktion verlassen, um anonym zu bleiben. Wenn du Anonymität suchst, verwende stattdessen den [Tor Browser](tor.md#tor-browser). -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Datenschutzbestimmungen" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Dokumentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} @@ -104,9 +104,9 @@ Startpage beschränkt regelmäßig den Zugang zu seinem Dienst auf bestimmten IP -Startpage hat seinen Sitz in den Niederlanden. Laut ihren [Datenschutzbestimmungen](https://www.startpage.com/de/privacy-policy/) protokollieren sie Details wie das Betriebssystem, den Browsertyp und die Sprache. Sie protokollieren weder die IP-Adresse noch Suchanfragen oder andere personenbezogene Daten. +Startpage hat seinen Sitz in den Niederlanden. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. Sie protokollieren weder die IP-Adresse noch Suchanfragen oder andere personenbezogene Daten. -Der Mehrheitsaktionär von Startpage ist System1, ein Werbeunternehmen. Wir glauben nicht, dass dies ein Problem ist, da sie gesonderte Datenschutzbestimmungen haben. Das Privacy Guides Team hat sich bereits [im Jahr 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) an Startpage gewandt, um etwaige Bedenken hinsichtlich der beträchtlichen Investition von System1 in den Dienst auszuräumen. Wir waren mit den Antworten, die wir erhielten, zufrieden. +Der Mehrheitsaktionär von Startpage ist System1, ein Werbeunternehmen. Wir glauben nicht, dass dies ein Problem ist, da sie gesonderte Datenschutzbestimmungen haben. The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. Wir waren mit den Antworten, die wir erhielten, zufrieden. ## Kriterien diff --git a/i18n/de/tools.md b/i18n/de/tools.md index 8cb27db8..21e7f9d3 100644 --- a/i18n/de/tools.md +++ b/i18n/de/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Learn more :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/de/tor.md b/i18n/de/tor.md index 9a97bafc..1d849464 100644 --- a/i18n/de/tor.md +++ b/i18n/de/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://de.wikipedia.org/wiki/Tor_(Netzwerk) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: Das **Tor** Netzwerk besteht aus von freiwillig betriebenen Servern, die es ermöglichen, kostenlos die eigene Privatsphäre und Sicherheit im Internet zu verbessern. Einzelpersonen und Organisationen können auch Informationen über das Tor-Netzwerk mit ".onion versteckten Diensten" austauschen, ohne ihre Privatsphäre zu gefährden. Da der Tor-Verkehr schwer zu blockieren und zurückzuverfolgen ist, ist Tor ein effektives Werkzeug zur Zensur Umgehung. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor funktioniert, indem es deinen Internetverkehr über diese von Freiwilligen betriebenen Server leitet, anstatt eine direkte Verbindung zu der Website herzustellen, die du besuchen willst. Dadurch wird verschleiert, woher der Datenverkehr kommt, und kein Server im Verbindungspfad ist in der Lage, den vollständigen Pfad zu sehen, woher der Datenverkehr kommt und wohin er geht, was bedeutet, dass selbst die Server, die du für die Verbindung verwendest, deiner Anonymität nichts anhaben können. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** ist die richtige Wahl, wenn du Anonymität brauchst, denn er bietet dir Zugang zum Tor-Netzwerk und zu den Brücken. Er enthält Standardeinstellungen und Erweiterungen, die automatisch durch die Standard-Sicherheitsstufen konfiguriert werden: *Standard*, *Sicherer* und *Am Sichersten*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ Du solltest **niemals** zusätzliche Erweiterungen für den Tor-Browser installi -Der Tor-Browser wurde entwickelt, um Fingerprinting zu verhindern, oder um dich anhand deiner Browserkonfiguration zu identifizieren. Daher ist es zwingend erforderlich, dass du den Browser in **keiner Weise**veränderst, abgesehen von der Anpassung der [Standard-Sicherheitsstufen](https://tb-manual.torproject.org/security-settings/). +Der Tor-Browser wurde entwickelt, um Fingerprinting zu verhindern, oder um dich anhand deiner Browserkonfiguration zu identifizieren. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** ist ein kostenloser Tor-VPN für Smartphones, das den Datenverkehr von jeder App auf deinem Gerät durch das Tor-Netzwerk leitet. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) @@ -134,7 +134,7 @@ Alle Versionen sind mit der gleichen Signatur versehen, sodass sie miteinander k ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ Alle Versionen sind mit der gleichen Signatur versehen, sodass sie miteinander k Menschen, die zensiert werden, können Snowflake-Proxys benutzen, um sich mit dem Tor-Netzwerk zu verbinden. Snowflake ist eine großartige Möglichkeit, zum Netzwerk beizutragen, auch wenn du nicht das technische Know-how hast, um einen Tor-Relay oder eine Bridge zu betreiben. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake erhöht in keiner Weise deine Privatsphäre und wird auch nicht für d Der Betrieb eines Snowflake-Proxys ist risikoarm, sogar risikoärmer als der Betrieb eines Tor-Relays oder einer Tor-Bridge, die ohnehin keine besonders riskanten Unternehmungen sind. Dennoch wird der Datenverkehr durch dein Netzwerk geleitet, was gewisse Auswirkungen haben kann, insbesondere wenn dein Netzwerk eine begrenzte Bandbreite hat. Vergewissere dich, dass du verstehst, [wie Snowflake funktioniert](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home), bevor du dich für die Verwendung eines Proxys entscheidest. -[^1]: Die `IsolateDestAddr` Einstellung wird auf der [Tor Mailingliste](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) und [Whonix's Stream Isolation Dokumentation](https://www.whonix.org/wiki/Stream_Isolation)diskutiert, wo beide Projekte darauf hinweisen, dass es für die meisten Leute kein guter Ansatz ist. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/de/vpn.md b/i18n/de/vpn.md index 5a98c63e..6b6fac30 100644 --- a/i18n/de/vpn.md +++ b/i18n/de/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. Wenn du auf der Suche nach zusätzlicher **Sicherheit** bist, solltest du immer sicherstellen, dass du eine Verbindung zu Websites über HTTPS herstellst. Ein VPN ist kein Ersatz für gute Sicherheitspraktiken. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Die von uns empfohlenen Anbieter verwenden Verschlüsselung, akzeptieren Monero, **Proton VPN** ist ein starker Anwärter im VPN-Bereich und ist seit 2016 in Betrieb. Die Proton AG hat ihren Sitz in der Schweiz und bietet sowohl eine begrenzte kostenlose als auch eine umfangreichere Premium-Option an. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ Wir sind außerdem der Meinung, dass es für die Sicherheit der privaten Schlüs #### :material-check:{ .pg-green } Unabhängig geprüft -Im Januar 2020 hat sich Proton VPN einem unabhängigen Audit durch SEC Consult unterzogen. SEC Consult fand einige Sicherheitslücken mit mittlerem und niedrigem Risiko in den Windows-, Android- und iOS-Anwendungen von Proton VPN, die alle von Proton VPN vor der Veröffentlichung der Berichte "ordnungsgemäß behoben" wurden. Keines der festgestellten Probleme hätte angreifenden Fernzugriff auf dein Gerät oder deinen Datenverkehr ermöglicht. Du kannst individuelle Berichte für jede Plattform unter [protonvpn.com](https://protonvpn.com/blog/open-source/) einsehen. Im April 2022 unterzog sich Proton VPN [einem weiteren Audit](https://protonvpn.com/blog/no-logs-audit/) und der Bericht [ wurde von Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf)erstellt. Eine [Bescheinigung](https://proton.me/blog/security-audit-all-proton-apps) wurde am 9. November 2021 von [Securitum](https://research.securitum.com)für die Apps von Proton VPN ausgestellt. +Im Januar 2020 hat sich Proton VPN einem unabhängigen Audit durch SEC Consult unterzogen. SEC Consult fand einige Sicherheitslücken mit mittlerem und niedrigem Risiko in den Windows-, Android- und iOS-Anwendungen von Proton VPN, die alle von Proton VPN vor der Veröffentlichung der Berichte "ordnungsgemäß behoben" wurden. Keines der festgestellten Probleme hätte angreifenden Fernzugriff auf dein Gerät oder deinen Datenverkehr ermöglicht. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). Eine [Bescheinigung](https://proton.me/blog/security-audit-all-proton-apps) wurde am 9. November 2021 von [Securitum](https://research.securitum.com)für die Apps von Proton VPN ausgestellt. #### :material-check:{ .pg-green } Open-Source Anwendungen @@ -84,31 +84,31 @@ Proton VPN akzeptiert nicht nur Kredit-/Debitkarten, PayPal und [Bitcoin](advanc #### :material-check:{ .pg-green } WireGuard-Unterstützung -Proton VPN unterstützt hauptsächlich das WireGuard®-Protokoll. [WireGuard](https://www.wireguard.com) ist ein neueres Protokoll, das modernste [Kryptographie](https://www.wireguard.com/protocol/) verwendet. Darüber hinaus zielt WireGuard darauf ab, einfacher und leistungsfähiger zu sein. +Proton VPN unterstützt hauptsächlich das WireGuard®-Protokoll. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Darüber hinaus zielt WireGuard darauf ab, einfacher und leistungsfähiger zu sein. -Proton VPN [empfiehlt](https://protonvpn.com/blog/wireguard/) die Verwendung von WireGuard mit ihrem Dienst. In den Windows-, macOS-, iOS-, Android-, ChromeOS- und Android TV-Apps von Proton VPN ist WireGuard das Standardprotokoll; die Linux-App von Proton VPN [unterstützt](https://protonvpn.com/support/how-to-change-vpn-protocols/) das Protokoll jedoch nicht. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Portweiterleitung -Proton VPN unterstützt derzeit nur vorrübergehende [Remote-Port-Weiterleitung](https://protonvpn.com/support/port-forwarding/) über NAT-PMP, mit 60 Sekunden Bestandszeit. Die Windows-App bietet eine leicht zugängliche Option dafür, während Sie auf anderen Betriebssystemen Ihren eigenen [NAT-PMP-Klient](https://protonvpn.com/support/port-forwarding-manual-setup/)ausführen müssen. Torrent-Anwendungen unterstützen oft NAT-PMP von Haus aus. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent-Anwendungen unterstützen oft NAT-PMP von Haus aus. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Anwendungen -Zusätzlich zu den Standard-OpenVPN-Konfigurationsdateien bietet Proton VPN mobile Apps für [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US)und [GitHub](https://github.com/ProtonVPN/android-app/releases) an, die eine einfache Verbindung zu ihren Servern ermöglichen. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Zusätzliche Funktionalität -Proton VPN Clients unterstützen Zwei-Faktor-Authentifizierung auf allen Plattformen außer Linux. Proton VPN hat eigene Server und Rechenzentren in der Schweiz, Island und Schweden. They offer content blocking and known-malware blocking with their DNS service. Darüber hinaus bietet Proton VPN auch "Tor"-Server an, die es dir ermöglichen, sich problemlos mit Onion-Seiten zu verbinden. Wir empfehlen jedoch dringend, zu diesem Zweck [den offiziellen Tor-Browser](https://www.torproject.org/) zu verwenden. +Proton VPN Clients unterstützen Zwei-Faktor-Authentifizierung auf allen Plattformen außer Linux. Proton VPN hat eigene Server und Rechenzentren in der Schweiz, Island und Schweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch-Funktion ist auf Intel-basierten Macs defekt -Systemabstürze [können](https://protonvpn.com/support/macos-t2-chip-kill-switch/) auf Intel-basierten Macs auftreten, wenn der VPN-Killswitch verwendet wird. Wenn du diese Funktion benötigst und einen Mac mit Intel-Chipsatz verwendest, solltest du einen anderen VPN-Dienst nutzen. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. Wenn du diese Funktion benötigst und einen Mac mit Intel-Chipsatz verwendest, solltest du einen anderen VPN-Dienst nutzen. ### IVPN @@ -118,9 +118,9 @@ Systemabstürze [können](https://protonvpn.com/support/macos-t2-chip-kill-switc **IVPN** ist ein weiterer Premium-VPN-Anbieter und ist seit 2009 aktiv. IVPN hat den Sitz in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ Systemabstürze [können](https://protonvpn.com/support/macos-t2-chip-kill-switc - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ Systemabstürze [können](https://protonvpn.com/support/macos-t2-chip-kill-switc #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Der Grund dafür ist eine kürzere Route (weniger Sprünge) zum Ziel. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Der Grund dafür ist eine kürzere Route (weniger Sprünge) zum Ziel. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ Wir sind außerdem der Meinung, dass es für die Sicherheit der privaten Schlüs #### :material-check:{ .pg-green } Unabhängig geprüft -IVPN hat sich einem [No-Logging-Audit von Cure53](https://cure53.de/audit-report_ivpn.pdf) unterzogen, das die Behauptung von IVPN, dass kein Logging stattfindet, bestätigte. IVPN hat auch einen [umfassenden Pentestbericht von Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) vom Januar 2020. IVPN hat außerdem angekündigt, dass es in Zukunft [Jahresberichte](https://www.ivpn.net/blog/independent-security-audit-concluded) geben wird. Eine weitere Überprüfung wurde [im April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) durchgeführt und von Cure53 [auf deren Website](https://cure53.de/pentest-report_IVPN_2022.pdf) veröffentlicht. +IVPN hat sich einem [No-Logging-Audit von Cure53](https://cure53.de/audit-report_ivpn.pdf) unterzogen, das die Behauptung von IVPN, dass kein Logging stattfindet, bestätigte. IVPN hat auch einen [umfassenden Pentestbericht von Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) vom Januar 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Anwendungen -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Der Quellcode kann von ihrer [GitHub Organisation](https://github.com/ivpn) bezogen werden. +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Der Quellcode kann von ihrer [GitHub Organisation](https://github.com/ivpn) bezogen werden. #### :material-check:{ .pg-green } Akzeptiert Bargeld und Monero @@ -160,25 +160,25 @@ Neben Kredit-/Debitkarten und PayPal akzeptiert IVPN auch Bitcoin, **Monero** un #### :material-check:{ .pg-green } WireGuard-Unterstützung -IVPN unterstützt das WireGuard®-Protokoll. [WireGuard](https://www.wireguard.com) ist ein neueres Protokoll, das modernste [Kryptographie](https://www.wireguard.com/protocol/) verwendet. Darüber hinaus zielt WireGuard darauf ab, einfacher und leistungsfähiger zu sein. +IVPN unterstützt das WireGuard®-Protokoll. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Darüber hinaus zielt WireGuard darauf ab, einfacher und leistungsfähiger zu sein. -IVPN [empfiehlt](https://www.ivpn.net/wireguard/) die Verwendung von WireGuard mit seinem Service, daher ist das Protokoll die Standardeinstellung für alle IVPN-Apps. IVPN bietet auch einen WireGuard-Konfigurationsgenerator zur Verwendung mit den [offiziellen WireGuard-Apps](https://www.wireguard.com/install/) an. +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Portweiterleitung -IVPN unterstützte früher die Portweiterleitung, entfernte diese Option aber im [Juni 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Das Fehlen dieser Funktion könnte sich negativ auf bestimmte Anwendungen auswirken, insbesondere auf Peer-to-Peer-Anwendungen wie Torrent-Clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Das Fehlen dieser Funktion könnte sich negativ auf bestimmte Anwendungen auswirken, insbesondere auf Peer-to-Peer-Anwendungen wie Torrent-Clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Anwendungen -Zusätzlich zu den Standard-OpenVPN-Konfigurationsdateien bietet IVPN mobile Clients für [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client)und [GitHub](https://github.com/ivpn/android-app/releases) an, die eine einfache Verbindung zu ihren Servern ermöglichen. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Zusätzliche Funktionalität -IVPN-Clients unterstützen Zwei-Faktor-Authentifizierung (die Clients von Mullvad nicht). IVPN bietet auch die Funktion "[AntiTracker](https://www.ivpn.net/antitracker)", die Werbenetzwerke und Tracker auf der Netzwerkebene blockiert. +IVPN-Clients unterstützen Zwei-Faktor-Authentifizierung (die Clients von Mullvad nicht). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN-Clients unterstützen Zwei-Faktor-Authentifizierung (die Clients von Mullva [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN-Clients unterstützen Zwei-Faktor-Authentifizierung (die Clients von Mullva #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Der Grund dafür ist eine kürzere Route (weniger Sprünge) zum Ziel. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Der Grund dafür ist eine kürzere Route (weniger Sprünge) zum Ziel. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Die VPN-Clients von Mullvad wurden von Cure53 und Assured AB in einem Pentestber > Cure53 und Assured AB sind mit den Ergebnissen des Audits zufrieden und die Software hinterlässt einen insgesamt positiven Eindruck. Dank des Engagements des internen Teams von Mullvad VPN haben die Tester keine Zweifel daran, dass das Projekt in puncto Sicherheit auf dem richtigen Weg ist. -Im Jahr 2020 wurde ein zweites Audit [angekündigt](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) und der [Abschlussbericht](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) wurde auf der Webseite von Cure53 veröffentlicht: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > Die Ergebnisse dieses Mai-Juni 2020-Projekts, das auf den Mullvad-Komplex abzielt, sind recht positiv. [...] Das Gesamte von Mullvad verwendete Anwendungsökosystem hinterlässt einen soliden und strukturierten Eindruck. Die Gesamtstruktur der Anwendung macht es einfach, Patches und Korrekturen auf strukturierte Weise auszuführen. Die von Cure53 festgestellten Ergebnisse zeigen vor allem, wie wichtig es ist, die aktuellen Leckvektoren ständig zu überprüfen und neu zu bewerten, um die Privatsphäre der Endnutzer stets zu gewährleisten. In diesem Sinne leistet Mullvad gute Arbeit beim Schutz des Endbenutzers vor allgemeinen PII-Lecks und datenschutzbezogenen Risiken. -Im Jahr 2021 wurde ein Infrastruktur-Audit [angekündigt](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) und der [Abschlussbericht](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) wurde auf der Webseite von Cure53 veröffentlicht. Ein weiterer Bericht wurde [im Juni 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) in Auftrag gegeben und ist auf der [Webseite von Assured](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf)verfügbar. +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Anwendungen @@ -239,17 +239,17 @@ Mullvad akzeptiert nicht nur Kredit-/Debitkarten und PayPal, sondern auch Bitcoi #### :material-check:{ .pg-green } WireGuard-Unterstützung -Mullvad unterstützt das WireGuard®-Protokoll. [WireGuard](https://www.wireguard.com) ist ein neueres Protokoll, das modernste [Kryptographie](https://www.wireguard.com/protocol/) verwendet. Darüber hinaus zielt WireGuard darauf ab, einfacher und leistungsfähiger zu sein. +Mullvad unterstützt das WireGuard®-Protokoll. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Darüber hinaus zielt WireGuard darauf ab, einfacher und leistungsfähiger zu sein. -Mullvad [empfiehlt](https://mullvad.net/en/help/why-wireguard/) die Verwendung von WireGuard mit ihrem Dienst. Es ist das Standardprotokoll oder das einzige Protokoll in den Android-, iOS-, macOS- und Linux-Apps von Mullvad, aber unter Windows musst du WireGuard [manuell aktivieren](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/). Mullvad bietet auch einen WireGuard-Konfigurationsgenerator zur Verwendung mit den offiziellen [WireGuard-Apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6-Unterstützung -Mit Mullvad kannst du [auf Dienste zugreifen, die mit IPv6 gehostet werden](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), im Gegensatz zu anderen Anbietern, die IPv6-Verbindungen blockieren. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Portweiterleitung -Mullvad unterstützte früher Portweiterleitung, entfernte diese Möglichkeit aber in [Mai 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Das Fehlen dieser Funktion könnte sich negativ auf bestimmte Anwendungen auswirken, insbesondere auf Peer-to-Peer-Anwendungen wie Torrent-Clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Das Fehlen dieser Funktion könnte sich negativ auf bestimmte Anwendungen auswirken, insbesondere auf Peer-to-Peer-Anwendungen wie Torrent-Clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Anwendungen -Mullvad hat [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) und [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) Clients veröffentlicht, die beide eine einfach zu bedienende Benutzeroberfläche haben, anstatt dass du deine WireGuard-Verbindung manuell konfigurieren musst. Der Android-Client ist auch auf [GitHub](https://github.com/mullvad/mullvadvpn-app/releases) verfügbar. +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. Der Android-Client ist auch auf [GitHub](https://github.com/mullvad/mullvadvpn-app/releases) verfügbar. #### :material-information-outline:{ .pg-blue } Zusätzliche Funktionalität -Mullvad ist sehr transparent darüber, welche Netzwerk-Knotenpunkte sie [besitzen oder mieten](https://mullvad.net/en/servers/). Sie verwenden [ShadowSocks](https://shadowsocks.org/) in ihrer ShadowSocks + OpenVPN-Konfiguration, was sie resistenter gegen Firewalls mit [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) macht, die versuchen, VPNs zu blockieren. Angeblich muss [China eine andere Methode verwenden, um ShadowSocks-Server zu blockieren](https://github.com/net4people/bbs/issues/22). Die Website von Mullvad ist auch über Tor zugänglich: [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Angeblich muss [China eine andere Methode verwenden, um ShadowSocks-Server zu blockieren](https://github.com/net4people/bbs/issues/22). Die Website von Mullvad ist auch über Tor zugänglich: [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Kriterien diff --git a/i18n/el/CODE_OF_CONDUCT.md b/i18n/el/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/el/CODE_OF_CONDUCT.md +++ b/i18n/el/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/el/about/index.md b/i18n/el/about/index.md index 9c3a0d47..618957d5 100644 --- a/i18n/el/about/index.md +++ b/i18n/el/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/el/about/notices.md b/i18n/el/about/notices.md index d948a76a..0ef0e6f8 100644 --- a/i18n/el/about/notices.md +++ b/i18n/el/about/notices.md @@ -29,7 +29,7 @@ This does not include third-party code embedded in this repository, or code wher This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* +We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ You must not conduct any systematic or automated data collection activities on o --- -*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/el/about/privacytools.md b/i18n/el/about/privacytools.md index 512ebb93..0c889f62 100644 --- a/i18n/el/about/privacytools.md +++ b/i18n/el/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/el/advanced/communication-network-types.md b/i18n/el/advanced/communication-network-types.md index 1f07a2c4..f6444ca4 100644 --- a/i18n/el/advanced/communication-network-types.md +++ b/i18n/el/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/el/advanced/dns-overview.md b/i18n/el/advanced/dns-overview.md index 21889d85..2ffb67b2 100644 --- a/i18n/el/advanced/dns-overview.md +++ b/i18n/el/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/el/advanced/payments.md b/i18n/el/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/el/advanced/payments.md +++ b/i18n/el/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/el/advanced/tor-overview.md b/i18n/el/advanced/tor-overview.md index 8a6ab1ce..cc7a2fad 100644 --- a/i18n/el/advanced/tor-overview.md +++ b/i18n/el/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/el/android.md b/i18n/el/android.md index 6a650455..2f79dd91 100644 --- a/i18n/el/android.md +++ b/i18n/el/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,7 +113,7 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/el/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/el/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/el/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/el/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/el/assets/img/how-tor-works/tor-encryption.svg b/i18n/el/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/el/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/el/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/el/assets/img/how-tor-works/tor-path-dark.svg b/i18n/el/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/el/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/el/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/el/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/el/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/el/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/el/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/el/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/el/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/el/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/el/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/el/assets/img/how-tor-works/tor-path.svg b/i18n/el/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/el/assets/img/how-tor-works/tor-path.svg +++ b/i18n/el/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/el/basics/account-deletion.md b/i18n/el/basics/account-deletion.md index cd89ea6f..857a57d8 100644 --- a/i18n/el/basics/account-deletion.md +++ b/i18n/el/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/el/basics/common-misconceptions.md b/i18n/el/basics/common-misconceptions.md index 19b5a881..120add09 100644 --- a/i18n/el/basics/common-misconceptions.md +++ b/i18n/el/basics/common-misconceptions.md @@ -88,7 +88,7 @@ We don't suggest using a VPN or Tor for any of these things, as your identity is 2. **Άγνωστη ταυτότητα** - Μια άγνωστη ταυτότητα θα μπορούσε να είναι ένα σταθερό ψευδώνυμο, που χρησιμοποιείτε τακτικά. Δεν είναι ανώνυμο, διότι δεν αλλάζει. Αν είστε μέλος μιας διαδικτυακής κοινότητας, ίσως είναι σκόπιμο να διατηρείτε μια persona, την οποία γνωρίζουν οι άλλοι. Αυτό το ψευδώνυμο δεν είναι ανώνυμο, διότι, αν παρακολουθείται για αρκετό χρονικό διάστημα, λεπτομέρειες σχετικά με τον ιδιοκτήτη μπορούν να αποκαλύψουν περαιτέρω πληροφορίες, όπως ο τρόπος που γράφει, οι γενικές γνώσεις του για θέματα, που τον ενδιαφέρουν κ. λ. π. -Ίσως, είναι εύλογο να χρησιμοποιήσετε ένα VPN γι' αυτό, προκειμένου να αποκρύψετε τη διεύθυνση IP σας. Οι οικονομικές συναλλαγές είναι πιο δύσκολο να συγκαλυφθούν: Θα μπορούσατε να εξετάσετε τη χρήση ανώνυμων κρυπτονομισμάτων, όπως το [Monero](https://www.getmonero.org/). Η χρήση altcoin shifting μπορεί επίσης να σας βοηθήσει, να αποκρύψετε την προέλευση των νομισμάτων σας. Συνήθως, τα ανταλλακτήρια απαιτούν την ολοκλήρωση του KYC (know your customer), προτού σας επιτρέψουν να ανταλλάξετε παραστατικό χρήμα( fiat currency) σε οποιοδήποτε είδος κρυπτονομίσματος. Οι επιλογές συνάντησης σε τοπικό επίπεδο μπορούν επίσης να αποτελέσουν μια λύση. Ωστόσο, αυτές είναι συχνά πιο ακριβές και ενδέχεται σε ορισμένες περιπτώσεις να απαιτούν KYC. +Ίσως, είναι εύλογο να χρησιμοποιήσετε ένα VPN γι' αυτό, προκειμένου να αποκρύψετε τη διεύθυνση IP σας. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Η χρήση altcoin shifting μπορεί επίσης να σας βοηθήσει, να αποκρύψετε την προέλευση των νομισμάτων σας. Συνήθως, τα ανταλλακτήρια απαιτούν την ολοκλήρωση του KYC (know your customer), προτού σας επιτρέψουν να ανταλλάξετε παραστατικό χρήμα( fiat currency) σε οποιοδήποτε είδος κρυπτονομίσματος. Οι επιλογές συνάντησης σε τοπικό επίπεδο μπορούν επίσης να αποτελέσουν μια λύση. Ωστόσο, αυτές είναι συχνά πιο ακριβές και ενδέχεται σε ορισμένες περιπτώσεις να απαιτούν KYC. 3. **Ανώνυμη ταυτότητα** - Ακόμα και όταν υπάρχει εμπειρία, οι ανώνυμες ταυτότητες είναι δύσκολο να διατηρηθούν για μεγάλα χρονικά διαστήματα. Θα πρέπει να είναι βραχυπρόθεσμες και βραχύβιες ταυτότητες, οι οποίες εναλλάσσονται τακτικά. diff --git a/i18n/el/basics/common-threats.md b/i18n/el/basics/common-threats.md index a8102469..67bd483b 100644 --- a/i18n/el/basics/common-threats.md +++ b/i18n/el/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacy From Service Providers @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/el/basics/email-security.md b/i18n/el/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/el/basics/email-security.md +++ b/i18n/el/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/el/basics/multi-factor-authentication.md b/i18n/el/basics/multi-factor-authentication.md index 75cb7e9b..92a563d7 100644 --- a/i18n/el/basics/multi-factor-authentication.md +++ b/i18n/el/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/el/basics/passwords-overview.md b/i18n/el/basics/passwords-overview.md index 63b87498..5a828342 100644 --- a/i18n/el/basics/passwords-overview.md +++ b/i18n/el/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/el/basics/vpn-overview.md b/i18n/el/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/el/basics/vpn-overview.md +++ b/i18n/el/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/el/basics/why-privacy-matters.md b/i18n/el/basics/why-privacy-matters.md index 2a870763..14c7ea53 100644 --- a/i18n/el/basics/why-privacy-matters.md +++ b/i18n/el/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/el/calendar.md b/i18n/el/calendar.md index fd26697b..8390538c 100644 --- a/i18n/el/calendar.md +++ b/i18n/el/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/el/cloud.md b/i18n/el/cloud.md index 34b98b3d..166e2dd6 100644 --- a/i18n/el/cloud.md +++ b/i18n/el/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/el/cryptocurrency.md b/i18n/el/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/el/cryptocurrency.md +++ b/i18n/el/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/el/data-redaction.md b/i18n/el/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/el/data-redaction.md +++ b/i18n/el/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/el/desktop-browsers.md b/i18n/el/desktop-browsers.md index 8dd3cde8..8cf83c5a 100644 --- a/i18n/el/desktop-browsers.md +++ b/i18n/el/desktop-browsers.md @@ -70,8 +70,8 @@ schema: **Ο περιηγητής Mullvad** είναι μία έκδοση του [περιηγητή Tor](tor.md#tor-browser), στον οποίο έχουν αφαιρεθεί οι ενσωματώσεις του δικτύου Tor και αποσκοπεί να προσφέρει τις τεχνολογίες anti-fingerprinting, του περιηγητή Tor, στους χρήστες VPN. Αναπτύσσεται από το Tor Project και διανέμεται από τη [Mullvad](vpn.md#mullvad), και **δεν** απαιτεί τη χρήση του VPN της Mullvad. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ schema: -Όπως και ο [περιηγητής Tor ](tor.md), έτσι και ο περιηγητής Mullvad έχει σχεδιαστεί για να αποτρέπει το fingerprinting, καθιστώντας το ψηφιακό δακτυλικό αποτύπωμα του προγράμματος περιήγησης πανομοιότυπο με όλων των υπόλοιπων χρηστών του περιηγητή Mullvad, και περιλαμβάνει προεπιλεγμένες ρυθμίσεις και επεκτάσεις, οι οποίες διαμορφώνονται αυτόματα από τα προεπιλεγμένα επίπεδα ασφαλείας: *τυπικό*, *ασφαλέστερο* και *ασφαλέστατο*. Ως εκ τούτου, είναι επιτακτική ανάγκη να μην τροποποιήσετε καθόλου το πρόγραμμα περιήγησης εκτός από την προσαρμογή των προεπιλεγμένων επιπέδων ασφαλείας [](https://tb-manual.torproject.org/security-settings/). Άλλες τροποποιήσεις θα έκαναν το ψηφιακό δακτυλικό σας αποτύπωμα μοναδικό, αναιρώντας έτσι τον σκοπό χρήσης αυτού του προγράμματος περιήγησης. Εάν θέλετε να ρυθμίσετε το πρόγραμμα περιήγησης σας σε μεγαλύτερο βαθμό και το fingerprinting δεν αποτελεί μία από τις έγνοιες σας, τότε σας προτείνουμε το [Firefox](#firefox). +Όπως και ο [περιηγητής Tor ](tor.md), έτσι και ο περιηγητής Mullvad έχει σχεδιαστεί για να αποτρέπει το fingerprinting, καθιστώντας το ψηφιακό δακτυλικό αποτύπωμα του προγράμματος περιήγησης πανομοιότυπο με όλων των υπόλοιπων χρηστών του περιηγητή Mullvad, και περιλαμβάνει προεπιλεγμένες ρυθμίσεις και επεκτάσεις, οι οποίες διαμορφώνονται αυτόματα από τα προεπιλεγμένα επίπεδα ασφαλείας: *τυπικό*, *ασφαλέστερο* και *ασφαλέστατο*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Άλλες τροποποιήσεις θα έκαναν το ψηφιακό δακτυλικό σας αποτύπωμα μοναδικό, αναιρώντας έτσι τον σκοπό χρήσης αυτού του προγράμματος περιήγησης. Εάν θέλετε να ρυθμίσετε το πρόγραμμα περιήγησης σας σε μεγαλύτερο βαθμό και το fingerprinting δεν αποτελεί μία από τις έγνοιες σας, τότε σας προτείνουμε το [Firefox](#firefox). ### Anti-Fingerprinting @@ -116,17 +116,17 @@ schema: **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ schema:

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ We are working on establishing defined criteria for every section of our site, a - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -462,4 +462,4 @@ Our best-case criteria represents what we would like to see from the perfect pro - Must directly impact user privacy, i.e. must not simply provide information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/el/desktop.md b/i18n/el/desktop.md index 5252084a..1fac706b 100644 --- a/i18n/el/desktop.md +++ b/i18n/el/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/el/device-integrity.md b/i18n/el/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/el/device-integrity.md +++ b/i18n/el/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/el/dns.md b/i18n/el/dns.md index 61171598..4a78760f 100644 --- a/i18n/el/dns.md +++ b/i18n/el/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## Recommended Providers -| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | +| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ After installation of either a configuration profile or an app that uses the DNS #### Signed Profiles -Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home features a polished web interface to view insights and manage blocked content. @@ -144,13 +144,13 @@ AdGuard Home features a polished web interface to view insights and manage block ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -159,8 +159,8 @@ Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to suc
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/el/email-clients.md b/i18n/el/email-clients.md index 7434f6bb..c7051cdb 100644 --- a/i18n/el/email-clients.md +++ b/i18n/el/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/el/email.md b/i18n/el/email.md index c0374704..c4637e6b 100644 --- a/i18n/el/email.md +++ b/i18n/el/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail has internal crash reports that they **do not** share with third par #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. +Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -129,7 +129,7 @@ Proton Mail doesn't offer a digital legacy feature. #### :material-check:{ .pg-green } Custom Domains and Aliases -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -137,17 +137,17 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro #### :material-check:{ .pg-green } Account Security -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security -Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } Email Encryption -Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Your account will be set to a restricted user account when your contract ends, a #### :material-information-outline:{ .pg-blue } Additional Functionality -You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. -All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criteria @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/el/encryption.md b/i18n/el/encryption.md index d774167a..aa3ee158 100644 --- a/i18n/el/encryption.md +++ b/i18n/el/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/el/file-sharing.md b/i18n/el/file-sharing.md index d7cd5832..f6732765 100644 --- a/i18n/el/file-sharing.md +++ b/i18n/el/file-sharing.md @@ -15,7 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/el/financial-services.md b/i18n/el/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/el/financial-services.md +++ b/i18n/el/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/el/frontends.md b/i18n/el/frontends.md index 01d5ea76..1769b24a 100644 --- a/i18n/el/frontends.md +++ b/i18n/el/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/el/index.md b/i18n/el/index.md index f5d6b058..df83026a 100644 --- a/i18n/el/index.md +++ b/i18n/el/index.md @@ -62,7 +62,7 @@ schema: ## We need you! Here's how to get involved: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } [:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } [:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } [:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } diff --git a/i18n/el/kb-archive.md b/i18n/el/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/el/kb-archive.md +++ b/i18n/el/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/el/meta/admonitions.md b/i18n/el/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/el/meta/admonitions.md +++ b/i18n/el/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/el/meta/translations.md b/i18n/el/meta/translations.md index 30b4c572..60261b1c 100644 --- a/i18n/el/meta/translations.md +++ b/i18n/el/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/el/meta/uploading-images.md b/i18n/el/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/el/meta/uploading-images.md +++ b/i18n/el/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/el/meta/writing-style.md b/i18n/el/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/el/meta/writing-style.md +++ b/i18n/el/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/el/mobile-browsers.md b/i18n/el/mobile-browsers.md index 57ae950f..e1875e1a 100644 --- a/i18n/el/mobile-browsers.md +++ b/i18n/el/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ These are our currently recommended mobile web browsers and configurations for s ## Android -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/el/multi-factor-authentication.md b/i18n/el/multi-factor-authentication.md index 830c33c8..ee60af63 100644 --- a/i18n/el/multi-factor-authentication.md +++ b/i18n/el/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/el/news-aggregators.md b/i18n/el/news-aggregators.md index 17438718..00b22c26 100644 --- a/i18n/el/news-aggregators.md +++ b/i18n/el/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/el/notebooks.md b/i18n/el/notebooks.md index 2131e5e0..0eb1ebef 100644 --- a/i18n/el/notebooks.md +++ b/i18n/el/notebooks.md @@ -34,7 +34,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ If you are currently using an application like Evernote, Google Keep, or Microso Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/el/os/android-overview.md b/i18n/el/os/android-overview.md index 1ffa3cdc..f866b6cb 100644 --- a/i18n/el/os/android-overview.md +++ b/i18n/el/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/el/os/ios-overview.md b/i18n/el/os/ios-overview.md index 949d360e..d2744bad 100644 --- a/i18n/el/os/ios-overview.md +++ b/i18n/el/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/el/os/linux-overview.md b/i18n/el/os/linux-overview.md index da9fa962..56db7195 100644 --- a/i18n/el/os/linux-overview.md +++ b/i18n/el/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/el/os/macos-overview.md b/i18n/el/os/macos-overview.md index 584d1acc..aa5541ea 100644 --- a/i18n/el/os/macos-overview.md +++ b/i18n/el/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Recommended Configuration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/el/os/qubes-overview.md b/i18n/el/os/qubes-overview.md index c76924d9..fcea270b 100644 --- a/i18n/el/os/qubes-overview.md +++ b/i18n/el/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/el/passwords.md b/i18n/el/passwords.md index da2b5d77..1514d105 100644 --- a/i18n/el/passwords.md +++ b/i18n/el/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/el/photo-management.md b/i18n/el/photo-management.md index a041bdcb..1bb46cae 100644 --- a/i18n/el/photo-management.md +++ b/i18n/el/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/el/productivity.md b/i18n/el/productivity.md index c63e28bb..1612e148 100644 --- a/i18n/el/productivity.md +++ b/i18n/el/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/el/real-time-communication.md b/i18n/el/real-time-communication.md index bb96b9c2..6a1f7de0 100644 --- a/i18n/el/real-time-communication.md +++ b/i18n/el/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/el/router.md b/i18n/el/router.md index 76c1af4a..ec96f45a 100644 --- a/i18n/el/router.md +++ b/i18n/el/router.md @@ -35,10 +35,10 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/el/search-engines.md b/i18n/el/search-engines.md index 7fc05e18..9ffdbb0b 100644 --- a/i18n/el/search-engines.md +++ b/i18n/el/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/el/tools.md b/i18n/el/tools.md index de7816fa..956dd9bb 100644 --- a/i18n/el/tools.md +++ b/i18n/el/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Learn more :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/el/tor.md b/i18n/el/tor.md index 04bc51b7..3c240ddc 100644 --- a/i18n/el/tor.md +++ b/i18n/el/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a -The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake does not increase your privacy in any way, nor is it used to connect t Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/el/vpn.md b/i18n/el/vpn.md index caeab50a..e7bc610a 100644 --- a/i18n/el/vpn.md +++ b/i18n/el/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria diff --git a/i18n/eo/CODE_OF_CONDUCT.md b/i18n/eo/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/eo/CODE_OF_CONDUCT.md +++ b/i18n/eo/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/eo/about/index.md b/i18n/eo/about/index.md index 9c3a0d47..618957d5 100644 --- a/i18n/eo/about/index.md +++ b/i18n/eo/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/eo/about/notices.md b/i18n/eo/about/notices.md index d948a76a..0ef0e6f8 100644 --- a/i18n/eo/about/notices.md +++ b/i18n/eo/about/notices.md @@ -29,7 +29,7 @@ This does not include third-party code embedded in this repository, or code wher This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* +We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ You must not conduct any systematic or automated data collection activities on o --- -*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/eo/about/privacytools.md b/i18n/eo/about/privacytools.md index 512ebb93..0c889f62 100644 --- a/i18n/eo/about/privacytools.md +++ b/i18n/eo/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/eo/advanced/communication-network-types.md b/i18n/eo/advanced/communication-network-types.md index 1f07a2c4..f6444ca4 100644 --- a/i18n/eo/advanced/communication-network-types.md +++ b/i18n/eo/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/eo/advanced/dns-overview.md b/i18n/eo/advanced/dns-overview.md index 21889d85..2ffb67b2 100644 --- a/i18n/eo/advanced/dns-overview.md +++ b/i18n/eo/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/eo/advanced/payments.md b/i18n/eo/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/eo/advanced/payments.md +++ b/i18n/eo/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/eo/advanced/tor-overview.md b/i18n/eo/advanced/tor-overview.md index 8a6ab1ce..cc7a2fad 100644 --- a/i18n/eo/advanced/tor-overview.md +++ b/i18n/eo/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/eo/android.md b/i18n/eo/android.md index 6a650455..2f79dd91 100644 --- a/i18n/eo/android.md +++ b/i18n/eo/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,7 +113,7 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/eo/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/eo/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/eo/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/eo/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/eo/assets/img/how-tor-works/tor-encryption.svg b/i18n/eo/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/eo/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/eo/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/eo/assets/img/how-tor-works/tor-path-dark.svg b/i18n/eo/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/eo/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/eo/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/eo/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/eo/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/eo/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/eo/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/eo/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/eo/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/eo/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/eo/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/eo/assets/img/how-tor-works/tor-path.svg b/i18n/eo/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/eo/assets/img/how-tor-works/tor-path.svg +++ b/i18n/eo/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/eo/basics/account-deletion.md b/i18n/eo/basics/account-deletion.md index cd89ea6f..857a57d8 100644 --- a/i18n/eo/basics/account-deletion.md +++ b/i18n/eo/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/eo/basics/common-misconceptions.md b/i18n/eo/basics/common-misconceptions.md index 74650997..5aeaae95 100644 --- a/i18n/eo/basics/common-misconceptions.md +++ b/i18n/eo/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/eo/basics/common-threats.md b/i18n/eo/basics/common-threats.md index 6391c97a..bdbd3b75 100644 --- a/i18n/eo/basics/common-threats.md +++ b/i18n/eo/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privateco Kontraŭ Servaj Provizantoj @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/eo/basics/email-security.md b/i18n/eo/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/eo/basics/email-security.md +++ b/i18n/eo/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/eo/basics/multi-factor-authentication.md b/i18n/eo/basics/multi-factor-authentication.md index 75cb7e9b..92a563d7 100644 --- a/i18n/eo/basics/multi-factor-authentication.md +++ b/i18n/eo/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/eo/basics/passwords-overview.md b/i18n/eo/basics/passwords-overview.md index 63b87498..5a828342 100644 --- a/i18n/eo/basics/passwords-overview.md +++ b/i18n/eo/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/eo/basics/vpn-overview.md b/i18n/eo/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/eo/basics/vpn-overview.md +++ b/i18n/eo/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/eo/basics/why-privacy-matters.md b/i18n/eo/basics/why-privacy-matters.md index b89423e0..b48c26e5 100644 --- a/i18n/eo/basics/why-privacy-matters.md +++ b/i18n/eo/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/eo/calendar.md b/i18n/eo/calendar.md index fd26697b..8390538c 100644 --- a/i18n/eo/calendar.md +++ b/i18n/eo/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/eo/cloud.md b/i18n/eo/cloud.md index 34b98b3d..166e2dd6 100644 --- a/i18n/eo/cloud.md +++ b/i18n/eo/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/eo/cryptocurrency.md b/i18n/eo/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/eo/cryptocurrency.md +++ b/i18n/eo/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/eo/data-redaction.md b/i18n/eo/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/eo/data-redaction.md +++ b/i18n/eo/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/eo/desktop-browsers.md b/i18n/eo/desktop-browsers.md index 65743bb4..90f25c19 100644 --- a/i18n/eo/desktop-browsers.md +++ b/i18n/eo/desktop-browsers.md @@ -70,8 +70,8 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ We are working on establishing defined criteria for every section of our site, a - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -462,4 +462,4 @@ Our best-case criteria represents what we would like to see from the perfect pro - Must directly impact user privacy, i.e. must not simply provide information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/eo/desktop.md b/i18n/eo/desktop.md index 5252084a..1fac706b 100644 --- a/i18n/eo/desktop.md +++ b/i18n/eo/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/eo/device-integrity.md b/i18n/eo/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/eo/device-integrity.md +++ b/i18n/eo/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/eo/dns.md b/i18n/eo/dns.md index 61171598..4a78760f 100644 --- a/i18n/eo/dns.md +++ b/i18n/eo/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## Recommended Providers -| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | +| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ After installation of either a configuration profile or an app that uses the DNS #### Signed Profiles -Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home features a polished web interface to view insights and manage blocked content. @@ -144,13 +144,13 @@ AdGuard Home features a polished web interface to view insights and manage block ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -159,8 +159,8 @@ Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to suc
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/eo/email-clients.md b/i18n/eo/email-clients.md index 7434f6bb..c7051cdb 100644 --- a/i18n/eo/email-clients.md +++ b/i18n/eo/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/eo/email.md b/i18n/eo/email.md index c0374704..c4637e6b 100644 --- a/i18n/eo/email.md +++ b/i18n/eo/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail has internal crash reports that they **do not** share with third par #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. +Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -129,7 +129,7 @@ Proton Mail doesn't offer a digital legacy feature. #### :material-check:{ .pg-green } Custom Domains and Aliases -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -137,17 +137,17 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro #### :material-check:{ .pg-green } Account Security -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security -Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } Email Encryption -Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Your account will be set to a restricted user account when your contract ends, a #### :material-information-outline:{ .pg-blue } Additional Functionality -You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. -All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criteria @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/eo/encryption.md b/i18n/eo/encryption.md index d774167a..aa3ee158 100644 --- a/i18n/eo/encryption.md +++ b/i18n/eo/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/eo/file-sharing.md b/i18n/eo/file-sharing.md index d7cd5832..f6732765 100644 --- a/i18n/eo/file-sharing.md +++ b/i18n/eo/file-sharing.md @@ -15,7 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/eo/financial-services.md b/i18n/eo/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/eo/financial-services.md +++ b/i18n/eo/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/eo/frontends.md b/i18n/eo/frontends.md index 01d5ea76..1769b24a 100644 --- a/i18n/eo/frontends.md +++ b/i18n/eo/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/eo/index.md b/i18n/eo/index.md index c2407173..258d8eb9 100644 --- a/i18n/eo/index.md +++ b/i18n/eo/index.md @@ -62,7 +62,7 @@ Trying to protect all your data from everyone all the time is impractical, expen ## We need you! Here's how to get involved: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } [:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } [:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } [:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } diff --git a/i18n/eo/kb-archive.md b/i18n/eo/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/eo/kb-archive.md +++ b/i18n/eo/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/eo/meta/admonitions.md b/i18n/eo/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/eo/meta/admonitions.md +++ b/i18n/eo/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/eo/meta/translations.md b/i18n/eo/meta/translations.md index 30b4c572..60261b1c 100644 --- a/i18n/eo/meta/translations.md +++ b/i18n/eo/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/eo/meta/uploading-images.md b/i18n/eo/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/eo/meta/uploading-images.md +++ b/i18n/eo/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/eo/meta/writing-style.md b/i18n/eo/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/eo/meta/writing-style.md +++ b/i18n/eo/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/eo/mobile-browsers.md b/i18n/eo/mobile-browsers.md index 57ae950f..e1875e1a 100644 --- a/i18n/eo/mobile-browsers.md +++ b/i18n/eo/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ These are our currently recommended mobile web browsers and configurations for s ## Android -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/eo/multi-factor-authentication.md b/i18n/eo/multi-factor-authentication.md index 830c33c8..ee60af63 100644 --- a/i18n/eo/multi-factor-authentication.md +++ b/i18n/eo/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/eo/news-aggregators.md b/i18n/eo/news-aggregators.md index 17438718..00b22c26 100644 --- a/i18n/eo/news-aggregators.md +++ b/i18n/eo/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/eo/notebooks.md b/i18n/eo/notebooks.md index 2131e5e0..0eb1ebef 100644 --- a/i18n/eo/notebooks.md +++ b/i18n/eo/notebooks.md @@ -34,7 +34,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ If you are currently using an application like Evernote, Google Keep, or Microso Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/eo/os/android-overview.md b/i18n/eo/os/android-overview.md index 1ffa3cdc..f866b6cb 100644 --- a/i18n/eo/os/android-overview.md +++ b/i18n/eo/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/eo/os/ios-overview.md b/i18n/eo/os/ios-overview.md index 949d360e..d2744bad 100644 --- a/i18n/eo/os/ios-overview.md +++ b/i18n/eo/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/eo/os/linux-overview.md b/i18n/eo/os/linux-overview.md index da9fa962..56db7195 100644 --- a/i18n/eo/os/linux-overview.md +++ b/i18n/eo/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/eo/os/macos-overview.md b/i18n/eo/os/macos-overview.md index 584d1acc..aa5541ea 100644 --- a/i18n/eo/os/macos-overview.md +++ b/i18n/eo/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Recommended Configuration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/eo/os/qubes-overview.md b/i18n/eo/os/qubes-overview.md index c76924d9..fcea270b 100644 --- a/i18n/eo/os/qubes-overview.md +++ b/i18n/eo/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/eo/passwords.md b/i18n/eo/passwords.md index da2b5d77..1514d105 100644 --- a/i18n/eo/passwords.md +++ b/i18n/eo/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/eo/photo-management.md b/i18n/eo/photo-management.md index a041bdcb..1bb46cae 100644 --- a/i18n/eo/photo-management.md +++ b/i18n/eo/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/eo/productivity.md b/i18n/eo/productivity.md index c63e28bb..1612e148 100644 --- a/i18n/eo/productivity.md +++ b/i18n/eo/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/eo/real-time-communication.md b/i18n/eo/real-time-communication.md index bb96b9c2..6a1f7de0 100644 --- a/i18n/eo/real-time-communication.md +++ b/i18n/eo/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/eo/router.md b/i18n/eo/router.md index 870cd79e..a54378c6 100644 --- a/i18n/eo/router.md +++ b/i18n/eo/router.md @@ -35,10 +35,10 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/eo/search-engines.md b/i18n/eo/search-engines.md index 7fc05e18..9ffdbb0b 100644 --- a/i18n/eo/search-engines.md +++ b/i18n/eo/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/eo/tools.md b/i18n/eo/tools.md index e10a0165..3c0afbab 100644 --- a/i18n/eo/tools.md +++ b/i18n/eo/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Learn more :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/eo/tor.md b/i18n/eo/tor.md index 04bc51b7..3c240ddc 100644 --- a/i18n/eo/tor.md +++ b/i18n/eo/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a -The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake does not increase your privacy in any way, nor is it used to connect t Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/eo/vpn.md b/i18n/eo/vpn.md index caeab50a..e7bc610a 100644 --- a/i18n/eo/vpn.md +++ b/i18n/eo/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria diff --git a/i18n/es/CODE_OF_CONDUCT.md b/i18n/es/CODE_OF_CONDUCT.md index a73e3850..581e2921 100644 --- a/i18n/es/CODE_OF_CONDUCT.md +++ b/i18n/es/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ Lo que esperamos de los miembros de nuestras comunidades: 2. **No abuses de nuestra voluntad a ayudar** - Los miembros de nuestra comunidad no son un servicio técnico gratuito. Estamos encantados de ayudarte con pasos específicos en tu camino hacia la privacidad si estás dispuesto a poner esfuerzo de tu parte. No estamos obligados a responder a preguntas interminables y repetitivas sobre problemas informáticos generales que pueden resolverse con una simple búsqueda en Internet. **No** te conviertas en un [vampiro de ayuda](https://slash7.com/2006/12/22/vampires/). + Los miembros de nuestra comunidad no son un servicio técnico gratuito. Estamos encantados de ayudarte con pasos específicos en tu camino hacia la privacidad si estás dispuesto a poner esfuerzo de tu parte. No estamos obligados a responder a preguntas interminables y repetitivas sobre problemas informáticos generales que pueden resolverse con una simple búsqueda en Internet. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Compórtate de manera positiva y constructiva** diff --git a/i18n/es/about/index.md b/i18n/es/about/index.md index 90b9418f..7817c88d 100644 --- a/i18n/es/about/index.md +++ b/i18n/es/about/index.md @@ -21,19 +21,19 @@ schema: **Guías de privacidad** es un sitio web socialmente motivado que proporciona [información](/kb) para proteger su seguridad y privacidad de datos. Nuestra misión es informar al público sobre el valor de la privacidad digital y las iniciativas gubernamentales globales que pretenden vigilar tu actividad en línea. Somos un colectivo sin ánimo de lucro gestionado íntegramente por [miembros voluntarios del equipo](https://discuss.privacyguides.net/g/team) y colaboradores. Nuestro sitio web no contiene publicidad y no está afiliado a ninguno de los proveedores mencionados. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Inicio } -[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Código fuente" } -[:octicons-heart-16:](donate.md){ .card-link title=Contribuir } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } +[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } +[:octicons-heart-16:](donate.md){ .card-link title=Contribute } > Para encontrar aplicaciones [alternativas centradas en la privacidad], echa un vistazo a sitios como Good Reports y **Privacy Guides**, que enumeran aplicaciones centradas en la privacidad en diversas categorías, entre las que destacan los proveedores de correo electrónico (normalmente con planes de pago) que no están gestionados por las grandes empresas tecnológicas. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > Si estás buscando una nueva VPN, puedes acudir al código de descuento de casi cualquier podcast. Si buscas una VPN **buena**, necesitas ayuda profesional. Lo mismo ocurre con los clientes de correo electrónico, los navegadores, los sistemas operativos y los gestores de contraseñas. ¿Cómo saber cuál de ellas es la mejor opción, la más respetuosa con la privacidad? Para ello existe **Privacy Guides**, una plataforma en la que varios voluntarios buscan día tras día las mejores herramientas para proteger la intimidad en Internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Traducido del neerlandés] -También destacado el: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), y [con cable](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## Historia @@ -41,7 +41,7 @@ Privacy Guides se lanzó en septiembre de 2021 como continuación del proyecto e En 2022, completamos la transición de nuestro principal marco web de Jekyll a MkDocs, utilizando el software de documentación `mkdocs-material`. Este cambio facilitó notablemente las contribuciones de código abierto a nuestro sitio para los forasteros, ya que en lugar de tener que conocer una sintaxis complicada para escribir entradas de forma eficaz, ahora contribuir es tan fácil como escribir un documento Markdown estándar. -Además, lanzamos nuestro nuevo foro de debate en [discuss.privacyguides.net](https://discuss.privacyguides.net/) como plataforma comunitaria para compartir ideas y plantear preguntas sobre nuestra misión. Esto aumenta nuestra comunidad existente en Matrix y sustituye a nuestra anterior plataforma GitHub Discussions, disminuyendo nuestra dependencia de plataformas de debate propietarias. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. Esto aumenta nuestra comunidad existente en Matrix y sustituye a nuestra anterior plataforma GitHub Discussions, disminuyendo nuestra dependencia de plataformas de debate propietarias. En lo que va de 2023 hemos lanzado traducciones internacionales de nuestro sitio web en [francés](/fr/), [hebreo](/he/), y [neerlandés](/nl/), con más idiomas en camino, posible gracias a nuestro excelente equipo de traducción en [Crowdin](https://crowdin.com/project/privacyguides). Tenemos previsto seguir adelante con nuestra misión de divulgación y educación, y buscar formas de poner de relieve con mayor claridad los peligros de la falta de concienciación sobre la privacidad en la era digital moderna, así como la prevalencia y los perjuicios de las brechas de seguridad en todo el sector tecnológico. diff --git a/i18n/es/about/notices.md b/i18n/es/about/notices.md index d5706c79..480edc29 100644 --- a/i18n/es/about/notices.md +++ b/i18n/es/about/notices.md @@ -29,7 +29,7 @@ Esto no incluye código de terceros incrustado en este repositorio, o código en Esto significa que puedes utilizar el contenido legible por humanos de este repositorio para tu propio proyecto, de acuerdo con los términos descritos en el texto de Creative Commons Attribution-NoDerivatives 4.0 International Public License. A pesar de que le está permitido, bajo ningún concepto se dará a entender por ello que el propietario de la licencia aprueba los cambios ni su uso. Tú **no puedes** utilizar la marca de Privacy Guides en tu propio proyecto sin la aprobación expresa de este proyecto. Las marcas comerciales de Privacy Guides incluyen el logotipo de "Privacy Guides" y el logotipo del escudo. -Creemos que los logotipos y otras imágenes en `assets` obtenidos de terceros proveedores son de dominio público o **de uso leal**. En pocas palabras, la doctrina legal de [uso justo](https://es.wikipedia.org/wiki/Uso_justo) permite el uso de imágenes con derechos de autor con el propósito de identificar el tema para fines de comentario público. Sin embargo, estos logotipos y otras imágenes pueden estar sujetos a la legislación sobre marcas en una o más jurisdicciones. Antes de utilizar este contenido, asegúrese de que se utiliza para identificar a la entidad u organización propietaria de la marca comercial y de que usted tiene derecho a utilizarla según las leyes que se aplican en las circunstancias de tu uso previsto. *Al copiar el contenido de este sitio web, usted es el único responsable de asegurarse de no infringir la marca comercial o los derechos de autor de otra persona.* +Creemos que los logotipos y otras imágenes en `assets` obtenidos de terceros proveedores son de dominio público o **de uso leal**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. Sin embargo, estos logotipos y otras imágenes pueden estar sujetos a la legislación sobre marcas en una o más jurisdicciones. Antes de utilizar este contenido, asegúrese de que se utiliza para identificar a la entidad u organización propietaria de la marca comercial y de que usted tiene derecho a utilizarla según las leyes que se aplican en las circunstancias de tu uso previsto. *Al copiar el contenido de este sitio web, usted es el único responsable de asegurarse de no infringir la marca comercial o los derechos de autor de otra persona.* Cuando contribuyes a nuestro sitio web lo estás haciendo bajo las licencias anteriores, y estás otorgando a las Guías de Privacidad un autor, mundial, no exclusivo, transferible, sin realismo Licencia irrevocable con derecho a sublicenciar tales derechos a través de múltiples niveles de sublicencias, para reproducir, modificar, mostrar, realizar y distribuir su contribución como parte de nuestro proyecto. @@ -47,4 +47,4 @@ No debe llevar a cabo ninguna actividad de recopilación de datos sistemática o --- -*Algunas partes de este aviso fueron adoptadas de [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) en GitHub. Ese recurso y esta página están publicados bajo la licencia [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Algunas partes de este aviso fueron adoptadas de [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) en GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/es/about/privacytools.md b/i18n/es/about/privacytools.md index 2ab3511b..1a03c8ca 100644 --- a/i18n/es/about/privacytools.md +++ b/i18n/es/about/privacytools.md @@ -14,13 +14,13 @@ Una vez finalizado el traslado organizativo, el fundador de PrivacyTools regres PrivacyTools fue creado en 2015 por "BurungHantu", que quería hacer un recurso de información de privacidad - herramientas útiles después de las revelaciones de Snowden. El sitio creció hasta convertirse en un floreciente proyecto de código abierto con [muchos colaboradores](https://github.com/privacytools/privacytools.io/graphs/contributors), algunos de los cuales acabaron asumiendo diversas responsabilidades organizativas, como el funcionamiento de servicios en línea como Matrix y Mastodon, la gestión y revisión de los cambios en el sitio en GitHub, la búsqueda de patrocinadores para el proyecto, la redacción de publicaciones en el blog y el funcionamiento de plataformas de difusión en los medios sociales como Twitter, etc. -A partir de 2019, BurungHantu se alejó cada vez más del desarrollo activo del sitio web y las comunidades, y comenzó a retrasar los pagos de los que era responsable en relación con los servidores que operábamos. Para evitar que nuestro administrador del sistema pague los costos del servidor de su propio bolsillo, cambiamos los métodos de donación enumerados en el sitio de las cuentas personales de PayPal y criptomonedas de BurungHantu a una nueva página de OpenCollective el [31 de octubre de 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). Esto tenía la ventaja añadida de hacer nuestras finanzas completamente transparentes, un valor en el que creemos firmemente, y deducibles de impuestos en los Estados Unidos, porque estaban en manos de la Open Collective Foundation 501(c)3. Este cambio fue acordado unánimemente por el equipo y no fue impugnado. +A partir de 2019, BurungHantu se alejó cada vez más del desarrollo activo del sitio web y las comunidades, y comenzó a retrasar los pagos de los que era responsable en relación con los servidores que operábamos. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). Esto tenía la ventaja añadida de hacer nuestras finanzas completamente transparentes, un valor en el que creemos firmemente, y deducibles de impuestos en los Estados Unidos, porque estaban en manos de la Open Collective Foundation 501(c)3. Este cambio fue acordado unánimemente por el equipo y no fue impugnado. ## Por qué nos mudamos En 2020, la ausencia de BurungHantu se hizo mucho más notoria. En un momento dado, requerimos que los servidores de nombres del dominio se cambiaran a servidores de nombres controlados por nuestro administrador del sistema para evitar interrupciones futuras, y este cambio no se completó hasta más de un mes después de la solicitud inicial. Desaparecía del chat público y de las salas de chat privadas del equipo en Matrix durante meses, apareciendo de vez en cuando para dar algún pequeño comentario o prometer ser más activo antes de volver a desaparecer. -En octubre de 2020, el administrador del sistema de PrivacyTools (Jonah) [dejó](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) el proyecto debido a estas dificultades, cediendo el control a otro colaborador de larga data. Jonah había estado operando casi todos los servicios de PrivacyTools y actuando como el líder del proyecto *de facto* para el desarrollo del sitio web en ausencia de BurungHantu, por lo que su partida fue un cambio significativo para la organización. En aquel momento, debido a estos importantes cambios organizativos, BurungHantu prometió al equipo restante que volvería para tomar el control del proyecto en adelante. ==El equipo de PrivacyTools se puso en contacto a través de varios métodos de comunicación durante los meses siguientes, pero no recibió ninguna respuesta.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah había estado operando casi todos los servicios de PrivacyTools y actuando como el líder del proyecto *de facto* para el desarrollo del sitio web en ausencia de BurungHantu, por lo que su partida fue un cambio significativo para la organización. En aquel momento, debido a estos importantes cambios organizativos, BurungHantu prometió al equipo restante que volvería para tomar el control del proyecto en adelante. ==El equipo de PrivacyTools se puso en contacto a través de varios métodos de comunicación durante los meses siguientes, pero no recibió ninguna respuesta.== ## Dependencia del nombre de dominio @@ -34,25 +34,25 @@ A mediados de 2021, el equipo de PrivacyTools se puso en contacto con Jonah, que ## Llamada a la acción comunitaria -A finales de julio de 2021 [informamos](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) a la comunidad PrivacyTools de nuestra intención de elegir un nuevo nombre y continuar el proyecto en un nuevo dominio, para ser [elegido](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) el 2 de agosto de 2022. Al final, se eligió "Privacy Guides", con el dominio `privacyguides.org` que ya poseía Jonah para un proyecto paralelo de 2020 que quedó sin desarrollar. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. Al final, se eligió "Privacy Guides", con el dominio `privacyguides.org` que ya poseía Jonah para un proyecto paralelo de 2020 que quedó sin desarrollar. ## Control de r/privacytoolsIO -Simultáneamente con los problemas del sitio web en privacytools.io, el equipo de moderación de r/privacytoolsIO se enfrentaba a retos en la gestión del subreddit. El subreddit siempre había sido operado en su mayor parte independientemente del desarrollo del sitio web, pero BurungHantu era el principal moderador del subreddit también, y era el único moderador al que se le habían concedido privilegios de "Control total". u/trai_dep era el único moderador activo en ese momento, y [publicó](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) una solicitud a los administradores de Reddit el 28 de junio de 2021, en la que pedía que se le concediera el puesto de moderador principal y privilegios de control total, con el fin de realizar los cambios necesarios en el subreddit. +Simultáneamente con los problemas del sitio web en privacytools.io, el equipo de moderación de r/privacytoolsIO se enfrentaba a retos en la gestión del subreddit. El subreddit siempre había sido operado en su mayor parte independientemente del desarrollo del sitio web, pero BurungHantu era el principal moderador del subreddit también, y era el único moderador al que se le habían concedido privilegios de "Control total". u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requiere que los subreddits tengan moderadores activos. Si el moderador principal está inactivo durante un largo periodo de tiempo (como un año), el puesto de moderador principal puede volver a asignarse al siguiente moderador en la lista. Para que se le concediera esta petición, BurungHantu tenía que haber estado completamente ausente de toda actividad de Reddit durante un largo periodo de tiempo, lo que era coherente con sus comportamientos en otras plataformas. > Si fuiste removido como moderador de un subreddit a través de una solicitud de Reddit es porque tu falta de respuesta y tu falta de actividad calificaron al subreddit para una transferencia de r/redditrequest. > -> r/redditrequest es la forma de Reddit de asegurarse de que las comunidades tengan moderadores activos y forma parte del [Código de Conducta de Moderador](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Inicio de la transición -El 14 de septiembre de 2021, [anunciamos](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) el inicio de nuestra migración a este nuevo dominio: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] nos pareció necesario hacer este cambio más pronto que tarde para que la gente se enterara de esta transición lo antes posible. Esto nos da el tiempo adecuado para la transición del nombre de dominio, que actualmente se está redirigiendo a www.privacyguides.org, y esperamos que dé a todos el tiempo suficiente para notar el cambio, actualizar los marcadores y los sitios web, etc. -Este cambio [implicó:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirigiendo www.privacytools.io a [www.privacyguides.org](https://www.privacyguides.org). - Archivar el código fuente en GitHub para preservar nuestro trabajo anterior y el rastreador de problemas, que seguimos utilizando durante meses para el desarrollo futuro de este sitio. @@ -63,11 +63,11 @@ Las cosas parecían ir bien, y la mayoría de nuestra comunidad activa hizo el c ## Eventos siguientes -Aproximadamente una semana después de la transición, BurungHantu volvió a estar en línea por primera vez en casi un año, sin embargo nadie de nuestro equipo estaba dispuesto a volver a PrivacyTools debido a su histórica falta de fiabilidad. En lugar de disculparse por su prolongada ausencia, pasó inmediatamente a la ofensiva y situó la transición a Privacy Guides como un ataque contra él y su proyecto. Posteriormente, [borró](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) muchos de estos mensajes cuando la comunidad le señaló que había estado ausente y abandonado el proyecto. +Aproximadamente una semana después de la transición, BurungHantu volvió a estar en línea por primera vez en casi un año, sin embargo nadie de nuestro equipo estaba dispuesto a volver a PrivacyTools debido a su histórica falta de fiabilidad. En lugar de disculparse por su prolongada ausencia, pasó inmediatamente a la ofensiva y situó la transición a Privacy Guides como un ataque contra él y su proyecto. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. En este punto, BurungHantu afirmó que quería seguir trabajando en privacytools.io por su cuenta y solicitó que elimináramos la redirección de www.privacytools.io a [www.privacyguides.org](https://www.privacyguides.org). Le obligamos y le pedimos que mantuviera activos los subdominios de Matrix, Mastodon y PeerTube para que funcionaran como servicio público para nuestra comunidad durante al menos unos meses, con el fin de que los usuarios de esas plataformas pudieran migrar fácilmente a otras cuentas. Debido a la naturaleza federada de los servicios que prestábamos, estaban vinculados a nombres de dominio específicos, lo que hacía muy difícil la migración (y en algunos casos imposible). -Desafortunadamente, debido a que el control del subreddit r/privacytoolsIO no fue devuelto a BurungHantu a su demanda (más información abajo), esos subdominios fueron [cortados](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) a principios de octubre, acabando con cualquier posibilidad de migración para cualquier usuario que aún usara esos servicios. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Tras esto, BurungHantu hizo falsas acusaciones sobre el robo de donaciones del proyecto por parte de Jonah. BurungHantu tenía más de un año desde que ocurrió el presunto incidente y, sin embargo, no lo puso en conocimiento de nadie hasta después de la migración de Privacy Guides. El equipo [y la comunidad](https://twitter.com/TommyTran732/status/1526153536962281474) han pedido repetidamente a BurungHantu que aporte pruebas y comente el motivo de su silencio, y no lo ha hecho. @@ -77,11 +77,11 @@ BurungHantu también hizo una [publicación en Twitter](https://twitter.com/priv A partir del 25 de septiembre de 2022 estamos viendo cómo los planes generales de BurungHantu se hacen realidad en privacytools.io, y esta es la razón por la que hemos decidido crear esta página explicativa hoy. El sitio web que está operando parece ser una versión altamente optimizada para SEO del sitio que recomienda herramientas a cambio de una compensación financiera. Recientemente, IVPN y Mullvad, dos proveedores de VPN [recomendados](../vpn.md) casi universalmente por la comunidad de la privacidad y notables por su postura contra los programas de afiliación, fueron eliminados de PrivacyTools. ¿En su lugar? NordVPN, Surfshark, ExpressVPN y hide.me; gigantescas corporaciones de VPN con plataformas y prácticas comerciales poco fiables, famosas por sus agresivos programas de marketing y afiliación. -==**PrivacyTools se ha convertido exactamente en el tipo de sitio [contra el que advertimos](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) en el blog de PrivacyTools en 2019.**== Hemos intentado mantener las distancias con PrivacyTools desde la transición, pero su continuo acoso hacia nuestro proyecto y ahora su absurdo abuso de la credibilidad que su marca ha ganado a lo largo de 6 años de contribuciones de código abierto es extremadamente preocupante para nosotros. Los que realmente luchamos por la privacidad no estamos luchando entre nosotros, y no estamos recibiendo nuestro consejo del mejor postor. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Los que realmente luchamos por la privacidad no estamos luchando entre nosotros, y no estamos recibiendo nuestro consejo del mejor postor. ## r/privacytoolsIO Ahora -Después del lanzamiento de [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), era poco práctico para u/trai_dep continuar moderando ambos subreddits, y con la comunidad a bordo con la transición, r/privacytoolsIO se [hizo](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) un sub restringido en un post el 1 de noviembre de 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] El crecimiento de este Sub fue el resultado de un gran esfuerzo, a lo largo de varios años, del equipo de PrivacyGuides.org. Y por cada uno de ustedes. > @@ -89,7 +89,7 @@ Después del lanzamiento de [r/PrivacyGuides](https://www.reddit.com/r/privacygu Los subreddits no pertenecen a nadie, y especialmente no pertenecen a los titulares de las marcas. Pertenecen a sus comunidades, y la comunidad y sus moderadores tomaron la decisión de apoyar el traslado a r/PrivacyGuides. -En los meses posteriores, BurungHantu ha amenazado y rogado para que le devuelvan el control del subreddit a su cuenta en [violación](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) de las normas de Reddit: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > No se permiten las represalias por parte de ningún moderador con respecto a las solicitudes de eliminación. @@ -107,12 +107,12 @@ Por lo tanto, los fondos de OpenCollective pertenecen a Privacy Guides, fueron e Este tema se ha debatido ampliamente en nuestras comunidades en varios lugares, y parece probable que la mayoría de las personas que lean esta página ya estén familiarizadas con los acontecimientos que condujeron al cambio a Privacy Guides. Algunas de nuestras publicaciones anteriores sobre el tema pueden tener detalles adicionales que omitimos aquí por razones de brevedad. Se han enlazado a continuación para completarlo. -- [28 de junio de 2021: solicitud de control de r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [27 de julio de 2021: anuncio de nuestras intenciones de mudanza en el blog de PrivacyTools, escrito por el equipo](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [13 de septiembre de 2021: anuncio del inicio de nuestra transición a las Guías de Privacidad en r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [28 de junio de 2021: solicitud de control de r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [27 de julio de 2021: anuncio de nuestras intenciones de mudanza en el blog de PrivacyTools, escrito por el equipo](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [13 de septiembre de 2021: anuncio del inicio de nuestra transición a las Guías de Privacidad en r/privacytoolsIO](https://reddit.com/pnql46) - [17 de septiembre, 2021: anuncio en OpenCollective de Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [30 de septiembre de 2021: Hilo de Twitter en el que se detallan la mayoría de los acontecimientos que ahora se describen en esta página](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021: post de u/dng99 observando fallo de subdominio](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [2 de abril de 2022: respuesta de u/dng99 a la publicación acusatoria en el blog de PrivacyTools](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021: post de u/dng99 observando fallo de subdominio](https://reddit.com/comments/pymthv/comment/hexwrps) +- [2 de abril de 2022: respuesta de u/dng99 a la publicación acusatoria en el blog de PrivacyTools](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [16 de mayo de 2022: respuesta de @TommyTran732 en Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [3 de septiembre de 2022: post en el foro de Techlore por @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/es/advanced/communication-network-types.md b/i18n/es/advanced/communication-network-types.md index 979c36f9..6f4614c5 100644 --- a/i18n/es/advanced/communication-network-types.md +++ b/i18n/es/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Algunos servicios de mensajería autoalojados te permiten configurar tu propio s - Puede incluir [control o acceso restringido](https://drewdevault.com/2018/08/08/Signal.html). Esto puede incluir cosas como: - Estar [prohibido conectar clientes de terceros](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) a la red centralizada que podría proporcionar una mayor personalización o una mejor experiencia. A menudo se define en los Términos y condiciones de uso. - Documentación pobre o nula para desarrolladores de terceros. -- La [propiedad](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), política de privacidad y las operaciones del servicio pueden cambiar fácilmente cuando una sola entidad lo controla, potencialmente comprometiendo el servicio más adelante. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - El autoalojamiento requiere esfuerzo y conocimiento de cómo configurar un servicio. ## Redes Federadas @@ -60,7 +60,7 @@ Cuando autoalojados, miembros de un servidor federado pueden descubrir y comunic Los servicios de mensajería P2P se conectan a una [red distribuida](https://es.wikipedia.org/wiki/Red_distribuida) de nodos para transmitir un mensaje al destinatario sin necesidad de un servidor externo. -Los clientes (pares) usualmente se encuentran entre sí mediante el uso de una red de [computación distribuida](https://en.wikipedia.org/wiki/Distributed_computing). Ejemplos de esto incluyen la [Tabla de hash distribuida](https://es.wikipedia.org/wiki/Tabla_de_hash_distribuida) (DHT), usada por [torrents](https://es.wikipedia.org/wiki/BitTorrent) y [IPFS](https://es.wikipedia.org/wiki/Sistema_de_archivos_interplanetario) por ejemplo. Otro enfoque son las redes basadas en la proximidad, en las que se establece una conexión a través de WiFi o Bluetooth (por ejemplo, Briar o el protocolo de red social [Scuttlebutt](https://www.scuttlebutt.nz)). +Los clientes (pares) usualmente se encuentran entre sí mediante el uso de una red de [computación distribuida](https://en.wikipedia.org/wiki/Distributed_computing). Ejemplos de esto incluyen la [Tabla de hash distribuida](https://es.wikipedia.org/wiki/Tabla_de_hash_distribuida) (DHT), usada por [torrents](https://es.wikipedia.org/wiki/BitTorrent) y [IPFS](https://es.wikipedia.org/wiki/Sistema_de_archivos_interplanetario) por ejemplo. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Una vez que un par ha encontrado una ruta a su contacto a través de cualquiera de estos métodos, se establece una conexión directa entre ellos. Aunque los mensajes suelen estar encriptados, un observador puede deducir la ubicación y la identidad del remitente y del destinatario. diff --git a/i18n/es/advanced/dns-overview.md b/i18n/es/advanced/dns-overview.md index bc547d63..bfe2f857 100644 --- a/i18n/es/advanced/dns-overview.md +++ b/i18n/es/advanced/dns-overview.md @@ -18,7 +18,7 @@ A continuación, discutimos y proporcionamos un tutorial para probar lo que un o ### DNS Sin Encriptación -1. Usando [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (parte del proyecto [Wireshark](https://es.wikipedia.org/wiki/Wireshark)) podemos monitorear y registrar el flujo de paquetes de Internet. Este comando registra los paquetes que cumplen las reglas especificadas: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. Este comando registra los paquetes que cumplen las reglas especificadas: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ A continuación, discutimos y proporcionamos un tutorial para probar lo que un o nslookup privacyguides.org 8.8.8.8 ``` -3. A continuación, queremos [analizar](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) los resultados: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ DNS encriptado puede referirse a uno de un número de protocolos, los más comun ### DNS sobre TLS (DoT) -[**DNS sobre TLS**](https://es.wikipedia.org/wiki/DNS_mediante_TLS) es otro método para cifrar la comunicación DNS que se define en [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). La compatibilidad se implementó por primera vez en Android 9, iOS 14 y en Linux en [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) en la versión 237. La preferencia en la industria se ha estado alejando del DoT al DoH en los últimos años, ya que el DoT es un [protocolo complejo](https://dnscrypt.info/faq/) y tiene un cumplimiento variable del RFC en todas las implementaciones que existen. DoT también opera en un puerto dedicado 853 que puede ser bloqueado fácilmente por cortafuegos restrictivos. +[**DNS sobre TLS**](https://es.wikipedia.org/wiki/DNS_mediante_TLS) es otro método para cifrar la comunicación DNS que se define en [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT también opera en un puerto dedicado 853 que puede ser bloqueado fácilmente por cortafuegos restrictivos. ### DNS sobre HTTPS (DoH) @@ -106,7 +106,7 @@ En este ejemplo registraremos lo que sucede cuando hacemos una solicitud de DoH: wireshark -r /tmp/dns_doh.pcap ``` -Podemos ver el [establecimiento de la conexión](https://es.wikipedia.org/wiki/Protocolo_de_control_de_transmisi%C3%B3n#Establecimiento_de_la_conexi%C3%B3n_(negociaci%C3%B3n_en_tres_pasos)) y [enlace TLS](https://www.cloudflare.com/es-es/learning/ssl/what-happens-in-a-tls-handshake/) que ocurre con cualquier conexión encriptada. Al mirar los paquetes de "datos de aplicación" que siguen, ninguno de ellos contiene el dominio que solicitamos ni la dirección IP devuelta. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. Al mirar los paquetes de "datos de aplicación" que siguen, ninguno de ellos contiene el dominio que solicitamos ni la dirección IP devuelta. ## ¿Por qué **no debería** utilizar un DNS cifrado? @@ -158,9 +158,9 @@ La Indicación del Nombre del Servidor se suele utilizar cuando una dirección I tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -Esto significa que incluso si estamos utilizando servidores "DNS cifrados", es probable que el dominio se divulgue a través de SNI. El protocolo [TLS v1.3](https://es.wikipedia.org/wiki/Seguridad_de_la_capa_de_transporte#TLS_1.3) trae consigo [Client Hello Encriptado](https://blog.cloudflare.com/encrypted-client-hello/), que evita este tipo de fugas. +Esto significa que incluso si estamos utilizando servidores "DNS cifrados", es probable que el dominio se divulgue a través de SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Los gobiernos, en particular de [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) y [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), ya han [empezado a bloquearlo](https://es.wikipedia.org/wiki/Server_Name_Indication#Funcionamiento_de_ESNI) o han expresado su deseo de hacerlo. Recientemente, Rusia ha [comenzado a bloquear sitios web extranjeros](https://github.com/net4people/bbs/issues/108) que utilizan el estándar [HTTP/3](https://es.wikipedia.org/wiki/HTTP/3). Esto se debe a que el protocolo [QUIC](https://es.wikipedia.org/wiki/QUIC) que forma parte de HTTP/3 requiere que `ClientHello` también esté cifrado. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recientemente, Rusia ha [comenzado a bloquear sitios web extranjeros](https://github.com/net4people/bbs/issues/108) que utilizan el estándar [HTTP/3](https://es.wikipedia.org/wiki/HTTP/3). Esto se debe a que el protocolo [QUIC](https://es.wikipedia.org/wiki/QUIC) que forma parte de HTTP/3 requiere que `ClientHello` también esté cifrado. ### Protocolo de comprobación del Estado de un Certificado En línea (OCSP) @@ -289,7 +289,7 @@ El proceso de firma de DNSSEC es similar al de alguien que firma un documento le DNSSEC implementa una política de firma digital jerárquica en todas las capas del DNS. Por ejemplo, en el caso de una búsqueda en `privacyguides.org`, un servidor DNS raíz firmaría una clave para el servidor de nombres `.org`, y el servidor de nombres `.org` firmaría entonces una clave para el servidor de nombres autoritativo `privacyguides.org`. -Adaptado de [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) por Google y [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) por Cloudflare, ambos licensiados bajo [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## ¿Qué es la minimización de QNAME? diff --git a/i18n/es/advanced/payments.md b/i18n/es/advanced/payments.md index b454d8e8..fdcde8bd 100644 --- a/i18n/es/advanced/payments.md +++ b/i18n/es/advanced/payments.md @@ -9,7 +9,7 @@ Hay una razón por la que los datos sobre tus hábitos de compra se consideran e Durante siglos, **efectivo** ha funcionado como la principal forma de pago privado. El efectivo tiene excelentes propiedades de privacidad en la mayoría de los casos, es ampliamente aceptado en la mayoría de los países y es **fungible**, lo que significa que no es único y es completamente intercambiable. -La legislación sobre pagos en efectivo varía según el país. En Estados Unidos, los pagos en efectivo superiores a 10.000 dólares deben declararse al IRS en el[ formulario 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). La empresa receptora está obligada a verificar el nombre, la dirección, la ocupación, la fecha de nacimiento y el número de la Seguridad Social u otro NIF del beneficiario (con algunas excepciones). Existen límites más bajos sin identificación, como 3.000 dólares o menos, para los intercambios y la transmisión de dinero. El dinero en efectivo también contiene números de serie. Casi nunca son rastreados por los comerciantes, pero pueden ser utilizados por las fuerzas de seguridad en investigaciones específicas. +La legislación sobre pagos en efectivo varía según el país. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). La empresa receptora está obligada a verificar el nombre, la dirección, la ocupación, la fecha de nacimiento y el número de la Seguridad Social u otro NIF del beneficiario (con algunas excepciones). Existen límites más bajos sin identificación, como 3.000 dólares o menos, para los intercambios y la transmisión de dinero. El dinero en efectivo también contiene números de serie. Casi nunca son rastreados por los comerciantes, pero pueden ser utilizados por las fuerzas de seguridad en investigaciones específicas. A pesar de ello, suele ser la mejor opción. @@ -60,7 +60,7 @@ Existen varios proyectos de criptomonedas que pretenden proporcionar privacidad - [Criptomoneda Recomendada :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Las monedas de privacidad han sido objeto de un creciente escrutinio por parte de organismos gubernamentales. En 2020, [el IRS publicó una recompensa de 625.000 dólares](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) para herramientas que puedan romper Bitcoin Lightning Network y/o la privacidad de las transacciones de Monero. En última instancia, [pagó a dos empresas](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis e Integra Fec) una suma combinada de 1,25 millones de dólares por herramientas que supuestamente lo hacen (se desconoce a qué red de criptomonedas se dirigen estas herramientas). Debido al secretismo que rodea a este tipo de herramientas, ==ninguno de estos métodos de rastreo de criptomonedas ha sido confirmado de forma independiente.== Sin embargo, es bastante probable que existan herramientas que ayuden a realizar investigaciones específicas sobre las transacciones de monedas privadas, y que éstas sólo consigan frustrar la vigilancia masiva. +Las monedas de privacidad han sido objeto de un creciente escrutinio por parte de organismos gubernamentales. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. En última instancia, [pagó a dos empresas](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis e Integra Fec) una suma combinada de 1,25 millones de dólares por herramientas que supuestamente lo hacen (se desconoce a qué red de criptomonedas se dirigen estas herramientas). Debido al secretismo que rodea a este tipo de herramientas, ==ninguno de estos métodos de rastreo de criptomonedas ha sido confirmado de forma independiente.== Sin embargo, es bastante probable que existan herramientas que ayuden a realizar investigaciones específicas sobre las transacciones de monedas privadas, y que éstas sólo consigan frustrar la vigilancia masiva. ### Otras Monedas (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ En el caso de las criptomonedas existen dos tipos de monederos: los monederos co ### Adquisición -Adquirir [criptomonedas](../cryptocurrency.md) como Monero de forma privada puede ser difícil. Los mercados P2P como [LocalMonero](https://localmonero.co/), una plataforma que facilita el comercio entre personas, son una opción que se puede utilizar. Si el uso de un intercambio que requiere KYC es un riesgo aceptable para ti, siempre y cuando las transacciones posteriores no puedan ser rastreadas, una opción mucho más fácil es comprar Monero en un intercambio como [Kraken](https://kraken.com/), o comprar Bitcoin / Litecoin de un intercambio KYC que luego se puede cambiar por Monero. A continuación, puedes retirar el Monero comprado a su propio monedero no custodio para utilizarlo de forma privada a partir de ese momento. +Adquirir [criptomonedas](../cryptocurrency.md) como Monero de forma privada puede ser difícil. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. A continuación, puedes retirar el Monero comprado a su propio monedero no custodio para utilizarlo de forma privada a partir de ese momento. Si sigues este camino, asegúrate de comprar Monero en momentos diferentes y en cantidades distintas a las que lo gastarás. Si compras 5.000 dólares de Monero en una bolsa y haces una compra de 5.000 dólares en Monero una hora más tarde, esas acciones podrían ser potencialmente correlacionadas por un observador externo independientemente del camino que haya tomado el Monero. Escalonar las compras y adquirir grandes cantidades de Monero por adelantado para luego gastarlas en múltiples transacciones más pequeñas puede evitar este escollo. diff --git a/i18n/es/advanced/tor-overview.md b/i18n/es/advanced/tor-overview.md index a03d4579..853eb923 100644 --- a/i18n/es/advanced/tor-overview.md +++ b/i18n/es/advanced/tor-overview.md @@ -21,7 +21,7 @@ Si tienes la posibilidad de acceder a un proveedor VPN de confianza y **cualquie Como ya [generalmente recomendamos](../basics/vpn-overview.md) que la gran mayoría de la gente use un proveedor VPN de confianza por una variedad de razones, la siguiente recomendación sobre conectarse a Tor a través de una VPN probablemente se aplique a ti. No hay necesidad de desactivar tu VPN antes de conectarte a Tor, como algunos recursos en línea te hacen creer. -Conectarse directamente a Tor hará que tu conexión destaque ante cualquier administrador de red local o tu ISP. Detectar y correlacionar este tráfico [se ha hecho](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) en el pasado por administradores de red para identificar y desanonimizar usuarios Tor específicos en su red. Por otra parte, conectarse a una VPN es casi siempre menos sospechoso, porque los proveedores comerciales de VPN son utilizados por los consumidores cotidianos para una variedad de tareas mundanas como eludir las restricciones geográficas, incluso en países con fuertes restricciones de Internet. +Conectarse directamente a Tor hará que tu conexión destaque ante cualquier administrador de red local o tu ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. Por otra parte, conectarse a una VPN es casi siempre menos sospechoso, porque los proveedores comerciales de VPN son utilizados por los consumidores cotidianos para una variedad de tareas mundanas como eludir las restricciones geográficas, incluso en países con fuertes restricciones de Internet. Por lo tanto, debes hacer un esfuerzo para ocultar tu dirección IP **antes de** conectarte a la red Tor. Puedes hacerlo simplemente conectándote a una VPN (a través de un cliente instalado en tu ordenador) y luego accediendo a [Tor](../tor.md) de forma normal, a través de Tor Browser, por ejemplo. Esto crea una cadena de conexión como: @@ -72,7 +72,7 @@ Como ya hemos aludido, Tor también es fácilmente identificable en la red. A di ### El uso de Tor no es indetectable -**Incluso si usas puentes y transportes conectables (pluggable transports),** el Proyecto Tor no proporciona herramientas para ocultar a tu ISP el hecho de que estás usando Tor. Ni siquiera el uso de "transportes conectables" ofuscados o puentes no públicos ocultan el hecho de que se está utilizando un canal de comunicaciones privado. Los transportes conectables más populares como obfs4 (que ofusca tu tráfico para que "parezca nada") y meek (que utiliza "domain fronting" para camuflar tu tráfico) pueden ser [detectados](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) con técnicas de análisis de tráfico bastante estándar. Snowflake tiene problemas similares, y puede ser [fácilmente detectado](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *antes de que* se establezca una conexión Tor. +**Incluso si usas puentes y transportes conectables (pluggable transports),** el Proyecto Tor no proporciona herramientas para ocultar a tu ISP el hecho de que estás usando Tor. Ni siquiera el uso de "transportes conectables" ofuscados o puentes no públicos ocultan el hecho de que se está utilizando un canal de comunicaciones privado. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Existen transportes conectables distintos de estos tres, pero normalmente se basan en la seguridad a través de la oscuridad para eludir la detección. No son imposibles de detectar, solo que los utiliza tan poca gente que no merece la pena construir detectores para ellos. No se debe confiar en ellos si te están vigilando específicamente. @@ -193,6 +193,6 @@ Es [posible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-with-re - [¿Cómo funciona Tor? - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Servicios Onion de Tor - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: El primer repetidor en tu circuito se llama "guardia de entrada" o "guardia". Es un repetidor rápido y estable que se mantiene como el primero en tu circuito durante 2-3 meses para protegerse de un ataque conocido de ruptura del anonimato. El resto de tu circuito cambia con cada nuevo sitio web que visitas, y todos juntos estos repetidores proporcionan las protecciones de privacidad completas de Tor. Para obtener más información sobre el funcionamiento de los repetidores de protección, consulta esta [entrada del blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) y el [documento](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sobre los guardias de entrada. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: El primer repetidor en tu circuito se llama "guardia de entrada" o "guardia". Es un repetidor rápido y estable que se mantiene como el primero en tu circuito durante 2-3 meses para protegerse de un ataque conocido de ruptura del anonimato. El resto de tu circuito cambia con cada nuevo sitio web que visitas, y todos juntos estos repetidores proporcionan las protecciones de privacidad completas de Tor. Para obtener más información sobre el funcionamiento de los repetidores de protección, consulta esta [entrada del blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) y el [documento](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sobre los guardias de entrada. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Bandera de repetidor: una (des)calificación de los repetidores para las posiciones de los circuitos (por ejemplo, "Guardia", "Salida", "MalaSalida"), las propiedades de los circuitos (por ejemplo, "Rápido", "Estable"), o los roles (por ejemplo, "Autoridad", "HSDir"), tal y como los asignan las autoridades de los directorios y se definen con más detalle en la especificación del protocolo del directorio. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/es/android.md b/i18n/es/android.md index a9ea977f..1e2262c8 100644 --- a/i18n/es/android.md +++ b/i18n/es/android.md @@ -83,9 +83,9 @@ schema: El **proyecto de código abierto de Android** es un sistema operativo móvil de código abierto liderado por Google, que está detrás de la mayor parte de los dispositivos móviles del mundo. La mayor parte de los teléfono vendidos con Android son modificados para incluir integraciones y aplicaciones invasivas como los servicios de Google Play, así que puedes mejorar la privacidad de tu dispositivo móvil de manera significativa al reemplazar la instalación predeterminada de tu teléfono con una versión de Android sin esas características invasivas. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Página Principal } -[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentación} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Código Fuente" } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } +[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } Estos son los sistemas operativos Android, dispositivos y aplicaciones que recomendamos para maximizar la seguridad y privacidad de tu dispositivo móvil. Para obtener más información sobre Android: @@ -113,27 +113,27 @@ Los dispositivos al final de su vida útil (como GrapheneOS o los dispositivos d GrapheneOS proporciona mejoras [adicionales de seguridad](https://en.wikipedia.org/wiki/Hardening_(computing)) y privacidad. Dispone de un [asignador de memoria reforzado](https://github.com/GrapheneOS/hardened_malloc), permisos de red y de sensores, y otras [características de seguridad](https://grapheneos.org/features). GrapheneOS también incluye actualizaciones completas de firmware y compilaciones firmadas, por lo que el arranque verificado es totalmente compatible. -[:octicons-home-16: Página Principal](https://grapheneos.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://grapheneos.org/faq/){ .card-link title=Documentación} -[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://grapheneos.org/donate/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } -GrapheneOS es compatible con [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), que ejecuta [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) totalmente sandboxed como cualquier otra aplicación normal. Esto significa que puede aprovechar la mayoría de los servicios de Google Play, como [notificaciones push](https://firebase.google.com/docs/cloud-messaging/), al tiempo que le da un control total sobre sus permisos y acceso, y mientras que los contiene a un [perfil de trabajo](os/android-overview.md#work-profile) o [perfil de usuario](os/android-overview.md#user-profiles) específico de su elección. +GrapheneOS es compatible con [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), que ejecuta [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) totalmente sandboxed como cualquier otra aplicación normal. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Los teléfonos Pixel de Google son los únicos dispositivos que actualmente cumplen los [requisitos de seguridad de hardware ](https://grapheneos.org/faq#device-support)de GrapheneOS. -[Por qué recomendamos GrapheneOS sobre CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Por qué recomendamos GrapheneOS sobre CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS
-![Logo de DivestOS](assets/img/android/divestos.svg){ align=right } +![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** es un soft-fork de [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS hereda muchos [dispositivos compatibles](https://divestos.org/index.php?page=devices&base=LineageOS) de LineageOS. Tiene compilaciones firmadas, lo que hace posible tener [arranque verificado](https://source.android.com/security/verifiedboot) en algunos dispositivos que no son Pixel. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS hereda muchos [dispositivos compatibles](https://divestos.org/index.php
-DivestOS ha automatizado la vulnerabilidad del kernel ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [parcheando](https://gitlab.com/divested-mobile/cve_checker), menos bloques propietarios, y un archivo personalizado [hosts](https://divested.dev/index.php?page=dnsbl). Su WebView reforzado, [Mulch](https://gitlab.com/divested-mobile/mulch), permite [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) para todas las arquitecturas, [partición del estado de la red](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) y recibe actualizaciones fuera de banda. DivestOS también incluye parches de GrapheneOS para el kernel y habilita todas las características de seguridad del kernel disponibles a través de [endurecimiento defconfig](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). Todos los kernels más recientes que la versión 3.4 incluyen [saneamiento](https://lwn.net/Articles/334747/) de página completa y todos los ~22 kernels compilados por Clang tienen [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) habilitado. +DivestOS ha automatizado la vulnerabilidad del kernel ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [parcheando](https://gitlab.com/divested-mobile/cve_checker), menos bloques propietarios, y un archivo personalizado [hosts](https://divested.dev/index.php?page=dnsbl). Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS también incluye parches de GrapheneOS para el kernel y habilita todas las características de seguridad del kernel disponibles a través de [endurecimiento defconfig](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implementa algunos parches de endurecimiento del sistema desarrollados originalmente para GrapheneOS. DivestOS 16.0 y superior implementa los permisos de GrapheneOS [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) y SENSORS, [asignador de memoria endurecido](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constificación](https://en.wikipedia.org/wiki/Const_(computer_programming)), y parches de endurecimiento parcial [biónico](https://en.wikipedia.org/wiki/Bionic_(software)). A partir de la versión 17.1, GrapheneOS ofrece la opción de [MAC aleatoria por red ](https://en.wikipedia.org/wiki/MAC_address#Randomization), el control [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) y las opciones de reinicio automático/Wi-Fi/Bluetooth [timeout](https://grapheneos.org/features). +DivestOS implementa algunos parches de endurecimiento del sistema desarrollados originalmente para GrapheneOS. DivestOS 16.0 y superior implementa los permisos de GrapheneOS [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) y SENSORS, [asignador de memoria endurecido](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constificación](https://en.wikipedia.org/wiki/Const_(computer_programming)), y parches de endurecimiento parcial [biónico](https://en.wikipedia.org/wiki/Bionic_(software)). 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS utiliza F-Droid como su tienda de aplicaciones por defecto. Por lo general [recomendamos evitar F-Droid](#f-droid), pero hacerlo en DivestOS no es viable; los desarrolladores actualizan sus aplicaciones a través de sus propios repositorios de F-Droid ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) y [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). Recomendamos desactivar la aplicación oficial de F-Droid y usar [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **con los repositorios de DivestOS activados** para mantener los componentes actualizados. Para las demás aplicaciones, se siguen aplicando nuestros métodos recomendados para obtenerlas. +DivestOS utiliza F-Droid como su tienda de aplicaciones por defecto. Por lo general [recomendamos evitar F-Droid](#f-droid), pero hacerlo en DivestOS no es viable; los desarrolladores actualizan sus aplicaciones a través de sus propios repositorios de F-Droid ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) y [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. Para las demás aplicaciones, se siguen aplicando nuestros métodos recomendados para obtenerlas.

Advertencia

@@ -166,13 +166,13 @@ Al comprar un dispositivo, recomendamos obtener uno lo más nuevo posible. El so Evita comprar teléfonos a operadores de redes móviles. Estos suelen tener un **bootloader bloqueado** y no admiten [desbloqueo OEM](https://source.android.com/devices/bootloader/locking_unlocking). Estas variantes de teléfono te impedirán instalar cualquier tipo de distribución alternativa de Android. -Ten mucho **cuidado** con la compra de teléfonos de segunda mano de los mercados en línea. Comprueba siempre la reputación del vendedor. Si el dispositivo es robado, existe la posibilidad de que se introduzca en la [base de datos de IMEI](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). También existe el riesgo de que se te asocie con la actividad del propietario anterior. +Ten mucho **cuidado** con la compra de teléfonos de segunda mano de los mercados en línea. Comprueba siempre la reputación del vendedor. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). También existe el riesgo de que se te asocie con la actividad del propietario anterior. Algunos consejos más sobre los dispositivos Android y la compatibilidad del sistema operativo: - No compres dispositivos que hayan alcanzado o estén cerca del final de su vida útil, las actualizaciones adicionales del firmware deben ser proporcionadas por el fabricante. - No compres teléfonos LineageOS, OS precargados o cualquier teléfono Android sin el soporte adecuado, [Arranque verificado](https://source.android.com/security/verifiedboot) y actualizaciones de firmware. Tampoco tienes forma de comprobar si estos dispositivos han sido manipulados. -- En resumen, si un dispositivo o una distribución de Android no aparece aquí, probablemente haya una buena razón. Consulta nuestro [foro](https://discuss.privacyguides.net/) para obtener más información. +- En resumen, si un dispositivo o una distribución de Android no aparece aquí, probablemente haya una buena razón. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Los elementos seguros como el Titan M2 son más limitados que el entorno de ejec Los teléfonos Google Pixel utilizan un SO TEE llamado Trusty que es de [código abierto](https://source.android.com/security/trusty#whyTrusty), a diferencia de muchos otros teléfonos. -La instalación de GrapheneOS en un teléfono Pixel es fácil con su [instalador web](https://grapheneos.org/install/web). Si no te sientes cómodo haciéndolo tu mismo y estás dispuesto a gastar un poco más de dinero, échale un vistazo a [NitroPhone](https://shop.nitrokey.com/shop), ya que vienen con GrapheneOS, de la reputada empresa [Nitrokey](https://www.nitrokey.com/about). +La instalación de GrapheneOS en un teléfono Pixel es fácil con su [instalador web](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. Algunos consejos más para comprar un Google Pixel: @@ -218,16 +218,16 @@ En este sitio recomendamos una amplia variedad de aplicaciones para Android. Las Shelter permite bloquear la búsqueda de contactos entre perfiles y compartir archivos entre perfiles a través del gestor de archivos predeterminado ([DocumentsUI](https://source.android.com/devices/architecture/modular-system/documentsui)). -[:octicons-repo-16: Repositorio](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } -[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribuir } +[:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } +[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Advertencia

-Se recomienda Shelter en lugar de [Insular](https://secure-system.gitlab.io/Insular/) e [Island](https://github.com/oasisfeng/island), ya que admite [bloqueo de búsqueda de contactos](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). Al usar Shelter, está depositando toda su confianza en su desarrollador, ya que Shelter actúa como [Administrador de dispositivos](https://developer.android.com/guide/topics/admin/device-admin) para crear el perfil de trabajo, y tiene un amplio acceso a los datos almacenados en él. @@ -322,11 +322,11 @@ Los metadatos de orientación de la imagen no se borran. Si habilitas la ubicaci
-Obtenium te permite descargar archivos instaladores APK desde una gran variedad de fuentes, y depende de ti asegurarte que esas fuentes y aplicaciones son legítimas. Por ejemplo, utilizar Obtainium para instalar Signal desde [la página oficial de Signal](https://signal.org/android/apk/) puede estar bien, pero realizar la instalación desde repositorios de terceros como Aptoide o APKPure puede generar riesgos adicionales. El riesgo de instalar una *actualización* maliciosa es bajo, porque Android verifica por sí mismo que todas las actualizaciones de aplicaciones estén firmadas por el mismo desarrollador de las aplicaciones existentes antes de ser instaladas. +Obtenium te permite descargar archivos instaladores APK desde una gran variedad de fuentes, y depende de ti asegurarte que esas fuentes y aplicaciones son legítimas. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. El riesgo de instalar una *actualización* maliciosa es bajo, porque Android verifica por sí mismo que todas las actualizaciones de aplicaciones estén firmadas por el mismo desarrollador de las aplicaciones existentes antes de ser instaladas. ### Tienda de aplicaciones GrapheneOS -La tienda de aplicaciones de GrapheneOS está disponible en [GitHub](https://github.com/GrapheneOS/Apps/releases). Soporta Android 12 o superior y es capaz de actualizarse a sí mismo. La tienda de aplicaciones cuenta con aplicaciones independientes creadas por el proyecto GrapheneOS, como [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera)y [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). Si estás buscando estas aplicaciones, te recomendamos que las obtengas desde la tienda de aplicaciones de GrapheneOS en lugar de la Play Store, ya que las aplicaciones en su tienda están firmadas por la propia firma del proyecto de GrapheneOS a la que Google no tiene acceso. +La tienda de aplicaciones de GrapheneOS está disponible en [GitHub](https://github.com/GrapheneOS/Apps/releases). Soporta Android 12 o superior y es capaz de actualizarse a sí mismo. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). Si estás buscando estas aplicaciones, te recomendamos que las obtengas desde la tienda de aplicaciones de GrapheneOS en lugar de la Play Store, ya que las aplicaciones en su tienda están firmadas por la propia firma del proyecto de GrapheneOS a la que Google no tiene acceso. ### Aurora Store @@ -338,9 +338,9 @@ La tienda de Google Play requiere una cuenta de Google para iniciar sesión, lo **Aurora Store** es un cliente de Google Play Store que no requiere de una cuenta de Google, Servicios Google Play, o microG para descargar aplicaciones. -[:octicons-home-16: Página Principal](https://auroraoss.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Política de Privacidad" } -[:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" }
Downloads "Descargas" @@ -375,7 +375,7 @@ En GitLab, utilizando [Aurora Store](#aurora-store) como ejemplo, irías a su [r Si descargas archivos APK para instalar manualmente, puedes verificar su firma con la herramienta [`apksigner`](https://developer.android.com/studio/command-line/apksigner), que es parte de Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Instala [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Descarga las [herramientas de línea de comandos de Android Studio](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ Si descargas archivos APK para instalar manualmente, puedes verificar su firma c ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. Los hashes resultantes pueden compararse con otra fuente. Algunos desarrolladores como Signal [muestran las firmas](https://signal.org/android/apk/) en su sitio web. +5. Los hashes resultantes pueden compararse con otra fuente. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ Si descargas archivos APK para instalar manualmente, puedes verificar su firma c ![Logotipo de F-Droid](assets/img/android/f-droid.svg){ align=right width=120px } -==Sólo recomendamos F-Droid como manera de obtener aplicaciones que no se pueden obtener por los métodos anteriores.== F-Droid regularmente es recomendado como una alternativa a Google Play, particularmente en la comunidad de la privacidad. La opción de añadir repositorios de terceros y no limitarse al jardín amurallado de Google ha dado lugar a su popularidad. Además, F-Droid tiene [compilaciones reproducibles](https://f-droid.org/en/docs/Reproducible_Builds/) para algunas aplicaciones y está dedicado a software libre y de código abierto. Sin embargo, hay algunas desventajas relacionadas con la seguridad en cómo F-Droid compila, firma y entrega paquetes: +==Sólo recomendamos F-Droid como manera de obtener aplicaciones que no se pueden obtener por los métodos anteriores.== F-Droid regularmente es recomendado como una alternativa a Google Play, particularmente en la comunidad de la privacidad. La opción de añadir repositorios de terceros y no limitarse al jardín amurallado de Google ha dado lugar a su popularidad. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. Sin embargo, hay algunas desventajas relacionadas con la seguridad en cómo F-Droid compila, firma y entrega paquetes: Debido a su proceso de compilación de aplicaciones, las aplicaciones en el repositorio oficial de F-Droid suelen quedarse atrás en las actualizaciones. Los mantenedores de F-Droid también reutilizan IDs de paquetes mientras firman aplicaciones con sus propias claves, lo que no es ideal ya que le da al equipo F-Droid la máxima confianza. Adicionalmente, los requisitos para que una aplicación se incluya en el repositorio oficial de F-Droid son menos estrictos a comparación con otras tiendas de aplicaciones como Google Play, significando que F-Droid ofrece muchas aplicaciones desactualizadas, sin mantenimiento o que incumplen con los [estándares de seguridad modernos](https://developer.android.com/google/play/requirements/target-sdk). -Otros repositorios de terceros para F-Droid como [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) remedian algunas de estas preocupaciones. El repositorio de IzzyOnDroid se construye directamente desde GitHub y es lo mejor para los repositorios propios de los desarrolladores. Sin embargo, esto no podemos recomendarlo en su totalidad, porque las aplicaciones suelen ser [removidas](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) del repositorio, si luego estas son agregadas al repositorio oficial de F-Droid. Si bien esto tiene sentido (ya que el objetivo de ese repositorio en particular es alojar aplicaciones antes de que sean aceptadas en el repositorio principal de F-Droid), puede dejarte con aplicaciones instaladas que ya no reciben actualizaciones. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. El repositorio de IzzyOnDroid se construye directamente desde GitHub y es lo mejor para los repositorios propios de los desarrolladores. Sin embargo, esto no podemos recomendarlo en su totalidad, porque las aplicaciones suelen ser [removidas](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) del repositorio, si luego estas son agregadas al repositorio oficial de F-Droid. Si bien esto tiene sentido (ya que el objetivo de ese repositorio en particular es alojar aplicaciones antes de que sean aceptadas en el repositorio principal de F-Droid), puede dejarte con aplicaciones instaladas que ya no reciben actualizaciones. -Dicho esto, los repositorios de [F-Droid](https://f-droid.org/en/packages/) e [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) son el hogar de muchas aplicaciones, lo que los convierte en una herramienta útil para buscar y descubrir aplicaciones de código abierto que se pueden descargar a través de otros medios como la Play Store, Aurora Store u obteniendo el archivo APK directamente del desarrollador. Deberías utilizar tu mejor criterio al buscar nuevas aplicaciones a través de este método y vigilar la frecuencia de actualización de la aplicación. Las aplicaciones desactualizadas pueden depender en librerías no compatibles, entre otras cosas, suponiendo un potencial riesgo de seguridad. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. Deberías utilizar tu mejor criterio al buscar nuevas aplicaciones a través de este método y vigilar la frecuencia de actualización de la aplicación. Las aplicaciones desactualizadas pueden depender en librerías no compatibles, entre otras cosas, suponiendo un potencial riesgo de seguridad.

F-Droid Basic

-En algunos raros casos, el desarrollador de una aplicación sólo la distribuirá a través de F-Droid ([Gadgetbridge](https://gadgetbridge.org/) es un ejemplo de ello). Si realmente necesitas una aplicación como esa, recomendamos utilizar el nuevo cliente [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) en vez de la aplicación original para obtenerla. F-Droid Basic puede realizar actualizaciones en segundo plano sin privilegios extendidos o root y cuenta con un conjunto limitado de características (limitando la superficie de ataque). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic puede realizar actualizaciones en segundo plano sin privilegios extendidos o root y cuenta con un conjunto limitado de características (limitando la superficie de ataque).
diff --git a/i18n/es/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/es/assets/img/how-tor-works/tor-encryption-dark.svg index a66f53a9..0f1e0716 100644 --- a/i18n/es/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/es/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Su - - Dispositivo - - - - Enviando datos a un sitio web - - - - - Recibiendo datos de un sitio web - - - - - Su - - Dispositivo - - - - Entrada - - - - - Medio - - - - - Salida - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entrada - - - - - Medio - - - - - Salida - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/es/assets/img/how-tor-works/tor-encryption.svg b/i18n/es/assets/img/how-tor-works/tor-encryption.svg index e36efa8a..f954fb0f 100644 --- a/i18n/es/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/es/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Su - - Dispositivo - - - - Enviando datos a un sitio web - - - - - Recibiendo datos de un sitio web - - - - - Su - - Dispositivo - - - - Entrada - - - - - Medio - - - - - Salida - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entrada - - - - - Medio - - - - - Salida - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/es/assets/img/how-tor-works/tor-path-dark.svg b/i18n/es/assets/img/how-tor-works/tor-path-dark.svg index 81f5ae3c..7f2488a0 100644 --- a/i18n/es/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/es/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Tu - Dispositivo - - - - Entrada - - - - - Medio - - - - - Salida - - - - - PrivacyGuides.org - - - - - - - - + + + + Tu + Dispositivo + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/es/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/es/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index 3787b56f..ce51beee 100644 --- a/i18n/es/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/es/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Su - - - Dispositivo - - - - - - Guardia - - - Repetidor - - - Repetidor - - - - - oculto...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Encuentro - - - Repetidor - - - - - Entrada - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/es/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/es/assets/img/how-tor-works/tor-path-hidden-service.svg index ccf4609e..8d008447 100644 --- a/i18n/es/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/es/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Su - - - Dispositivo - - - - - - Guardia - - - Repetidor - - - Repetidor - - - - - oculto...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Encuentro - - - Repetidor - - - - - Entrada - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/es/assets/img/how-tor-works/tor-path.svg b/i18n/es/assets/img/how-tor-works/tor-path.svg index d340730d..34945357 100644 --- a/i18n/es/assets/img/how-tor-works/tor-path.svg +++ b/i18n/es/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/es/basics/account-deletion.md b/i18n/es/basics/account-deletion.md index b25fe1a5..aac254d7 100644 --- a/i18n/es/basics/account-deletion.md +++ b/i18n/es/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: Es fácil acumular un gran número de cuentas de Internet, aquí tienes algunos consejos sobre cómo reducir tu colección. --- -Con el tiempo, puede ser fácil acumular varias cuentas en línea, muchas de las cuales puede que ya no utilices. Eliminar estas cuentas que no utilizas es un paso importante para recuperar tu privacidad, ya que las cuentas inactivas son vulnerables a las filtraciones de datos. Una filtración de datos se da cuando la seguridad de un servicio se ve comprometida y la información protegida es vista, transmitida o robada por actores no autorizados. Desafortunadamente, las filtraciones de datos son [demasiado comunes](https://haveibeenpwned.com/PwnedWebsites) en estos días, por lo que practicar una buena higiene digital es la mejor manera de minimizar el impacto que tienen en tu vida. El objetivo de esta guía es ayudarte a atravesar el fastidioso proceso de eliminación de cuentas para mejorar tu presencia en línea, lo que es a menudo dificultado por [un diseño engañoso](https://www.deceptive.design/). +Con el tiempo, puede ser fácil acumular varias cuentas en línea, muchas de las cuales puede que ya no utilices. Eliminar estas cuentas que no utilizas es un paso importante para recuperar tu privacidad, ya que las cuentas inactivas son vulnerables a las filtraciones de datos. Una filtración de datos se da cuando la seguridad de un servicio se ve comprometida y la información protegida es vista, transmitida o robada por actores no autorizados. Desafortunadamente, las filtraciones de datos son [demasiado comunes](https://haveibeenpwned.com/PwnedWebsites) en estos días, por lo que practicar una buena higiene digital es la mejor manera de minimizar el impacto que tienen en tu vida. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Buscar cuentas antiguas ### Administrador de contraseñas -Si tienes un gestor de contraseñas que has utilizado durante toda tu vida digital, esta parte será muy fácil. A menudo, incluyen funcionalidad integrada para detectar si tus credenciales fueron expuestas en una filtración de datos, como el [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/) (Reporte de filtración de datos) de Bitwarden. +Si tienes un gestor de contraseñas que has utilizado durante toda tu vida digital, esta parte será muy fácil. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Incluso si no has usado explícitamente un gestor de contraseñas antes, es probable que hayas usado el de tu navegador o el de tu teléfono sin darte cuenta. Por ejemplo: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) y [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Incluso si no has usado explícitamente un gestor de contraseñas antes, es probable que hayas usado el de tu navegador o el de tu teléfono sin darte cuenta. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Los sistemas operativos también suelen tener un gestor de contraseñas que puede ayudarte a recuperar contraseñas que has olvidado: -- Windows [Administrador de credenciales](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Contraseñas](https://support.apple.com/en-us/HT211145) -- iOS [Contraseñas](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, al cual se puede acceder a través de [Seahorse](https://wiki.gnome.org/Apps/Seahorse) o [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Correo Electrónico @@ -39,7 +39,7 @@ Cuando intentes recuperar el acceso, si el sitio devuelve un mensaje de error di ### RGPD (solamente residentes del EEE) -Los residentes del EEE tienen derechos adicionales en relación con la supresión de datos especificados en [el artículo 17](https://www.gdpr.org/regulation/article-17.html) del GDPR. Si es aplicable para ti, lee la política de privacidad del servicio para encontrar información sobre cómo ejercer tu derecho de eliminación. Leer la política de privacidad puede ser importante, ya que algunos servicios tienen una opción de "Borrar Cuenta" que solamente desactiva tu cuenta y para la eliminación real tienes que tomar acción adicional. A veces, la eliminación real puede implicar llenar formularios, enviar un correo electrónico al responsable de la protección de datos del servicio, o incluso demostrar tu residencia en el EEE. Si planeas seguir este camino, **no** sobrescribas la información de tu cuenta; es posible que se requiera tu identidad como residente del EEE. Ten en cuenta que la ubicación del servicio no importa; el RGPD se aplica a cualquiera que preste servicios a usuarios europeos. Si el servicio no respeta tu derecho de supresión de datos, puedes ponerte en contacto con tu [Autoridad de Protección de Datos](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_es) y puedes tener derecho a una compensación monetaria. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. Si es aplicable para ti, lee la política de privacidad del servicio para encontrar información sobre cómo ejercer tu derecho de eliminación. Leer la política de privacidad puede ser importante, ya que algunos servicios tienen una opción de "Borrar Cuenta" que solamente desactiva tu cuenta y para la eliminación real tienes que tomar acción adicional. A veces, la eliminación real puede implicar llenar formularios, enviar un correo electrónico al responsable de la protección de datos del servicio, o incluso demostrar tu residencia en el EEE. Si planeas seguir este camino, **no** sobrescribas la información de tu cuenta; es posible que se requiera tu identidad como residente del EEE. Ten en cuenta que la ubicación del servicio no importa; el RGPD se aplica a cualquiera que preste servicios a usuarios europeos. Si el servicio no respeta tu derecho de supresión de datos, puedes ponerte en contacto con tu [Autoridad de Protección de Datos](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_es) y puedes tener derecho a una compensación monetaria. ### Sobrescribir la información de la cuenta @@ -59,4 +59,4 @@ Aunque puedas eliminar una cuenta, no hay garantía de que toda tu información ## Evita Cuentas Nuevas -Como dice el refrán, "una onza de prevención vale más que una libra de cura." Cuando te sientas tentado a crear una nueva cuenta, pregúntate "¿realmente lo necesito? ¿Puedo lograr lo que necesito sin una cuenta?" A menudo puede ser mucho más difícil eliminar una cuenta que crearla. E incluso después de borrar o cambiar la información de tu cuenta, puede haber una versión en caché de un tercero, como en el [Internet Archive](https://archive.org/). Evita la tentación cuando puedas, ¡tu futuro yo te lo agradecerá! +Como dice el refrán, "una onza de prevención vale más que una libra de cura." Cuando te sientas tentado a crear una nueva cuenta, pregúntate "¿realmente lo necesito? ¿Puedo lograr lo que necesito sin una cuenta?" A menudo puede ser mucho más difícil eliminar una cuenta que crearla. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Evita la tentación cuando puedas, ¡tu futuro yo te lo agradecerá! diff --git a/i18n/es/basics/common-misconceptions.md b/i18n/es/basics/common-misconceptions.md index 75c2ba36..2052f833 100644 --- a/i18n/es/basics/common-misconceptions.md +++ b/i18n/es/basics/common-misconceptions.md @@ -88,7 +88,7 @@ Al comprar en línea, el uso de un [casillero de paquetes](https://en.wikipedia. 2. **Identidad desconocida** - Una identidad desconocida podría ser un seudónimo estable que utilizas con regularidad. No es anónimo porque no cambia. Si formas parte de una comunidad en línea, es posible que desees mantener un personaje que los demás conozcan. Este seudónimo no es anónimo porque, si se vigila durante el tiempo suficiente, los detalles sobre el propietario pueden revelar más información, como su forma de escribir, sus conocimientos generales sobre temas de interés, etc. -Es posible que desees utilizar una VPN para esto, para enmascarar tu dirección IP. Las transacciones financieras son más difíciles de enmascarar: Podrías considerar el uso de criptomonedas anónimas, como [Monero](https://www.getmonero.org/). El cambio a una moneda alternativa también puede ayudar a disfrazar dónde se originó tu moneda. Por lo general, los intercambios requieren que el KYC (conoce a tu cliente) se complete antes de que te permitan cambiar moneda fiduciaria a cualquier tipo de criptomoneda. Las opciones de encuentros locales también pueden ser una solución; sin embargo, suelen ser más caras y, a veces, también requieren KYC. +Es posible que desees utilizar una VPN para esto, para enmascarar tu dirección IP. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). El cambio a una moneda alternativa también puede ayudar a disfrazar dónde se originó tu moneda. Por lo general, los intercambios requieren que el KYC (conoce a tu cliente) se complete antes de que te permitan cambiar moneda fiduciaria a cualquier tipo de criptomoneda. Las opciones de encuentros locales también pueden ser una solución; sin embargo, suelen ser más caras y, a veces, también requieren KYC. 3. **Identidad anónima** - Incluso con experiencia, las identidades anónimas son difíciles de mantener durante largos periodos de tiempo. Deben ser identidades a corto plazo y de corta duración que roten regularmente. diff --git a/i18n/es/basics/common-threats.md b/i18n/es/basics/common-threats.md index 43373e82..46bcf20f 100644 --- a/i18n/es/basics/common-threats.md +++ b/i18n/es/basics/common-threats.md @@ -55,7 +55,7 @@ Por su diseño, los **navegadores web**, los **clientes de correo electrónico** -Si te preocupan los **ataques físicos** deberías utilizar un sistema operativo con una implementación de arranque seguro verificado, como Android, iOS, macOS o [Windows (con TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). También deberías asegurarte de que tu disco esté encriptado y de que el sistema operativo utiliza un TPM o Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) o [Element](https://developers.google.com/android/security/android-ready-se) para limitar los intentos de introducir la frase de contraseña de encriptación. Deberías evitar compartir tu ordenador con personas que no sean de tu confianza, ya que la mayoría de los sistemas operativos de escritorio no cifran los datos por separado para cada usuario. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). También deberías asegurarte de que tu disco esté encriptado y de que el sistema operativo utiliza un TPM o Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) o [Element](https://developers.google.com/android/security/android-ready-se) para limitar los intentos de introducir la frase de contraseña de encriptación. Deberías evitar compartir tu ordenador con personas que no sean de tu confianza, ya que la mayoría de los sistemas operativos de escritorio no cifran los datos por separado para cada usuario. ## Privacidad de los proveedores de servicios @@ -89,16 +89,16 @@ La vigilancia masiva es el intrincado esfuerzo por controlar el "comportamiento,

Atlas de la Vigilancia

-Si quiere saber más sobre los métodos de vigilancia y cómo se aplican en su ciudad, también puede echar un vistazo al [Atlas of Surveillance](https://atlasofsurveillance.org/) de la [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -En Francia puede consultar el sitio [Technolopolice](https://technopolice.fr/villes/), mantenido por la asociación sin ánimo de lucro La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Los gobiernos suelen justificar los programas de vigilancia masiva como medios necesarios para combatir el terrorismo y prevenir la delincuencia. Sin embargo, al vulnerar los derechos humanos, se utiliza con mayor frecuencia para atacar desproporcionadamente a grupos minoritarios y disidentes políticos, entre otros.
-

ACLU: La lección del 11-S sobre la privacidad: La Vigilancia Masiva No es el Camino a Seguir

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

Ante [las revelaciones de Edward Snowden sobre programas gubernamentales como [PRISM](https://es.wikipedia.org/wiki/PRISM) y [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], los funcionarios de inteligencia también admitieron que la NSA llevaba años recopilando en secreto registros sobre prácticamente todas las llamadas telefónicas de los estadounidenses: quién llama a quién, cuándo se hacen esas llamadas y cuánto duran. Este tipo de información, cuando es recopilada por la NSA día tras día, puede revelar detalles increíblemente sensibles sobre la vida y las asociaciones de las personas, como si han llamado a un pastor, a un proveedor de aborto, a un consejero de adicciones o a una línea directa de suicidio. @@ -144,7 +144,7 @@ La censura en línea puede ser llevada a cabo (en diversos grados) por actores q La censura en las plataformas corporativas es cada vez más común, ya que plataformas como Twitter y Facebook ceden a la demanda del público, a las presiones del mercado y a las de los organismos gubernamentales. Estos esfuerzos por controlar la comunicación y restringir el acceso a la información serán siempre incompatibles con el derecho humano a la Libertad de Expresión.[^5] -La censura en las plataformas corporativas es cada vez más común, ya que plataformas como Twitter y Facebook ceden a la demanda del público, a las presiones del mercado y a las de los organismos gubernamentales. Las presiones gubernamentales pueden ser peticiones encubiertas a las empresas, como la de la Casa Blanca [solicitando la retirada](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) de un vídeo provocativo de YouTube, o abiertamente, como la del gobierno chino exigiendo a las empresas que se adhieran a un estricto régimen de censura. +La censura en las plataformas corporativas es cada vez más común, ya que plataformas como Twitter y Facebook ceden a la demanda del público, a las presiones del mercado y a las de los organismos gubernamentales. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. Las personas preocupadas por la amenaza de la censura pueden utilizar tecnologías como [Tor](../advanced/tor-overview.md) para eludirla, y apoyar plataformas de comunicación resistentes a la censura como [Matrix](../real-time-communication.md#element), que no tiene una autoridad de cuentas centralizada que pueda cerrar cuentas arbitrariamente. @@ -162,5 +162,5 @@ Siempre debes tener en cuenta los riesgos de intentar saltarse la censura, las p [^1]: Wikipedia: [*Vigilancia masiva*](https://es.wikipedia.org/wiki/Vigilancia_masiva) y [*Vigilancia*](https://es.wikipedia.org/wiki/Vigilancia). [^2]: Junta de Supervisión de la Privacidad y las Libertades Civiles de los Estados Unidos: [*Informe sobre el Programa de Registros Telefónicos llevado a cabo bajo la Sección 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Capitalismo de vigilancia*](https://es.wikipedia.org/wiki/Capitalismo_de_vigilancia) -[^4]: "[Enumerar lo malo](https://www.ranum.com/security/computer_security/editorials/dumb/)" (o, "enumerar todas las cosas malas que conocemos"), como hacen muchos bloqueadores de contenidos y programas antivirus, no consigue protegerle adecuadamente de amenazas nuevas y desconocidas porque aún no se han añadido a la lista de filtros. También deberías emplear otras técnicas de mitigación. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. También deberías emplear otras técnicas de mitigación. [^5]: Naciones Unidas: [*La Declaración Universal de Derechos Humanos*](https://www.un.org/es/about-us/universal-declaration-of-human-rights). diff --git a/i18n/es/basics/email-security.md b/i18n/es/basics/email-security.md index 8f70d6c6..2be67cc3 100644 --- a/i18n/es/basics/email-security.md +++ b/i18n/es/basics/email-security.md @@ -13,7 +13,7 @@ En consecuencia, el correo electrónico se utiliza mejor para recibir correos el La forma estándar de añadir E2EE a los correos electrónicos entre diferentes proveedores de correo electrónico es utilizando OpenPGP. Existen diferentes implementaciones del estándar OpenPGP, siendo las más comunes [GnuPG](https://es.wikipedia.org/wiki/GNU_Privacy_Guard) y [OpenPGP.js](https://openpgpjs.org). -Hay otro estándar que es popular entre las empresas llamada [S/MIME](https://es.wikipedia.org/wiki/S/MIME), sin embargo, requiere un certificado emitido por una [Autoridad de certificación](https://es.wikipedia.org/wiki/Autoridad_de_certificaci%C3%B3n) (no todos emiten certificados S/MIME). Tiene soporte en [Google Workplace](https://support.google.com/a/topic/9061730?hl=es&%3Bref_topic=9061731) y [Outlook para Web o Exchange Server 2016, 2019](https://support.microsoft.com/es-es/office/cifrar-mensajes-mediante-s-mime-en-outlook-en-la-web-878c79fc-7088-4b39-966f-14512658f480?ui=en-us&rs=en-us&ad=us). +Hay otro estándar que es popular entre las empresas llamada [S/MIME](https://es.wikipedia.org/wiki/S/MIME), sin embargo, requiere un certificado emitido por una [Autoridad de certificación](https://es.wikipedia.org/wiki/Autoridad_de_certificaci%C3%B3n) (no todos emiten certificados S/MIME). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Incluso si utilizas OpenPGP, no admite el [secreto perfecto hacia adelante](https://es.wikipedia.org/wiki/Perfect_forward_secrecy), lo que significa que si alguna vez se roba tu clave privada o la del destinatario, todos los mensajes anteriores cifrados con ella se expondrán. Es por eso que recomendamos [servicios de mensajería instantáneos](../real-time-communication.md) que implementan el secreto perfecto hacia adelante por sobre el correo electrónico para las comunicaciones de persona a persona siempre que sea posible. @@ -23,7 +23,7 @@ El estándar de Directorio de Claves Web (WKD, por sus siglas en inglés) permit Además de los [clientes de correo electrónico que recomendamos](../email-clients.md) y son compatibles con WKD, algunos clientes web de correo electrónico también son compatibles con WKD. Si *tu propia* clave es publicada en WKD para que otros la utilicen, esto dependerá de tu configuración de dominio. Si utilizas un [proveedor de correo electrónico](../email.md#openpgp-compatible-services) compatible con WKD, como Proton Mail o Mailbox.org, ellos pueden publicar tu clave OpenPGP en su dominio por usted. -Su utilizas tu propio dominio personalizado, necesitarás configurar WKD por separado. Si tienes control sobre tu nombre de dominio, puedes configurar WKD sin importar el proveedor de correo electrónico que utilices. Una manera fácil de hacer esto es utilizar la característica de "[WKD como servicio](https://keys.openpgp.org/about/usage#wkd-as-a-service)", deste keys.openpgp.org, al configurar un registro CNAME en el subdominio de `openpgpkey` de tu dominio, apuntando a `wkd.keys.openpgp.org`, y después publicando tu clave en [keys.openpgp.org](https://keys.openpgp.org/). De manera alternativa, puedes [hospedar WKD en tu propio servidor web](https://wiki.gnupg.org/WKDHosting). +Su utilizas tu propio dominio personalizado, necesitarás configurar WKD por separado. Si tienes control sobre tu nombre de dominio, puedes configurar WKD sin importar el proveedor de correo electrónico que utilices. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). De manera alternativa, puedes [hospedar WKD en tu propio servidor web](https://wiki.gnupg.org/WKDHosting). Si utilizar un dominio compartido desde un proveedor no compatible con WKD, como @gmail.com, no podrás compartir tu clave OpenPGP con otros a través de este método. @@ -33,7 +33,7 @@ Los proveedores de correo electrónico que permiten utilizar protocolos de acces ### ¿Cómo puedo proteger mis claves privadas? -Una tarjeta inteligente (como una [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) o una [Nitrokey](https://www.nitrokey.com)) funciona recibiendo un mensaje de correo electrónico cifrado desde un dispositivo (teléfono, tableta, ordenador, etc.) que ejecuta un cliente de correo electrónico/correo web. El mensaje es entonces descifrado por la tarjeta inteligente y el contenido descifrado es enviado de vuelta al dispositivo. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. El mensaje es entonces descifrado por la tarjeta inteligente y el contenido descifrado es enviado de vuelta al dispositivo. Es ventajoso para el descifrado que suceda en la tarjeta inteligente para evitar la posible exposición de tu clave privada en un dispositivo comprometido. diff --git a/i18n/es/basics/multi-factor-authentication.md b/i18n/es/basics/multi-factor-authentication.md index 09ccbf1c..a7a5293b 100644 --- a/i18n/es/basics/multi-factor-authentication.md +++ b/i18n/es/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ El TOTP es una de las formas más comunes de MFA disponibles. Cuando se configur El código de tiempo limitado se deriva entonces del secreto compartido y de la hora actual. Como el código sólo es válido durante un corto periodo de tiempo, sin acceso al secreto compartido, un adversario no puede generar nuevos códigos. -Si tienes una llave de seguridad de hardware con soporte para TOTP (como una YubiKey con [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), recomendamos que almacenes tus "secretos compartidos" en el equipo. El hardware como el YubiKey se desarrolló con la intención de que el "secreto compartido" fuera difícil de extraer y copiar. Una YubiKey tampoco está conectada al Internet, a diferencia de un teléfono con una aplicación TOTP. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. El hardware como el YubiKey se desarrolló con la intención de que el "secreto compartido" fuera difícil de extraer y copiar. Una YubiKey tampoco está conectada al Internet, a diferencia de un teléfono con una aplicación TOTP. A diferencia de [WebAuthn](#fido-fast-identity-online), TOTP no ofrece protección contra [Phishing](https://es.wikipedia.org/wiki/Phishing) o ataques de reutilización. Si un adversario obtiene un código válido de ti, puede utilizarlo tantas veces como quiera hasta que caduque (generalmente 60 segundos). @@ -122,13 +122,13 @@ Además de proteger tus inicios de sesión del sitio web, la autenticación de m ### Windows -Yubico tiene un [Proveedor de credenciales](https://learn.microsoft.com/es-es/windows/win32/secauthn/credential-providers-in-windows) dedicado que añade la autenticación Challenge-Response para el flujo de inicio de sesión con nombre de usuario + contraseña para las cuentas locales de Windows. Si tienes una YubiKey con soporte de autenticación Challenge-Response, echa un ojo a la [Guía de configuración de Yubico Login para Windows](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), que te permitirá configurar MFA en tu computadora Windows. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS tiene [soporte nativo](https://support.apple.com/es-es/guide/deployment/depd0b888248/web) para la autenticación con tarjetas inteligentes (PIV). Si tienes una tarjeta inteligente o una llave de seguridad de hardware compatible con la interfaz PIV como la YubiKey, te recomendamos que sigas la documentación de tu tarjeta inteligente/vendedor de seguridad de hardware y configures la autenticación de segundo factor para tu ordenador macOS. -Yubico tiene una guía [Uso de tu YubiKey como una tarjeta inteligente en macOS](https://support.yubico.com/hc/en-us/articles/360016649059) que puede ayudarte a configurar tu YubiKey en macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. Después de configurar tu tarjeta inteligente/clave de seguridad, te recomendamos que ejecutes este comando en el Terminal: @@ -147,22 +147,22 @@ Si el nombre de host de tu sistema cambia (por ejemplo, debido al DHCP), no podr
-El módulo `pam_u2f` en Linux puede proporcionar autenticación de dos factores para iniciar sesión en las distribuciones Linux más populares. Si tienes una llave de seguridad de hardware compatible con U2F, puedes configurar la autenticación MFA para tu inicio de sesión. Yubico tiene una guía [Guía de inicio de sesión en Ubuntu Linux - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) que debería funcionar en cualquier distribución. Sin embargo, los comandos del gestor de paquetes—como `"apt-get"`—y los nombres de los paquetes pueden ser diferentes. Esta guía **no** le aplica a Qubes OS. +El módulo `pam_u2f` en Linux puede proporcionar autenticación de dos factores para iniciar sesión en las distribuciones Linux más populares. Si tienes una llave de seguridad de hardware compatible con U2F, puedes configurar la autenticación MFA para tu inicio de sesión. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. Sin embargo, los comandos del gestor de paquetes—como `"apt-get"`—y los nombres de los paquetes pueden ser diferentes. Esta guía **no** le aplica a Qubes OS. ### Qubes OS -Qubes OS tiene soporte para la autenticación Challenge-Response con YubiKeys. Si tienes una YubiKey con soporte de autenticación Challenge-Response, échale un ojo a la [documentación de YubiKey](https://www.qubes-os.org/doc/yubikey/) de Qubes OS si quieres configurar MFA en Qubes OS. +Qubes OS tiene soporte para la autenticación Challenge-Response con YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Llaves de Seguridad -MFA de SSH podría configurarse utilizando varios métodos de autenticación diferentes que son populares con las claves de seguridad de hardware. Te recomendamos que consultea la [documentación](https://developers.yubico.com/SSH/) de Yubico sobre cómo configurarlo. +MFA de SSH podría configurarse utilizando varios métodos de autenticación diferentes que son populares con las claves de seguridad de hardware. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Contraseñas de un solo uso basado en tiempo (TOTP) -MFA de SSH también se puede configurar utilizando TOTP. DigitalOcean ha proporcionado un tutorial [Cómo Configurar la Autenticación Multifactor para SSH en Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). La mayoría de las cosas deberían ser las mismas independientemente de la distribución, sin embargo los comandos del gestor de paquetes—como `"apt-get"`—y los nombres de los paquetes pueden diferir. +MFA de SSH también se puede configurar utilizando TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). La mayoría de las cosas deberían ser las mismas independientemente de la distribución, sin embargo los comandos del gestor de paquetes—como `"apt-get"`—y los nombres de los paquetes pueden diferir. ### KeePass (y KeePassXC) -Las bases de datos de KeePass y KeePassXC pueden ser aseguradas utilizando Challenge-Response o HOTP como segundo factor de autenticación. Yubico ha proporcionado un documento para KeePass [Usando tu YubiKey con KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) y también hay uno en el sitio web de [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa). +Las bases de datos de KeePass y KeePassXC pueden ser aseguradas utilizando Challenge-Response o HOTP como segundo factor de autenticación. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/es/basics/passwords-overview.md b/i18n/es/basics/passwords-overview.md index ae476e9c..8685a559 100644 --- a/i18n/es/basics/passwords-overview.md +++ b/i18n/es/basics/passwords-overview.md @@ -54,13 +54,13 @@ Para generar una frase de contraseña diceware utilizando dados reales, sigue es

Nota

-Estas instrucciones asumen que estás usando [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) para generar la frase de contraseña, que requiere cinco tiradas de dados por palabra. Otras listas de palabras pueden requerir más o menos tiradas por palabra, y pueden necesitar una cantidad diferente de palabras para alcanzar la misma entropía. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Otras listas de palabras pueden requerir más o menos tiradas por palabra, y pueden necesitar una cantidad diferente de palabras para alcanzar la misma entropía.
1. Tira un dado de seis caras cinco veces y anota el número después de cada tirada. -2. Por ejemplo, digamos que sacas `2-5-2-6-6`. Busque en [EFF large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) la palabra que corresponde a `25266`. +2. Por ejemplo, digamos que sacas `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. Encontrará la palabra `encriptar`. Escribe esa palabra. @@ -75,20 +75,20 @@ Estas instrucciones asumen que estás usando [EFF's large wordlist](https://www. Si no tienes acceso a dados reales o prefieres no utilizarlos, puedes utilizar el generador de contraseñas integrado en tu gestor de contraseñas, ya que la mayoría de ellos tienen la opción de generar frases de contraseña diceware además de contraseñas normales. -Te recomendamos que utilices la [EFF large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) para generar tus frases de contraseña diceware, ya que ofrece exactamente la misma seguridad que la lista original, a la vez que contiene palabras más fáciles de memorizar. También hay [otras listas de palabras en diferentes idiomas](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), si no quieres que tu frase de contraseña esté en inglés. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. También hay [otras listas de palabras en diferentes idiomas](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), si no quieres que tu frase de contraseña esté en inglés.
Explicación de la entropía y la fuerza de las frases de contraseña diceware -Para demostrar lo fuertes que son las frases de contraseña diceware, utilizaremos la frase de contraseña de siete palabras antes mencionada (`viewable fastness reluctant squishy seventeen shown pencil`) y [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) como ejemplo. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. Una métrica para determinar la fuerza de una frase de contraseña diceware es cuánta entropía tiene. La entropía por palabra en una frase de contraseña diceware se calcula como $\text{log}_2(\text{WordsInList})$ y la entropía global de la frase de contraseña se calcula como $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Por lo tanto, cada palabra de la lista mencionada da como resultado ~12,9 bits de entropía ($\text{log}_2(7776)$), y una frase de contraseña de siete palabras derivada de ella tiene ~90,47 bits de entropía ($\text{log}_2(7776^7)$). -La [EFF large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contiene 7776 palabras únicas. Para calcular la cantidad de frases de contraseña posibles, todo lo que tenemos que hacer es $\text{WordsInList}^\text{WordsInPhrase}$, o en nuestro caso, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. Para calcular la cantidad de frases de contraseña posibles, todo lo que tenemos que hacer es $\text{WordsInList}^\text{WordsInPhrase}$, o en nuestro caso, $7776^7$. -Pongamos todo esto en perspectiva: Una frase de siete palabras utilizando la [EFF large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) es una de las ~1.719.070.799.748.422.500.000.000.000 frases posibles. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. Por término medio, se necesita probar el 50% de todas las combinaciones posibles para adivinar su frase. Teniendo esto en cuenta, incluso si tu adversario es capaz de realizar ~1.000.000.000.000 de intentos por segundo, aún tardaría ~27.255.689 años en adivinar tu frase de contraseña. Esto es así incluso si las siguientes cosas son ciertas: diff --git a/i18n/es/basics/vpn-overview.md b/i18n/es/basics/vpn-overview.md index 2d90fc2a..ee366c3a 100644 --- a/i18n/es/basics/vpn-overview.md +++ b/i18n/es/basics/vpn-overview.md @@ -69,13 +69,13 @@ Si utilizas Tor, entonces *probablemente* es mejor conectarse a la red Tor a tra No deberías usar esa función: La principal ventaja de usar Tor es que no confías en tu proveedor VPN, lo que se anula cuando usas nodos Tor alojados por tu VPN en lugar de conectarte directamente a Tor desde tu ordenador. -Actualmente, Tor solo soporta el protocolo TCP. UDP (utilizado por [WebRTC](https://es.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://es.wikipedia.org/wiki/HTTP/3), y otros protocolos), [ICMP](https://es.wikipedia.org/wiki/Protocolo_de_control_de_mensajes_de_Internet), y otros paquetes serán descartados. Para compensar por esto, los proveedores de VPN suelen enrutar todos los paquetes no TCP a través de su servidor VPN (tu primer salto). Este es el caso con [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Adicionalmente, al usar esta configuración de Tor sobre VPN, no tienes control sobre otras funciones importantes de Tor como [Dirección de Destino Aislada](https://www.whonix.org/wiki/Stream_Isolation) (usando un circuito Tor diferente para cada dominio que visitas). +Actualmente, Tor solo soporta el protocolo TCP. UDP (utilizado por [WebRTC](https://es.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://es.wikipedia.org/wiki/HTTP/3), y otros protocolos), [ICMP](https://es.wikipedia.org/wiki/Protocolo_de_control_de_mensajes_de_Internet), y otros paquetes serán descartados. Para compensar por esto, los proveedores de VPN suelen enrutar todos los paquetes no TCP a través de su servidor VPN (tu primer salto). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). La función debe verse como una *conveniente* forma de acceder a servicios ocultos en Tor, no para permanecer en el anonimato. Para un anonimato adecuado, utilice el navegador real [Tor Browser](../tor.md). ## Propiedad Comercial de VPN -La mayoría de los servicios VPN pertenecen a las mismas [pocas empresas](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). Estas empresas sospechosas gestionan multitud de servicios VPN más pequeños para crear la ilusión de que tienes más opciones de las que realmente tienes y para maximizar sus beneficios. Normalmente, estos proveedores que alimentan a su empresa fantasma tienen políticas de privacidad terribles y no se les debería confiar tu tráfico de Internet. Debes ser muy estricto con el proveedor que decides utilizar. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). Estas empresas sospechosas gestionan multitud de servicios VPN más pequeños para crear la ilusión de que tienes más opciones de las que realmente tienes y para maximizar sus beneficios. Normalmente, estos proveedores que alimentan a su empresa fantasma tienen políticas de privacidad terribles y no se les debería confiar tu tráfico de Internet. Debes ser muy estricto con el proveedor que decides utilizar. También debes tener cuidado con el hecho de que muchos sitios de reseñas de VPN no son más que vehículos publicitarios abiertos al mejor postor. ==Privacy Guides no gana dinero recomendando productos externos y nunca utiliza programas de afiliación.== @@ -111,8 +111,8 @@ Muchas dVPN se utilizan para impulsar una criptomoneda en lugar de hacer el mejo ## Información Relacionada con las VPNs -- [El Problema con los Sitios de Revisión de VPNs y de Privacidad](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Investigación de Aplicaciones de VPN Gratuita](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Propietarios ocultos de VPN revelados: 101 productos VPN administrados por solo 23 empresas](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [Esta empresa china está secretamente detrás de 24 aplicaciones populares que buscan permisos peligrosos](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - una narrativa muy precaria](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) por Dennis Schubert +- [El Problema con los Sitios de Revisión de VPNs y de Privacidad](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Investigación de Aplicaciones de VPN Gratuita](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Propietarios ocultos de VPN revelados: 101 productos VPN administrados por solo 23 empresas](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [Esta empresa china está secretamente detrás de 24 aplicaciones populares que buscan permisos peligrosos](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/es/basics/why-privacy-matters.md b/i18n/es/basics/why-privacy-matters.md index 224401f0..31d583a2 100644 --- a/i18n/es/basics/why-privacy-matters.md +++ b/i18n/es/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ La privacidad es algo que tenemos que tener incorporado en [el software y los se ## Fuentes -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) por Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants sobre Anonimato vs Privacidad vs Seguridad](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/es/calendar.md b/i18n/es/calendar.md index 62f719ea..c27a9583 100644 --- a/i18n/es/calendar.md +++ b/i18n/es/calendar.md @@ -13,26 +13,26 @@ Los calendarios contienen algunos de sus datos más sensibles; utilice productos ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** ofrece un calendario gratuito y cifrado en todas sus plataformas compatibles. Entre sus características se incluyen: E2EE automático de todos los datos, funciones de uso compartido, funcionalidad de importación/exportación, autenticación multifactor y [more](https://tuta.com/calendar-app-comparison/). +**Tuta** ofrece un calendario gratuito y cifrado en todas sus plataformas compatibles. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Las funciones de calendarios múltiples y uso compartido ampliado están limitadas a los suscriptores de pago. -[:octicons-home-16: Página Principal](https://tuta.com/calendar){ .md-button .md-button--primary } -[:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Politica de Privacidad" } -[:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://tuta.com/calendar){ .md-button .md-button--primary } +[:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -52,10 +52,10 @@ Las funciones de calendarios múltiples y uso compartido ampliado están limitad [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Código Fuente" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/es/cloud.md b/i18n/es/cloud.md index 1c0c7ff1..a8ef762c 100644 --- a/i18n/es/cloud.md +++ b/i18n/es/cloud.md @@ -56,15 +56,15 @@ Los nuevos clientes móviles de Proton Drive aún no han sido auditados pública **Tresorit** es un proveedor suizo-húngaro de almacenamiento cifrado en la nube fundado en 2011. Tresorit es propiedad de Swiss Post, el servicio postal nacional de Suiza. -[:octicons-home-16: Página Principal](https://tresorit.com/){ class="md-button md-button--primary" } -[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentación} +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } +[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Los nuevos clientes móviles de Proton Drive aún no han sido auditados pública Tresorit ha recibido varias auditorías de seguridad independientes: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] [Certificación](https://www.certipedia.com/quality_marks/9108644476) de conformidad por TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Pruebas de penetración de Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - Esta revisión evaluó la seguridad del cliente web Tresorit, la aplicación Android, la aplicación Windows y la infraestructura asociada. - Computest descubrió dos vulnerabilidades que ya han sido resueltas. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Pruebas de penetración de Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - En esta revisión se analizó el código fuente completo de Tresorit y se validó que la implementación coincide con los conceptos descritos en el [libro blanco](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf) de Tresorit. - Ernst & Young probó además los clientes web, móvil y de escritorio: "Los resultados de las pruebas no encontraron ninguna desviación de las afirmaciones de confidencialidad de datos de Tresorit". -También han recibido el Sello de Confianza Digital, una certificación de la [Iniciativa Digital Suiza](https://www.swiss-digital-initiative.org/digital-trust-label/) que exige superar [35 criterios](https://digitaltrust-label.swiss/criteria/) relacionados con la seguridad, la privacidad y la fiabilidad. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criterios diff --git a/i18n/es/cryptocurrency.md b/i18n/es/cryptocurrency.md index a1f4a08c..776505c8 100644 --- a/i18n/es/cryptocurrency.md +++ b/i18n/es/cryptocurrency.md @@ -24,10 +24,10 @@ Muchas, si no la mayoría de los proyectos de criptomonedas son estafas. Únicam **Monero** utiliza una cadena de bloques (blockchain) con tecnologías que mejoran la privacidad. Cada transacción realizada con Monero, oculta el monto de la transacción, las direcciones de envío y recepción, además del origen de los fondos sin ningún intermediario, convirtiéndola en una opción ideal para los novatos en las criptomonedas. -[:octicons-home-16: Página principal](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ Con Monero, los observadores externos no pueden descifrar las direcciones transa Para una mejor privacidad, se debe asegurar de utilizar una billetera no monitorizada donde la clave de visualización permanece en el dispositivo. Esto significa que solo usted tiene la capacidad de gastar sus fondos, además de ver las transacciones entrantes y salientes. Si usted utiliza una billetera monitoreada, el proveedor puede ver **todo** lo que hace; si utiliza una billetera "ligera" donde el proveedor retiene su clave privada de visualización, el proveedor puede ver casi todo lo que hace. Algunas billeteras no monitoreadas son: - [Cliente oficial de Monero](https://getmonero.org/downloads) (Escritorio) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet soporta múltiples criptomonedas. Una versión de Cake Wallet que únicamente soporta Monero puede obtenerse desde [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Escritorio) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet soporta múltiples criptomonedas. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) Para obtener un nivel máximo de privacidad (incluso con una billetera monitoreada), usted debe ejecutar su propio nodo de Monero. Al utilizar el nodo de otra persona, usted expondrá alguna información a dicha persona, como la dirección IP que utiliza para conectarse, las marcas de tiempo que sincroniza su billetera, y las transacciones que realiza desde su billetera (aunque no hay otros detalles sobre esas transacciones). Alternativamente, usted puede conectarse al nodo de Monero de otra persona a través de Tor o i2p. -En agosto de 2021, CipherTrace [anunció](https://ciphertrace.com/enhanced-monero-tracing/) capacidades mejoradas de rastreo de Monero para agencias gubernamentales. Publicaciones públicas muestran cómo la Red de Ejecución de Delitos Financieros del Departamento de Tesorería del Gobierno de los Estados Unidos [licenció](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) el módulo CipherTrace de Monero a finales de 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Publicaciones públicas muestran cómo la Red de Ejecución de Delitos Financieros del Departamento de Tesorería del Gobierno de los Estados Unidos [licenció](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) el módulo CipherTrace de Monero a finales de 2022. -La privacidad del gráfico transaccional de Monero está limitada por sus firmas de anillo relativamente pequeñas, especialmente contra ataques dirigidos. Las características de privacidad de Monero también han sido [cuestionadas](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) por algunos investigadores de seguridad, y una serie de vulnerabilidades graves han sido encontradas y corregidas en el pasado, haciendo que los reclamos de organizaciones como CipherTrace no están descartadas. Mientras es poco probable que las herramientas de vigilancia masiva de Monero existan como lo hacen para Bitcoin y otras, es seguro que las herramientas de rastreo ayudan en las investigaciones dirigidas. +La privacidad del gráfico transaccional de Monero está limitada por sus firmas de anillo relativamente pequeñas, especialmente contra ataques dirigidos. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. Mientras es poco probable que las herramientas de vigilancia masiva de Monero existan como lo hacen para Bitcoin y otras, es seguro que las herramientas de rastreo ayudan en las investigaciones dirigidas. En última instancia, Monero es el principal candidato para una criptomoneda amigable con la privacidad, pero sus argumentos de privacidad **no** han sido definitivamente comprobados de una manera u otra. Más tiempo e investigación es requerida para encontrar los puntos donde Monero es lo suficientemente resistente a los ataques como para proporcionar la privacidad adecuada. diff --git a/i18n/es/data-redaction.md b/i18n/es/data-redaction.md index 445ae9a9..52e6ee65 100644 --- a/i18n/es/data-redaction.md +++ b/i18n/es/data-redaction.md @@ -88,12 +88,12 @@ La aplicación ofrece múltiples formas de borrar los metadatos de las imágenes **Metapho** es un visor simple y limpio para metadatos de fotos como fecha, nombre de archivo, tamaño, modelo de cámara, velocidad de obturación y ubicación. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ La aplicación ofrece múltiples formas de borrar los metadatos de las imágenes **PrivacyBlur** es una aplicación gratuita que permite difuminar partes sensibles de las imágenes antes de compartirlas en Internet. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ La aplicación ofrece múltiples formas de borrar los metadatos de las imágenes Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106)
diff --git a/i18n/es/desktop-browsers.md b/i18n/es/desktop-browsers.md index da5129b3..d7995ddf 100644 --- a/i18n/es/desktop-browsers.md +++ b/i18n/es/desktop-browsers.md @@ -69,10 +69,10 @@ Si necesitas navegar por Internet de forma anónima, deberías utilizar [Tor](to **Mullvad Browser** es una versión de [Tor Browser](tor.md#tor-browser) con las integraciones de la red Tor eliminadas, con el objetivo de proporcionar las tecnologías de navegación anti huella digital de Tor Browser a los usuarios de VPN. Es desarrollado por el Proyecto Tor y distribuido por [Mullvad](vpn.md#mullvad), y **no** requiere el uso de la VPN de Mullvad. -[:octicons-home-16: Página Principal](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentación} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
Downloads "Descargas" @@ -85,7 +85,7 @@ Si necesitas navegar por Internet de forma anónima, deberías utilizar [Tor](to -Al igual que [Tor Browser](tor.md), Mullvad Browser está diseñado para evitar el fingerprinting haciendo que la huella digital de tu navegador sea idéntica a la de todos los demás usuarios de Mullvad Browser, e incluye ajustes por defecto y extensiones que se configuran automáticamente según los niveles de seguridad por defecto: *Standard*, *Safer* y *Safest*. Por lo tanto, es imperativo que no modifiques el navegador en absoluto, más allá de ajustar los [niveles de seguridad](https://tb-manual.torproject.org/security-settings/) por defecto. Otras modificaciones harían que tu huella digital fuera única, anulando el propósito de utilizar este navegador. Si deseas configurar tu navegador de forma más exhaustiva y la huella digital no te preocupa, te recomendamos [Firefox](#firefox) en su lugar. +Al igual que [Tor Browser](tor.md), Mullvad Browser está diseñado para evitar el fingerprinting haciendo que la huella digital de tu navegador sea idéntica a la de todos los demás usuarios de Mullvad Browser, e incluye ajustes por defecto y extensiones que se configuran automáticamente según los niveles de seguridad por defecto: *Standard*, *Safer* y *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Otras modificaciones harían que tu huella digital fuera única, anulando el propósito de utilizar este navegador. Si deseas configurar tu navegador de forma más exhaustiva y la huella digital no te preocupa, te recomendamos [Firefox](#firefox) en su lugar. ### Anti Huella Digital @@ -115,18 +115,18 @@ Mullvad Browser viene con DuckDuckGo configurado como [motor de búsqueda](searc **Firefox** brinda una configuración fuerte de privacidad como la [Protección de Rastreo Mejorada](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), que puede ayudar con el bloqueo de varios [tipos de rastreadores](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). -[:octicons-home-16: Página Principal](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Politica de Privacidad" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentación} -[:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} +[:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
-Downloads "Descargas" +Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser viene con DuckDuckGo configurado como [motor de búsqueda](searc

Advertencia

-Firefox incluye un [token de descarga] único (https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) en las descargas del sitio web de Mozilla y utiliza la telemetría de Firefox para enviar el token. El token **no** se incluye en las versiones del [FTP de Mozilla](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox incluye un [token de descarga] único (https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) en las descargas del sitio web de Mozilla y utiliza la telemetría de Firefox para enviar el token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Esto te protege bloqueando los rastreadores de redes sociales, las secuencias de ##### Firefox Suggest (solo en EE. UU.) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) es una función similar a las sugerencias de búsqueda que sólo está disponible en Estados Unidos. Recomendamos desactivarlo por la misma razón que recomendamos desactivar las sugerencias de búsqueda. Si no ves estas opciones en lel encabezado de la **Barra de Direcciones**, no tienes la nueva experiencia y puedes ignorar estos cambios. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. Recomendamos desactivarlo por la misma razón que recomendamos desactivar las sugerencias de búsqueda. Si no ves estas opciones en lel encabezado de la **Barra de Direcciones**, no tienes la nueva experiencia y puedes ignorar estos cambios. - [ ] Desmarca **Suggestions from the web** - [ ] Desmarque **Suggestions from sponsors** @@ -183,7 +183,7 @@ Esto te protege de las cookies persistentes, pero no te protege de las cookies a > Firefox envía datos sobre tu versión e idioma de Firefox; sistema operativo del dispositivo y configuración del hardware; memoria, información básica sobre fallos y errores; resultado de procesos automatizados como actualizaciones, navegación segura y activación. Cuando Firefox envía datos, tu dirección IP se recoge temporalmente como parte de los registros de nuestro servidor. -Además, el servicio Firefox Accounts recoge [algunos datos técnicos](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). Si usas una cuenta de Firefox, puedes excluir: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). Si usas una cuenta de Firefox, puedes excluir: 1. Abre la [configuración de tu perfil en accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Desmarca **Recopilación y uso de datos** > **Ayuda a mejorar Cuentas de Firefox** @@ -204,7 +204,7 @@ La Protección Máxima impone el uso de DNS sobre HTTPS y una advertencia de seg #### Sincronización -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) permite que tus datos de navegación (historial, marcadores, etc.) sean accesibles desde todos tus dispositivos y los protege con E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (avanzado) @@ -215,7 +215,7 @@ La Protección Máxima impone el uso de DNS sobre HTTPS y una advertencia de seg -El [proyecto Arkenfox](https://github.com/arkenfox/user.js) proporciona un conjunto de opciones cuidadosamente consideradas para Firefox. Si [decides](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) utilizar Arkenfox, unas [pocas opciones](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) son subjetivamente estrictas y/o pueden hacer que algunos sitios web no funcionen correctamente - [que puede cambiar fácilmente](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) para adaptarse a tus necesidades. Nosotros **recomendamos encarecidamente** que leas su [wiki ](https://github.com/arkenfox/user.js/wiki)(lamentablemente solo en inglés). Arkenfox también permite el soporte de [contenedores](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users). +El [proyecto Arkenfox](https://github.com/arkenfox/user.js) proporciona un conjunto de opciones cuidadosamente consideradas para Firefox. Si [decides](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) utilizar Arkenfox, unas [pocas opciones](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) son subjetivamente estrictas y/o pueden hacer que algunos sitios web no funcionen correctamente - [que puede cambiar fácilmente](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) para adaptarse a tus necesidades. Nosotros **recomendamos encarecidamente** que leas su [wiki ](https://github.com/arkenfox/user.js/wiki)(lamentablemente solo en inglés). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox sólo pretende frustrar los scripts de rastreo básicos o primitivos mediante la aleatorización del lienzo (canvas randomization) y los ajustes de configuración de resistencia a las huellas digitales incorporados en Firefox. No pretende hacer que tu navegador se mezcle con una gran multitud de otros usuarios de Arkenfox de la misma manera que lo hacen Mullvad Browser o Tor Browser, que es la única manera de frustrar los scripts avanzados de rastreo de huellas dactilares. Recuerda que siempre puedes utilizar varios navegadores, por ejemplo, podrías considerar utilizar Firefox+Arkenfox para algunos sitios en los que quieras mantener la sesión iniciada o en los que confíes, y Mullvad Browser para la navegación general. @@ -223,25 +223,25 @@ Arkenfox sólo pretende frustrar los scripts de rastreo básicos o primitivos me
-![Logo de Brave](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** incluye un bloqueador de contenidos integrado y [funciones de privacidad](https://brave.com/privacy-features/), muchas de las cuales están activadas por defecto. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave se basa en el proyecto de navegador web Chromium, por lo que debería resultar familiar y tener mínimos problemas de compatibilidad con sitios web. -[:octicons-home-16: Página Principal]](https://brave.com/){ .md-button .md-button--primary } -[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Servicio Onion"" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Politica de Privacidad" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ Estas opciones se encuentran en :material-menu: → **Configuración**. ##### Escudos -Brave incluye algunas medidas anti-fingerprinting en su función de [Escudos](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Sugerimos configurar estas opciones [globalmente](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) en todas las páginas que visite. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Las opciones de los escudos pueden reducirse según las necesidades de cada sitio, pero por defecto recomendamos configurar lo siguiente: @@ -290,23 +290,23 @@ Brave te permite seleccionar filtros de contenido adicionales dentro de la pági
-1. Esta opción proporciona una funcionalidad similar a los [modos de bloqueo ](https://github.com/gorhill/uBlock/wiki/Blocking-mode)avanzados de uBlock Origin o la extensión [NoScript](https://noscript.net/). +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. Si deseas permanecer conectado a un sitio concreto que visitas a menudo, puedes establecer excepciones por sitio haciendo clic en el icono del Escudo de la barra de direcciones. ##### Privacidad y seguridad
-- [x] Selecciona **Desactivar el UDP sin proxy** en [Política de gestión de IP de WebRTC](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) -- [ ] Desmarca **Utiliza los servicios de Google para la mensajería push** -- [ ] Desmarca **Permitir estadísticas del producto con preservación de la privacidad (P3A)** -- [ ] Desmarca **Enviar automáticamente el ping de uso diario a Brave** -- [ ] Desmarca **Enviar informes de diagnóstico automáticamente** -- [ ] Desmarca **Ventana privada con Tor** (1) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Use Google services for push messaging** +- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** +- [ ] Uncheck **Automatically send daily usage ping to Brave** +- [ ] Uncheck **Automatically send diagnostic reports** +- [ ] Uncheck **Private window with Tor** (1)
-1. Brave **no** es tan resistente a las huellas digitales como Tor Browser y mucha menos gente usa Brave con Tor, así que destacarás. Cuando necesites un [fuerte anonimato](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) utiliza [Tor Browser ](tor.md#tor-browser). +1. Brave **no** es tan resistente a las huellas digitales como Tor Browser y mucha menos gente usa Brave con Tor, así que destacarás. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Desinfectar al cerrar

@@ -343,7 +343,7 @@ Las funciones Web3 de Brave pueden aumentar potencialmente la huella digital de #### Sincronización -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) permite que sus datos de navegación (historial, marcadores, etc.) sean accesibles en todos sus dispositivos sin necesidad de una cuenta y los protege con E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards y Wallet @@ -369,9 +369,9 @@ En general, recomendamos mantener las extensiones al mínimo; ya que tienen acce [:octicons-code-16:](https://github.com/gorhill/uBlock){ .card-link title="Código Fuente" }
-Downloads "Descargas" +Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -406,9 +406,9 @@ uBlock Origin también tiene una versión "Lite" de su extensión, que ofrece un [:octicons-code-16:](https://github.com/gorhill/uBlock/tree/master/platform/mv3){ .card-link title="Código Fuente" }
-Downloads "Descargas" +Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ Estamos trabajando en establecer criterios definidos para cada sección de nuest - Disponible para iOS, macOS y Windows. - Cualquier cambio necesario para que el navegador respete más la privacidad no debería afectar negativamente a la experiencia del usuario. - Bloquea las cookies de terceros por defecto. -- Admite [partición de estados](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) para mitigar el rastreo entre sitios.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Mejor Caso Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto perfecto en esta categoría. Es posible que nuestras recomendaciones no incluyan todas o algunas de estas funciones, pero las que sí las incluyan pueden estar mejor clasificadas que otras en esta página. - Incluye funciones integradas de bloqueo de contenidos. -- Admite la compartimentación de cookies (como [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Admite Aplicaciones Web Progresivas (PWA). Las PWA permiten instalar determinados sitios web como si fueran aplicaciones nativas en el ordenador. Esto puede tener ventajas sobre la instalación de aplicaciones basadas en Electron, porque usted se beneficia de las actualizaciones de seguridad periódicas de su navegador. - No incluye funciones adicionales (bloatware) que no afectan a la privacidad del usuario. - No recopila telemetría por defecto. @@ -462,4 +462,4 @@ Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto - Debe afectar directamente a la privacidad del usuario, es decir, no debe limitarse a proporcionar información. [^1]: uBlock Origin Lite *en sí* no consumirá recursos, ya que utiliza APIs más recientes que hacen que el navegador procese las listas de filtros de forma nativa, en lugar de ejecutar código JavaScript dentro de la extensión para gestionar el filtrado. Sin embargo, esta ventaja de recursos es solo [teórica](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), porque es posible que el código de filtrado estándar de uBlock Origin sea más eficiente que el código de filtrado nativo de tu navegador. Aún no se ha evaluado comparativamente. -[^2]: La implementación de Brave se detalla en [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/es/desktop.md b/i18n/es/desktop.md index bdd68c0d..88a0ca9f 100644 --- a/i18n/es/desktop.md +++ b/i18n/es/desktop.md @@ -17,17 +17,17 @@ Las distribuciones de Linux se recomiendan comúnmente para la protección de la ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** es nuestra distribución recomendada para la gente nueva en Linux. Fedora suele adoptar tecnologías más recientes antes que otras distribuciones, por ejemplo, [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). Estas nuevas tecnologías suelen venir acompañadas de mejoras en la seguridad, la privacidad y la usabilidad en general. +**Fedora Workstation** es nuestra distribución recomendada para la gente nueva en Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). Estas nuevas tecnologías suelen venir acompañadas de mejoras en la seguridad, la privacidad y la usabilidad en general. -[:octicons-home-16: Página Principal](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentación} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribuir} +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora tiene un ciclo de lanzamientos semicontinuo. Mientras que algunos paquetes como [GNOME](https://www.gnome.org) quedan congelados hasta la siguiente versión de Fedora, la mayoría de los paquetes (incluido el kernel) se actualizan con frecuencia durante toda la vida útil de la versión. Cada versión de Fedora recibe soporte durante un año, con una nueva versión cada 6 meses. +Fedora tiene un ciclo de lanzamientos semicontinuo. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Cada versión de Fedora recibe soporte durante un año, con una nueva versión cada 6 meses. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora tiene un ciclo de lanzamientos semicontinuo. Mientras que algunos paquete **openSUSE Tumbleweed** es una distribución estable con actualización continua. -openSUSE Tumbleweed cuenta con un sistema de [actualización transaccional](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) que utiliza [Btrfs](https://en.wikipedia.org/wiki/Btrfs) y [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) para garantizar que las copias instantáneas se puedan revertir en caso de que haya algún problema. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Página Principal](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentación} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed sigue un modelo de actualización continua en el que cada actualizaci **Arch Linux** es una distribución ligera del estilo "hágalo usted mismo" (DIY), lo que significa que sólo obtiene lo que instala. Para obtener más información, consulte su [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Página Principal](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentación} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute }
@@ -83,22 +83,22 @@ Gran parte de los [paquetes de Arch Linux](https://reproducible.archlinux.org) s **Fedora Atomic Desktops** son variantes de Fedora que utilizan el gestor de paquetes `rpm-ostree` y se centran principalmente en flujos de trabajo en contenedores y Flatpak para aplicaciones de escritorio. Todas estas variantes siguen el mismo calendario de lanzamientos que Fedora Workstation, beneficiándose de las mismas actualizaciones rápidas y manteniéndose muy cerca del upstream. -[:octicons-home-16: Página Principal](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -Los [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) vienen en una variedad de sabores dependiendo del entorno de escritorio que prefieras, como **Fedora Silverblue** (que viene con [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (que viene con [KDE](https://kde.org/)), **Fedora Sway Atomic**, o **Fedora Budgie Atomic**. Sin embargo, no recomendamos la última de ellas, ya que el entorno de escritorio Budgie [sigue necesitando X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. Sin embargo, no recomendamos la última de ellas, ya que el entorno de escritorio Budgie [sigue necesitando X11](https://buddiesofbudgie.org/blog/wayland). -Estos sistemas operativos difieren de Fedora Workstation en que sustituyen el gestor de paquetes [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) por una alternativa mucho más avanzada denominada [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). El gestor de paquetes `rpm-ostree` funciona descargando una imagen base para el sistema, y luego superponiendo paquetes sobre ella en un árbol de commit [git](https://en.wikipedia.org/wiki/Git)-like. Cuando se actualice el sistema, se descargará una nueva imagen base y las superposiciones se aplicarán a esa nueva imagen. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). El gestor de paquetes `rpm-ostree` funciona descargando una imagen base para el sistema, y luego superponiendo paquetes sobre ella en un árbol de commit [git](https://en.wikipedia.org/wiki/Git)-like. Cuando se actualice el sistema, se descargará una nueva imagen base y las superposiciones se aplicarán a esa nueva imagen. Una vez completada la actualización, reiniciarás el sistema con la nueva implementación. `rpm-ostree` mantiene dos despliegues del sistema para que puedas revertir fácilmente si algo se rompe en la nueva implementación. También existe la opción de anclar más implementaciones según sea necesario. -[Flatpak](https://www.flatpak.org) es el método principal de instalación de paquetes en estas distribuciones, ya que `rpm-ostree` solo está pensado para superponer paquetes que no pueden permanecer dentro de un contenedor sobre la imagen base. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -Como alternativa a Flatpaks, existe la opción de [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) para crear contenedores [Podman](https://podman.io) con un directorio raíz compartido con el sistema operativo anfitrión e imitar un entorno Fedora tradicional, lo cual es una [característica útil](https://containertoolbx.org) para el desarrollador exigente. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,9 +108,9 @@ Como alternativa a Flatpaks, existe la opción de [Toolbox](https://docs.fedorap NixOS es una distribución independiente basada en el gestor de paquetes Nix y centrada en la reproducibilidad y la fiabilidad. -[:octicons-home-16: Página Principal](https://nixos.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentación} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix es un gestor de paquetes basado en el código fuente; si no hay ningún paqu **Whonix** está basado en [Kicksecure](#kicksecure), una bifurcación de Debian centrada en la seguridad. Su objetivo es proporcionar privacidad, seguridad y anonimato en Internet. Whonix se utiliza mejor junto con [Qubes OS](#qubes-os). -[:octicons-home-16: Página principal](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Servicio Onion" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentación} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix es un gestor de paquetes basado en el código fuente; si no hay ningún paqu Whonix está pensado para funcionar como dos máquinas virtuales: una "Estación de Trabajo" y una "Puerta de Enlace" Tor. Todas las comunicaciones desde la Estación de Trabajo deben pasar por la puerta de enlace Tor. Esto significa que incluso si la Estación de Trabajo se ve comprometida por algún tipo de malware, la verdadera dirección IP permanecerá oculta. -Algunas de sus características incluyen Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), y un asignador de memoria endurecido. Las futuras versiones de Whonix probablemente incluirán [políticas AppArmor para todo el sistema](https://github.com/Whonix/apparmor-profile-everything) y un [lanzador de aplicaciones sandbox](https://www.whonix.org/wiki/Sandbox-app-launcher) para confinar completamente todos los procesos del sistema. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix se utiliza mejor [junto con Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). Tenemos una [guía recomendada](os/qubes-overview.md#connecting-to-tor-via-a-vpn) sobre la configuración de Whonix junto con una VPN ProxyVM en Qubes para ocultar tus actividades Tor de tu ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). Tenemos una [guía recomendada](os/qubes-overview.md#connecting-to-tor-via-a-vpn) sobre la configuración de Whonix junto con una VPN ProxyVM en Qubes para ocultar tus actividades Tor de tu ISP. ### Tails @@ -159,9 +159,9 @@ Whonix se utiliza mejor [junto con Qubes](https://www.whonix.org/wiki/Qubes/Why_ **Tails** es un sistema operativo basado en Debian que enruta todas las comunicaciones a través de Tor, y que puede arrancar en casi cualquier ordenador desde un DVD, una memoria USB o una tarjeta SD. Utiliza [Tor](tor.md) para preservar la privacidad y el anonimato a la vez que elude la censura, y no deja rastro de sí mismo en el ordenador en el que se utiliza una vez apagado. -[:octicons-home-16: Página Principal](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentación} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails es genial contra el análisis forense debido a la amnesia (lo que signific Tails incluye [uBlock Origin](desktop-browsers.md#ublock-origin) en el Navegador Tor por defecto, lo que potencialmente puede facilitar a los adversarios la toma de huellas digitales de los usuarios de Tails. Las máquinas virtuales de [Whonix](desktop.md#whonix) pueden ser más a prueba de fugas, sin embargo no son amnésicas, lo que significa que los datos pueden ser recuperados de su dispositivo de almacenamiento. -Tails está diseñado para formatearse por completo después de cada reinicio. El [almacenamiento persistente](https://tails.boum.org/doc/persistent_storage/index.en.html) cifrado puede configurarse para almacenar algunos datos entre reinicios. +Tails está diseñado para formatearse por completo después de cada reinicio. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Distribuciones Enfocadas en la Seguridad @@ -190,12 +190,12 @@ Tails está diseñado para formatearse por completo después de cada reinicio. E **Qubes OS** es un sistema operativo de código abierto diseñado para proporcionar una fuerte seguridad para la informática de escritorio a través de máquinas virtuales seguras (o "qubes"). Qubes se basa en Xen, el Sistema de Ventanas X y Linux. Puede ejecutar la mayoría de las aplicaciones Linux y utilizar la mayoría de los controladores Linux. -[:octicons-home-16: Página Principal](https://www.qubes-os.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Servicio Onion" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Politica de Privacidad" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentación } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ Aunque [desaconsejamos](os/linux-overview.md#release-cycle) distribuciones "perp **Kicksecure** -en términos muy simplificados- es un conjunto de scripts, configuraciones y paquetes que reducen sustancialmente la superficie de ataque de Debian. Cubre muchas recomendaciones de privacidad y seguridad por defecto. También sirve de sistema operativo base para [Whonix](#whonix). -[:octicons-home-16: Página Principal](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/es/device-integrity.md b/i18n/es/device-integrity.md index c01020f4..649335d9 100644 --- a/i18n/es/device-integrity.md +++ b/i18n/es/device-integrity.md @@ -26,7 +26,7 @@ Esto significa que un atacante deberá volver a infectar tu dispositivo con regu Si cualquiera de las siguientes herramientas indican un potencial compromiso de parte de programas espías como Pegasus, Predator o KingsPawn, te recomendamos contactar: -- Si eres un defensor de los derechos humanos, periodista o perteneces a una organización de la sociedad civil: [Laboratorio de Seguridad de Amnistía Internacional](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - Si un dispositivo empresarial o gubernamental es comprometido: Contacte al responsable de seguridad de tu empresa, departamento o agencia - Cuerpos locales de seguridad @@ -54,7 +54,7 @@ Los indicadores públicos de compromiso son insuficientes para determinar si un Un soporte forense digital confiable y completo requiere el acceso a indicadores privados, investigación e inteligencia de amenazas. -Dicho soporte está disponible para la sociedad civil a través del [Laboratorio de Seguridad de Amnistía Internacional](https://www.amnesty.org/en/tech/) o la [Línea de ayuda de Seguridad Digital de Access Now](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ Estas herramientas pueden desencadenar falsos positivos. Si alguna de estas herr ![Logo de MVT](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) es una colección de herramientas que simplifican y automatizan el proceso de escanear dispositivos móviles en busca de potenciales rastros de ataques o infecciones por campañas conocidas de espionaje. MVT fue desarrollado por Amnistía Internacional y se publicó en 2021 en el contexto del [Proyecto Pegasus](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) es una colección de herramientas que simplifican y automatizan el proceso de escanear dispositivos móviles en busca de potenciales rastros de ataques o infecciones por campañas conocidas de espionaje. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Página principal](https://mvt.re/){ .md-button .md-button--primary } -[:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Código fuente" } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } +[:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads "Descargas" -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,9 +110,9 @@ MVT te permite realizar escaneos/análisis más profundos si tu dispositivo tien **iMazing** proporciona una herramienta gratuita para el análisis de programas de espionaje, disponible para dispositivos iOS, que actúa como una interfaz gráfica para [MVT](#mobile-verification-toolkit). Esta puede ser más fácil de ejecutar, a comparación del propio MVT, que es una herramienta de línea de comandos diseñada para tecnólogos e investigadores forenses. -[:octicons-home-16: Página principal](https://imazing.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Política de privacidad" } -[:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title="Documentación"} +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation}
Downloads "Descargas" @@ -167,7 +167,7 @@ Auditor no es una herramienta de escaneo/análisis como otras herramientas de es El auditor realiza la atestación y la detección de intrusiones con **dos** dispositivos, uno _auditado_ (el dispositivo que se verifica) y un _auditor_ (el dispositivo que realiza la verificación). El auditor puede ser cualquier dispositivo Android 10+ (o un servicio web remoto operado por [GrapheneOS](android.md#grapheneos)), mientras que el auditado debe ser específicamente un [dispositivo soportado](https://attestation.app/about#device-support). Auditor funciona así: -- Utilizando un modelo [Confiar en el Primer Uso (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) entre un _auditor_ y un _auditado_, la pareja establece una clave privada en el [almacén de claves respaldado por hardware](https://source.android.com/security/keystore/) de _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - El _auditor_ puede ser otra instancia de la aplicación Auditor o el [Servicio de Certificación a Distancia](https://attestation.app). - El _auditor_ registra el estado actual y la configuración del _auditado_. - En caso de que se produzca una manipulación del sistema operativo del _auditado_ una vez completado el emparejamiento, el auditor será consciente del cambio en el estado y las configuraciones del dispositivo. @@ -207,13 +207,13 @@ El uso de estas aplicaciones no basta para determinar que un dispositivo está "
Downloads "Descargas" -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia es especialmente bueno en la detección de stalkerware común: Si sospechas que eres víctima de stalkerware, deberías [visitar esta página](https://stopstalkerware.org/information-for-survivors/) para obtener asesoramiento. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia es especialmente bueno en la detección de stalkerware común: Si sospec **iVerify** es una aplicación para iOS que escanea de manera automática tu dispositivo para revisar los ajustes de la configuración, el nivel de parche y otras áreas de seguridad. Esta también revisa tu dispositivo por indicadores de compromiso de herramientas de jailbreak o programas de espionaje como Pegasus. -[:octicons-home-16: Página principal](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Política de privacidad" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title="Documentación"} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads "Descargas" -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/es/dns.md b/i18n/es/dns.md index 1e1620a2..a050e782 100644 --- a/i18n/es/dns.md +++ b/i18n/es/dns.md @@ -11,14 +11,14 @@ Un DNS encriptado con servidores de terceros solo debe utilizarse para evitar el ## Proveedores Recomendados -| Proveedor de DNS | Política de Privacidad | Protocolos | Registro | ECS | Filtrado | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------- | -------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Algún[^1] | Sí | Basado en la configuración personal. La lista de filtros siendo utilizada se puede encontrar aquí. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Algún[^2] | No | Basado en la configuración personal. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Opcional[^3] | No | Basado en la configuración personal. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Basado en la configuración personal. La lista de filtro que se está utilizando se puede encontrar aquí. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Opcional [^5] | Opcional | Basado en la configuración personal. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Texto claro
DoH
DoT
DNSCrypt | Algún[^6] | Opcional | Basado en la configuración personal, bloqueo de malware por defecto. | +| Proveedor de DNS | Política de Privacidad | Protocolos | Registro | ECS | Filtrado | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------- | -------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Algún[^1] | Sí | Basado en la configuración personal. La lista de filtros siendo utilizada se puede encontrar aquí. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Algún[^2] | No | Basado en la configuración personal. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Opcional[^3] | No | Basado en la configuración personal. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | No[^4] | No | Basado en la configuración personal. La lista de filtro que se está utilizando se puede encontrar aquí. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Opcional [^5] | Opcional | Basado en la configuración personal. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Texto claro
DoH
DoT
DNSCrypt | Algún[^6] | Opcional | Basado en la configuración personal, bloqueo de malware por defecto. | ### Criterios @@ -50,7 +50,7 @@ Tras la instalación de un perfil de configuración o de una aplicación que uti #### Perfiles Firmados -Apple no proporciona una interfaz nativa para crear perfiles DNS encriptados. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) es una herramienta no oficial para crear tus propios perfiles DNS encriptados, aunque no estarán firmados. Son preferibles los perfiles firmados; la firma valida el origen de un perfil y ayuda a garantizar su integridad. Los perfiles de configuración firmados reciben la etiqueta verde de "Verificado". Para más información sobre la firma de código, consulte [Acerca de la firma de código](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Perfiles firmados** son ofrecidos por [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), y [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple no proporciona una interfaz nativa para crear perfiles DNS encriptados. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) es una herramienta no oficial para crear tus propios perfiles DNS encriptados, aunque no estarán firmados. Son preferibles los perfiles firmados; la firma valida el origen de un perfil y ayuda a garantizar su integridad. Los perfiles de configuración firmados reciben la etiqueta verde de "Verificado". Para más información sobre la firma de código, consulte [Acerca de la firma de código](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Detalles

@@ -74,7 +74,7 @@ El software de proxy de DNS encriptado proporciona un proxy local para que el re [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -123,9 +123,9 @@ Una solución DNS autoalojada es útil para proporcionar filtrado en plataformas
-![Logo de AdGuard Home](assets/img/dns/adguard-home.svg){ align=right } +![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** es un código abierto [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) que utiliza [filtrado DNS](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) para bloquear contenido web no deseado, como anuncios. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home cuenta con una interfaz web pulida para ver información y gestionar el contenido bloqueado. @@ -142,25 +142,25 @@ AdGuard Home cuenta con una interfaz web pulida para ver información y gestiona
-![Logo de Pi-hole](assets/img/dns/pi-hole.svg){ align=right } +![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** es un código abierto [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) que utiliza [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) para bloquear contenidos web no deseados, como la publicidad. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole está diseñado para alojarse en una Raspberry Pi, pero no se limita a dicho hardware. El software cuenta con una interfaz web fácil de usar para ver los datos y gestionar los contenidos bloqueados. -[:octicons-home-16: Página de Inicio](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Politica de privacidad" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
[^1]: AdGuard almacena métricas de rendimiento agregadas de sus servidores DNS, es decir, el número de solicitudes completas a un servidor en particular, el número de solicitudes bloqueadas, y la velocidad de procesamiento de solicitudes. También guardan y almacenan la base de datos de dominios solicitados dentro de las últimas 24 horas. "Necesitamos esta información para identificar y bloquear nuevos rastreadores y amenazas". "También registramos cuántas veces se ha bloqueado tal o cual rastreador. Necesitamos esta información para eliminar normas obsoletas de nuestros filtros". [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare recopila y almacena únicamente los datos de consulta DNS limitados que se envían al resolver 1.1.1.1. El servicio de resolución 1.1.1.1 no registra datos personales, y el grueso de los limitados datos de consulta no identificables personalmente se almacena solo durante 25 horas. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare recopila y almacena únicamente los datos de consulta DNS limitados que se envían al resolver 1.1.1.1. El servicio de resolución 1.1.1.1 no registra datos personales, y el grueso de los limitados datos de consulta no identificables personalmente se almacena solo durante 25 horas. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: El Control D solo registra los resolvers Premium con perfiles DNS personalizados. Los resolvers libres no registran datos. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: El servicio DNS de Mullvad está disponible tanto para suscriptores como para no suscriptores de Mullvad VPN. Su política de privacidad afirma explícitamente que no registran solicitudes DNS de ninguna manera. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: El servicio DNS de Mullvad está disponible tanto para suscriptores como para no suscriptores de Mullvad VPN. Su política de privacidad afirma explícitamente que no registran solicitudes DNS de ninguna manera. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. Puedes elegir los tiempos de retención y las ubicaciones de almacenamiento de los registros que desees conservar. Si no se solicita específicamente, no se registra ningún dato. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 recopila algunos datos con fines de monitorización y respuesta ante amenazas. Esos datos pueden remezclarse y compartirse, por ejemplo, con fines de investigación sobre seguridad. Quad9 no colecciona ni registra direcciones IP ni otros datos que consideren personalmente identificables. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 recopila algunos datos con fines de monitorización y respuesta ante amenazas. Esos datos pueden remezclarse y compartirse, por ejemplo, con fines de investigación sobre seguridad. Quad9 no colecciona ni registra direcciones IP ni otros datos que consideren personalmente identificables. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/es/email-clients.md b/i18n/es/email-clients.md index 0d8c7f3a..57708809 100644 --- a/i18n/es/email-clients.md +++ b/i18n/es/email-clients.md @@ -28,17 +28,17 @@ OpenPGP tampoco admite [secreto hacia adelante](https://en.wikipedia.org/wiki/Fo **Thunderbird** es un cliente de correo electrónico, grupos de noticias y chat (XMPP, IRC, Matrix) gratuito, de código abierto y multiplataforma desarrollado por la comunidad Thunderbird y, anteriormente, por la Fundación Mozilla. -[:octicons-home-16: Página Principal](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentación} -[:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} +[:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -74,9 +74,9 @@ Estas opciones se encuentran en :material-menu: → **Ajustes** → **Privacidad **Apple Mail** está incluido en macOS y puede ampliarse para que sea compatible con OpenPGP con [GPG Suite](encryption.md#gpg-suite), que añade la posibilidad de enviar correo electrónico cifrado con PGP. -[:octicons-home-16: Página Principal](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentación} +[:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation}
@@ -92,9 +92,9 @@ Apple Mail tiene la capacidad de cargar contenido remoto en segundo plano o bloq **Canary Mail** es un cliente de correo electrónico de pago diseñado para que el cifrado de extremo a extremo sea perfecto, con funciones de seguridad como el bloqueo biométrico de aplicaciones. -[:octicons-home-16: Página Principal](https://canarymail.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentación} +[:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads "Descargas" @@ -124,11 +124,11 @@ Canary Mail es de código cerrado. Lo recomendamos debido a las pocas opciones q **FairEmail** es una aplicación de correo electrónico mínima, de código abierto, que utiliza estándares abiertos (IMAP, SMTP, OpenPGP) con un bajo consumo de datos y batería. -[:octicons-home-16: Página Principal](https://email.faircode.eu){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Página Principal" } -[:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://email.faircode.eu){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads "Descargas" @@ -146,13 +146,13 @@ Canary Mail es de código cerrado. Lo recomendamos debido a las pocas opciones q ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** es una aplicación de gestión de información personal que proporciona funciones integradas de correo, calendario y libreta de direcciones. Evolution cuenta con una amplia [documentation](https://help.gnome.org/users/evolution/stable/) para ayudarle a empezar. +**Evolution** es una aplicación de gestión de información personal que proporciona funciones integradas de correo, calendario y libreta de direcciones. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. -[:octicons-home-16: Página Principal](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } -[:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentación} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } +[:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads "Descargas" @@ -173,11 +173,11 @@ Canary Mail es de código cerrado. Lo recomendamos debido a las pocas opciones q En el futuro, K-9 Mail será el cliente [de marca oficial](https://k9mail.app/2022/06/13/K-9-Mail-and-Thunderbird.html) Thunderbird para Android. -[:octicons-home-16: Página Principal](https://k9mail.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } +[:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute }
Downloads "Descargas" @@ -204,11 +204,11 @@ Al responder a alguien de una lista de correo, la opción "responder" también p **Kontact** es una aplicación de gestión de información personal (PIM) del proyecto [KDE](https://kde.org). Ofrece un cliente de correo, una libreta de direcciones, un organizador y un cliente RSS. -[:octicons-home-16: Página Principal](https://kontact.kde.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentación} -[:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} +[:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads "Descargas" @@ -228,10 +228,10 @@ Al responder a alguien de una lista de correo, la opción "responder" también p **Mailvelope** es una extensión de navegador que permite el intercambio de correos electrónicos cifrados siguiendo el estándar de cifrado OpenPGP. -[:octicons-home-16: Página Principal](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" }
Downloads "Descargas" @@ -254,10 +254,10 @@ Al responder a alguien de una lista de correo, la opción "responder" también p NeoMutt es un cliente basado en texto que tiene una curva de aprendizaje pronunciada. Sin embargo, es muy personalizable. -[:octicons-home-16: Página Principal](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads "Descargas" diff --git a/i18n/es/email.md b/i18n/es/email.md index d0d86f5b..cafbedb1 100644 --- a/i18n/es/email.md +++ b/i18n/es/email.md @@ -52,10 +52,10 @@ OpenPGP tampoco soporta Forward secrecy, lo que significa que si tu clave privad [:octicons-code-16:](https://github.com/ProtonMail){ .card-link title="Código fuente" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail tiene informes de errores internos que **no** comparten con terceros #### :material-check:{ .pg-green } Dominios Personalizados y Alias -Suscriptores de pago de Proton Mail pueden utilizar su propio dominio con el servicio o una direcciones [catch-all](https://proton.me/support/catch-all). Proton Mail también soporta [subdireccionamiento](https://proton.me/support/creating-aliases), que es útil para las personas que no quieren comprar un dominio. +Suscriptores de pago de Proton Mail pueden utilizar su propio dominio con el servicio o una direcciones [catch-all](https://proton.me/support/catch-all). Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Métodos de pago privados @@ -129,7 +129,7 @@ Proton Mail no ofrece la función de legado digital. #### :material-check:{ .pg-green } Dominios Personalizados y Alias -Mailbox.org te permite utilizar tu propio dominio y admite las direcciones [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain). Mailbox.org también es compatible con [subdireccionamiento](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), lo que es útil si no desea comprar un dominio. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Métodos Privados de Pago @@ -137,17 +137,17 @@ Mailbox.org no acepta criptomonedas debido a que su procesador de pagos BitPay s #### :material-check:{ .pg-green } Seguridad de Cuenta -Mailbox.org soporta [autenticación de doble factor](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo para su correo web. Puede utilizar TOTP o una [YubiKey](https://en.wikipedia.org/wiki/YubiKey) a través de [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Estándares web como [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) aún no son soportados. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Estándares web como [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) aún no son soportados. #### :material-information-outline:{ .pg-blue } Seguridad de Datos -Mailbox.org permite encriptación del correo entrante usando su [buzón encriptado](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). Nuevos mensajes que recibas se encriptaran inmediatamente con tu clave pública. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). Nuevos mensajes que recibas se encriptaran inmediatamente con tu clave pública. -Sin embargo, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), la plataforma de software utilizada por Mailbox.org, [no soporta](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) el cifrado de tu libreta de direcciones y calendario. Una [opción independiente](calendar.md) puede ser más apropiada para esa información. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. Una [opción independiente](calendar.md) puede ser más apropiada para esa información. #### :material-check:{ .pg-green } Encriptación de Correo Electrónico -Mailbox.org tiene [encriptación integrada](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) en su correo web, lo que simplifica el envío de mensajes a personas con claves públicas OpenPGP. También permiten que [destinatarios remotos desencripten un correo electrónico](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) en los servidores de Mailbox.org. Esta característica es útil cuando el destinatario remoto no tiene OpenPGP y no puede descifrar una copia del correo electrónico en su propio buzón de correo. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. Esta característica es útil cuando el destinatario remoto no tiene OpenPGP y no puede descifrar una copia del correo electrónico en su propio buzón de correo. Mailbox.org también admite el descubrimiento de claves públicas a través de HTTP desde su [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). Esto permite que personas afuera de Mailbox.org encuentren fácilmente las claves OpenPGP de las cuentas de Mailbox.org, para E2EE entre proveedores. Esto solo aplica para las direcciones de correo electrónico que terminan en un dominio de Mailbox.org, como @mailbox.org. Si utilizas un dominio personalizado, debes [configurar WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) por separado. @@ -157,9 +157,9 @@ Tu cuenta se convertirá en una cuenta de usuario restringida cuando finalice tu #### :material-information-outline:{ .pg-blue } Funcionalidad Adicional -Puedes acceder a tu cuenta de Mailbox.org a través de IMAP/SMTP utilizando su [servicio .onion](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). Sin embargo, no se puede acceder a su interfaz de correo web a través de su servicio .onion y es posible que se produzcan errores de certificado TLS. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). Sin embargo, no se puede acceder a su interfaz de correo web a través de su servicio .onion y es posible que se produzcan errores de certificado TLS. -Todas las cuentas vienen con un almacenamiento limitado en la nube que [puede ser encriptado](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org también ofrece el alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), que impone el cifrado TLS en la conexión entre servidores de correo; de lo contrario, el mensaje no se enviará en absoluto. Mailbox.org también admite [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) además de protocolos de acceso estándar como IMAP y POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org también admite [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) además de protocolos de acceso estándar como IMAP y POP3. Mailbox.org tiene una función de legado digital para todos los planes. Puedes elegir si deseas que alguno de tus datos se transmita a los herederos, siempre que lo soliciten y aporten tu testamento. Alternativamente, puedes designar a una persona por su nombre y dirección. @@ -181,22 +181,22 @@ Estos proveedores almacenan tus correos electrónicos con cifrado de cero-conoci **Tuta** es un servicio de correo electrónico centrado en la seguridad y la privacidad mediante el uso de cifrado. Tuta lleva en funcionamiento desde **2011** y tiene su sede en Hanóver, Alemania. Las cuentas empiezan con 1Gb de almacenamiento con su plan gratuito. -[:octicons-home-16: Página Principal](https://tuta.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://tuta.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta no admite el [protocolo IMAP](https://tuta.com/faq/#imap) ni el uso de [cli #### :material-check:{ .pg-green } Dominios Personalizados y Alias -Las cuentas de pago de Tuta pueden utilizar 15 o 30 alias en función de su plan y alias ilimitados en [dominios personalizados](https://tuta.com/faq#custom-domain). Tuta no permite la [subdirección (más direcciones)](https://tuta.com/faq#plus), pero puede utilizar un [catch-all](https://tuta.com/howto#settings-global) con un dominio personalizado. +Las cuentas de pago de Tuta pueden utilizar 15 o 30 alias en función de su plan y alias ilimitados en [dominios personalizados](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Métodos de pago privados @@ -232,7 +232,7 @@ Tuta [eliminará las cuentas gratuitas inactivas](https://tuta.com/faq#inactive- Tuta ofrece la versión empresarial de [Tuta para organizaciones sin ánimo de lucro](https://tuta.com/blog/posts/secure-email-for-non-profit) de forma gratuita o con un importante descuento. -Tuta también tiene una función para empresas llamada [Secure Connect](https://tuta.com/secure-connect/). Esto garantiza que el contacto del cliente con la empresa utilice E2EE. La función cuesta 240 €/año. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). Esto garantiza que el contacto del cliente con la empresa utilice E2EE. La función cuesta 240 €/año. Tuta no ofrece una función de legado digital. @@ -280,18 +280,18 @@ Utilizar un servicio de alias requiere confiar, tanto a tu proveedor de correo e [:octicons-heart-16:](https://addy.io/donate){ .card-link title=Contribuir }
-Downloads "Descargas" +Downloads - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-El número de alias compartidos (finalizan en un dominio compartido como @addy.io) que puedes crear está limitado a 10 en el plan gratuito de addy.io, 50 en el plan de $1/mes e ilimitado en el plan de $4/mes (facturado en $3 por un año). Puedes crear alias estándar ilimitados (terminan en un dominio como @[username].addy.io o en un dominio personalizado en los planes de pago), sin embargo, como se ha mencionado previamente, esto puede ser perjudicial para la privacidad porque las personas pueden relacionar trivialmente los alias estándar, basándose únicamente en el nombre de dominio. Estos son útiles cuando un dominio compartido puede estar bloqueado por un servicio. Securitum [realizó una auditoría](https://addy.io/blog/addy-io-passes-independent-security-audit/) de addi.io en setiembre de 2023 y [no se encontró](https://addy.io/addy-io-security-audit.pdf) alguna vulnerabilidad importante. +El número de alias compartidos (finalizan en un dominio compartido como @addy.io) que puedes crear está limitado a 10 en el plan gratuito de addy.io, 50 en el plan de $1/mes e ilimitado en el plan de $4/mes (facturado en $3 por un año). Puedes crear alias estándar ilimitados (terminan en un dominio como @[username].addy.io o en un dominio personalizado en los planes de pago), sin embargo, como se ha mencionado previamente, esto puede ser perjudicial para la privacidad porque las personas pueden relacionar trivialmente los alias estándar, basándose únicamente en el nombre de dominio. Estos son útiles cuando un dominio compartido puede estar bloqueado por un servicio. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Funciones gratuitas destacables: @@ -309,27 +309,27 @@ Funciones gratuitas destacables: **SimpleLogin** es un servicio gratuito que proporciona alias de correo electrónico en una variedad de nombres de dominio compartidos, y opcionalmente proporciona características de pago como alias ilimitados y dominios personalizados. -[:octicons-home-16: Página Principal](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Politica de Privacidad" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/simple-login){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin fue [adquirida por Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) a partir del 8 de abril de 2022. Si utiliza Proton Mail para su buzón principal, SimpleLogin es una gran elección. Como ambos productos pertenecen ahora a la misma empresa, ahora sólo tiene que confiar en una única entidad. También esperamos que SimpleLogin se integre más estrechamente con las ofertas de Proton en el futuro. SimpleLogin sigue siendo compatible con el reenvío a cualquier proveedor de correo electrónico de su elección. Securitum [auditado](https://simplelogin.io/blog/security-audit/) SimpleLogin a principios de 2022 y todos los problemas [fueron resueltos](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin fue [adquirida por Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) a partir del 8 de abril de 2022. Si utiliza Proton Mail para su buzón principal, SimpleLogin es una gran elección. Como ambos productos pertenecen ahora a la misma empresa, ahora sólo tiene que confiar en una única entidad. También esperamos que SimpleLogin se integre más estrechamente con las ofertas de Proton en el futuro. SimpleLogin sigue siendo compatible con el reenvío a cualquier proveedor de correo electrónico de su elección. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). Puedes vincular tu cuenta SimpleLogin en la configuración con tu cuenta Proton. Si tienes el plan Proton Unlimited, Business o Visionary, tendrás SimpleLogin Premium gratis. @@ -351,10 +351,10 @@ Los administradores de sistemas avanzados pueden plantearse crear su propio serv **Mailcow** es un servidor de correo más avanzado perfecto para aquellos con un poco más de experiencia en Linux. Tiene todo lo que necesitas en un contenedor Docker: Un servidor de correo con soporte DKIM, antivirus, monitorización de spam, webmail, ActiveSync con SOGo y administración basada en web con soporte 2FA. -[:octicons-home-16: Página Principal](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Los administradores de sistemas avanzados pueden plantearse crear su propio serv Para un enfoque más manual, hemos seleccionado estos dos artículos: -- [Configuración de un servidor de correo con OpenSMTPD, Dovecot y Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [Cómo gestionar tu propio servidor de correo](https://www.c0ffee.net/blog/mail-server-guide/) (agosto de 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criterios @@ -386,7 +386,7 @@ Consideramos que estas características son importantes para ofrecer un servicio **Mínimo para calificar:** - Cifra los datos de las cuentas de correo electrónico en reposo con cifrado de acceso cero. -- Capacidad de exportación como [Mbox](https://en.wikipedia.org/wiki/Mbox) o .eml individual con [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) estándar. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Permitir a los usuarios utilizar su propio [nombre de dominio](https://en.wikipedia.org/wiki/Domain_name). Los nombres de dominio personalizados son importantes para los usuarios porque les permiten mantener su agencia del servicio, en caso de que éste se estropee o sea adquirido por otra empresa que no dé prioridad a la privacidad. - Operaciones en infraestructura propia, es decir, no construidas sobre proveedores de servicios de correo electrónico de terceros. @@ -397,7 +397,7 @@ Consideramos que estas características son importantes para ofrecer un servicio - Compatibilidad con [WKD](https://wiki.gnupg.org/WKD) para permitir un mejor descubrimiento de claves OpenPGP públicas a través de HTTP. Los usuarios de GnuPG pueden obtener una clave escribiendo: `gpg --locate-key usuario_ejemplo@ejemplo.com` - Soporte para un buzón temporal para usuarios externos. Esto es útil cuando quieres enviar un correo electrónico encriptado, sin enviar una copia real a tu destinatario. Estos correos electrónicos suelen tener una vida útil limitada y luego se eliminan automáticamente. Tampoco requieren que el destinatario configure ninguna criptografía como OpenPGP. - Disponibilidad de los servicios del proveedor de correo electrónico a través de un [ servicio onion](https://en.wikipedia.org/wiki/.onion). -- Soporte de [subdireccionamiento](https://en.wikipedia.org/wiki/Email_address#Subaddressing). +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Funcionalidad Catch-all o alias para aquellos que poseen sus propios dominios. - Utilización de protocolos estándar de acceso al correo electrónico como IMAP, SMTP o [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Los protocolos de acceso estándar garantizan que los clientes puedan descargar fácilmente todo su correo electrónico en caso de que quieran cambiar de proveedor. @@ -425,13 +425,13 @@ Los servidores de correo electrónico manejan muchos datos sensibles. Esperamos - Protección del correo web con 2FA, como TOTP. - Cifrado de acceso cero, basado en el cifrado en reposo. El proveedor no disponga de las claves de descifrado de los datos que posee. Esto evita que un empleado deshonesto filtre datos a los que tiene acceso o que un adversario remoto divulgue datos que ha robado al obtener acceso no autorizado al servidor. - Compatible con [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions). -- No haya errores o vulnerabilidades TLS cuando se perfilan con herramientas como [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/)o [Qualys SSL Labs](https://www.ssllabs.com/ssltest); esto incluye errores relacionados con el certificado y parámetros DH débiles, como los que llevaron a [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - Una preferencia de suite de servidor (opcional en TLSv1.3) para suites de cifrado potentes que soporten forward secrecy y encriptación autenticada. - Una política válida [MTA-STS](https://tools.ietf.org/html/rfc8461) y [TLS-RPT](https://tools.ietf.org/html/rfc8460). - Registros válidos de [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities). - Registros válidos [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) y [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail). - Tenga un registro y una política adecuados de [DMARC](https://en.wikipedia.org/wiki/DMARC) o use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) para la autenticación. Si se utiliza la autenticación DMARC, la política debe establecerse en `rechazar` o `cuarentena`. -- Una preferencia de conjunto de servidores de TLS 1.2 o posterior y un plan para [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [Envío de SMTPS](https://en.wikipedia.org/wiki/SMTPS), suponiendo que se utiliza SMTP. - Estándares de seguridad del sitio web tales como: - [Seguridad de transporte estricta HTTP](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Los servidores de correo electrónico manejan muchos datos sensibles. Esperamos - Programas de recompensa de errores y/o un proceso coordinado de divulgación de vulnerabilidades. - Estándares de seguridad del sitio web tales como: - [Política de seguridad de contenido (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Confianza diff --git a/i18n/es/encryption.md b/i18n/es/encryption.md index a3aa9fca..bfc5ec3d 100644 --- a/i18n/es/encryption.md +++ b/i18n/es/encryption.md @@ -20,17 +20,17 @@ Las opciones enumeradas aquí son multiplataforma y excelentes para crear copias **Cryptomator** es una solución de cifrado diseñada para guardar archivos de forma privada en cualquier proveedor en la nube. Le permite crear bóvedas que se almacenan en una unidad virtual, cuyo contenido está cifrado y sincronizado con su proveedor de almacenamiento en la nube. -[:octicons-home-16: Página Principal](https://cryptomator.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator utiliza el cifrado AES-256 para cifrar tanto los archivos como los n Algunas bibliotecas criptográficas de Cryptomator han sido [auditadas](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) por Cure53. El alcance de las bibliotecas auditadas incluye: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) y [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). La auditoría no se extendió a [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), que es una biblioteca utilizada por Cryptomator para iOS. -La documentación de Cryptomator detalla su intención con respecto a su [objetivo de seguridad](https://docs.cryptomator.org/en/latest/security/security-target/), [arquitectura de seguridad](https://docs.cryptomator.org/en/latest/security/architecture/), y [mejores prácticas](https://docs.cryptomator.org/en/latest/security/best-practices/) para su uso con más detalle. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (Archivo) @@ -79,17 +79,17 @@ La documentación de Cryptomator detalla su intención con respecto a su [objeti **VeraCrypt** es una utilidad de software gratuito con el código fuente disponible que se utiliza para el cifrado sobre la marcha. Puede crear un disco cifrado virtual dentro de un archivo, cifrar una partición o cifrar todo el dispositivo de almacenamiento con autenticación previa al arranque. -[:octicons-home-16: Página Principal](https://veracrypt.fr){ .md-button .md-button--primary } -[:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentación} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } +[:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
-Downloads "Descargas" +Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ Para cifrar la unidad desde la que inicia el sistema operativo, por lo general r ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** es la solución de cifrado de volumen completo incluida con Microsoft Windows. La principal razón por la que recomendamos utilizarlo para encriptar la unidad de arranque, es por su [uso de TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, una compañía forense, ha publicado sobre esta característica en [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** es la solución de cifrado de volumen completo incluida con Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentación} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker es [únicamente compatible](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) en las versiones Pro, Enterprise y Education de Windows. Se puede habilitar en las ediciones Home siempre que cumplan con los requisitos previos. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. Se puede habilitar en las ediciones Home siempre que cumplan con los requisitos previos.
Activar BitLocker en Windows Home @@ -136,7 +136,7 @@ Para habilitar BitLocker en las ediciones "Home" de Windows, debe tener particio powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Acceda a [Opciones avanzadas de inicio](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). Debe reiniciar mientras pulsa la tecla F8 antes de que se inicie Windows y entrar en el símbolo del sistema ** en **Solucionar problemas** → **Opciones avanzadas** → **Símbolo del sistema**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). Debe reiniciar mientras pulsa la tecla F8 antes de que se inicie Windows y entrar en el símbolo del sistema ** en **Solucionar problemas** → **Opciones avanzadas** → **Símbolo del sistema**. 4. Inicie sesión con su cuenta de administrador y escriba esto en el símbolo del sistema para iniciar el cifrado: ```powershell manage-bde -on c: -used @@ -183,9 +183,9 @@ Recomendamos almacenar una clave de recuperación local en un lugar seguro en lu **LUKS** es el método FDE por defecto para Linux. Puede utilizarse para cifrar volúmenes completos, particiones o crear contenedores cifrados. -[:octicons-home-16: Página Principal](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentación} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Las herramientas con interfaces de línea de comandos son útiles para integrar ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** es una herramienta de cifrado y firma de archivos gratuita y de código abierto que hace uso de algoritmos criptográficos modernos y seguros. Pretende ser una versión mejorada de [age](https://github.com/FiloSottile/age) y [Minisign](https://jedisct1.github.io/minisign/) para ofrecer una alternativa sencilla y más fácil a GPG. +**Kryptor** es una herramienta de cifrado y firma de archivos gratuita y de código abierto que hace uso de algoritmos criptográficos modernos y seguros. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Página Principal](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
-Downloads "Descargas" +Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Las herramientas con interfaces de línea de comandos son útiles para integrar **Tomb** es un empaquetador de shell de línea de comandos para LUKS. Admite esteganografía a través de [herramientas de terceros](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Página Principal](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Las herramientas con interfaces de línea de comandos son útiles para integrar OpenPGP es a veces necesario para tareas específicas como la firma digital y el cifrado de correo electrónico. PGP tiene muchas funciones y es [complejo](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) ya que existe desde hace mucho tiempo. Para tareas como firmar o cifrar archivos, sugerimos las opciones anteriores. -Al cifrar con PGP, tiene la opción de configurar diferentes opciones en su archivo `gpg.conf`. Recomendamos utilizar las opciones estándar especificadas en las preguntas frecuentes de los usuarios de [GnuPG](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +Al cifrar con PGP, tiene la opción de configurar diferentes opciones en su archivo `gpg.conf`. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Utilice future defaults al generar una clave

-Al [generar claves](https://www.gnupg.org/gph/en/manual/c14.html) sugerimos usar el comando `future-default` ya que esto instruirá a GnuPG a usar criptografía moderna como [Curve25519](https://es.wikipedia.org/wiki/Curve25519#Popularidad) y [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GNUPG** es una alternativa con licencia GPL a la suite de software criptográfico PGP. GnuPG cumple con [RFC 4880](https://tools.ietf.org/html/rfc4880), que es la especificación actual del IETF de OpenPGP. El proyecto GnuPG ha estado trabajando en un [borrador actualizado](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) en un intento de modernizar OpenPGP. GnuPG forma parte del proyecto de software GNU de la Fundación para el Software Libre y ha recibido un importante [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) del gobierno alemán. +**GNUPG** es una alternativa con licencia GPL a la suite de software criptográfico PGP. GnuPG cumple con [RFC 4880](https://tools.ietf.org/html/rfc4880), que es la especificación actual del IETF de OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG forma parte del proyecto de software GNU de la Fundación para el Software Libre y ha recibido un importante [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) del gobierno alemán. [:octicons-home-16: Página Principal](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Política de Privacidad" } @@ -369,12 +369,12 @@ Recomendamos echar un vistazo a sus [Primeros pasos](https://gpgtools.tenderapp. ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** es una implementación de GnuPG para Android. Es comúnmente requerido por clientes de correo como [K-9 Mail](email-clients.md#k-9-mail) y [FairEmail](email-clients.md#fairemail) y otras aplicaciones Android para proporcionar soporte de cifrado. Cure53 completó una [auditoría de seguridad](https://www.openkeychain.org/openkeychain-3-6) de OpenKeychain 3.6 en octubre de 2015. Los detalles técnicos sobre la auditoría y las soluciones de OpenKeychain pueden consultarse [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** es una implementación de GnuPG para Android. Es comúnmente requerido por clientes de correo como [K-9 Mail](email-clients.md#k-9-mail) y [FairEmail](email-clients.md#fairemail) y otras aplicaciones Android para proporcionar soporte de cifrado. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Los detalles técnicos sobre la auditoría y las soluciones de OpenKeychain pueden consultarse [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Página Principal](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
Downloads "Descargas" diff --git a/i18n/es/file-sharing.md b/i18n/es/file-sharing.md index e5500e2b..a263abb6 100644 --- a/i18n/es/file-sharing.md +++ b/i18n/es/file-sharing.md @@ -15,7 +15,7 @@ Descubra cómo puede compartir de manera privada sus archivos entre sus disposit ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** es una bifurcación del programa Firefox Send (descontinuado por Mozilla), que permite enviar archivos a otras personas mediante un enlace. Los archivos son encriptados en su dispositivo, lo que no permite que sean leídos por el servidor y, opcionalmente, también pueden protegerse por una contraseña. El responsable de mantener Send ofrece una [instancia pública](https://send.vis.ee/). Puede usitlizar otras instancias públicas o puede hospedar Send usted mismo. +**Send** es una bifurcación del programa Firefox Send (descontinuado por Mozilla), que permite enviar archivos a otras personas mediante un enlace. Los archivos son encriptados en su dispositivo, lo que no permite que sean leídos por el servidor y, opcionalmente, también pueden protegerse por una contraseña. The maintainer of Send hosts a [public instance](https://send.vis.ee). Puede usitlizar otras instancias públicas o puede hospedar Send usted mismo. [:octicons-home-16: Página principal](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -80,10 +80,10 @@ Estamos trabajando en establecer criterios definidos para cada sección de nuest **FreedomBox** es un sistema operativo diseñado para correr en una [computadora de placa única (SBC, por sus siglas en inglés)](https://en.wikipedia.org/wiki/Single-board_computer). El propósito es facilitar la configuración de aplicaciones que requieran un servidor y se puedan alojar por usted mismo. -[:octicons-home-16: Página principal](https://freedombox.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -99,11 +99,11 @@ Estamos trabajando en establecer criterios definidos para cada sección de nuest **Nextcloud** es un conjunto de programas gratuitos y de código abierto, para la creación de su propio servicio de almacenamiento de archivos en un servidor privado que usted controle. -[:octicons-home-16: Página Principal](https://nextcloud.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads "Descargas" @@ -134,19 +134,19 @@ No recomendamos utilizar la [aplicación con cifrado de extremo a extremo](https **Syncthing** es una herramienta de sincronización continua de archivos peer-to-peer de código abierto. Es utilizada para sincronizar archivos entre dos o más dispositivos sobre la red local o el Internet. Syncthing no utiliza un servidor centralizado, este utiliza el [Protocolo de Intercambio de Bloques](https://docs.syncthing.net/specs/bep-v1.html#bep-v1) para transferir los datos entre dispositivos. Todos los datos son encriptados utilizando TLS. -[:octicons-home-16: Página Principal](https://syncthing.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/syncthing){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/es/financial-services.md b/i18n/es/financial-services.md index 01824dc3..a25235c6 100644 --- a/i18n/es/financial-services.md +++ b/i18n/es/financial-services.md @@ -28,9 +28,9 @@ Muchos bancos y proveedores de tarjetas de crédito ofrecen funciones nativas de El plan gratuito de **Privacy.com** le permite crear hasta 12 tarjetas virtuales al mes, establecer límites de gasto en esas tarjetas y cerrarlas al instante. Su plan de pago le permite crear hasta 36 tarjetas al mes, obtener un 1% de reembolso en las compras y ocultar la información de la transacción de su banco. -[:octicons-home-16: Página Principal](https://privacy.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentación} +[:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com facilita por defecto a su banco información sobre los comercios en **MySudo** proporciona hasta 9 tarjetas virtuales dependiendo del plan que contrate. Sus planes de pago incluyen además funciones que pueden ser útiles para realizar compras en privado, como números de teléfono virtuales y direcciones de correo electrónico, aunque normalmente recomendamos otros [proveedores de alias de correo electrónico](email.md) para un uso extenso del alias de correo electrónico. -[:octicons-home-16: Página Principal](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentación} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ Estos servicios le permiten comprar tarjetas de regalo para una gran variedad de **CoinCards** (disponible en EE. UU. y Canad) le permite comprar tarjetas regalo para una gran variedad de comercios. -[:octicons-home-16: Página Principal](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentación} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/es/frontends.md b/i18n/es/frontends.md index ad5f9689..9e92ec34 100644 --- a/i18n/es/frontends.md +++ b/i18n/es/frontends.md @@ -19,7 +19,7 @@ Cuando utilices una instancia gestionada por otra persona, asegúrate de leer la ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -*ProxiTok** es una interfaz gratuita y de código abierto para el sitio web [TikTok](https://www.tiktok.com) que también es autoalojable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ Por defecto, FreeTube bloquea todos los anuncios de YouTube. Además, FreeTube s [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ Por defecto, FreeTube bloquea todos los anuncios de YouTube. Además, FreeTube s

Advertencia

-Al utilizar FreeTube, su dirección IP puede seguir siendo conocida por YouTube, [Invidious](https://instances.invidious.io), o [SponsorBlock](https://sponsor.ajay.app/) dependiendo de su configuración. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ Al utilizar FreeTube, su dirección IP puede seguir siendo conocida por YouTube, **Yattee** es un reproductor de vídeo gratuito y de código abierto orientado a la privacidad para iOS, tvOS y macOS para [YouTube](https://youtube.com). Al usar Yattee, su lista de suscripciones se guarda localmente en su dispositivo. -Necesitará realizar algunos [pasos adicionales](https://gonzoknows.com/posts/Yattee/) antes de poder usar Yattee para ver YouTube, debido a las restricciones de la App Store. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ Necesitará realizar algunos [pasos adicionales](https://gonzoknows.com/posts/Ya
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ Necesitará realizar algunos [pasos adicionales](https://gonzoknows.com/posts/Ya

Advertencia

-Al utilizar Yattee, su dirección IP puede seguir siendo conocida por YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances/) o [SponsorBlock](https://sponsor.ajay.app/) dependiendo de su configuración. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube le permite almacenar su lista de suscripciones y listas de reproducci

Advertencia

-Al usar LibreTube, su dirección IP será visible para la instancia [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) que elija y/o [SponsorBlock](https://sponsor.ajay.app/) dependiendo de su configuración. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ Por defecto, LibreTube bloquea todos los anuncios de YouTube. Además, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** es una aplicación Android gratuita y de código abierto para [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com) y [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Su lista de suscripciones y sus listas de reproducción se guardan localmente en su dispositivo Android. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Su lista de suscripciones y sus listas de reproducción se guardan localmente en -1. La instancia por defecto es [FramaTube](https://framatube.org/), sin embargo, se pueden añadir más a través de **Ajustes** → **Contenido** → **Instancias de PeerTube** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Advertencia

@@ -190,11 +190,11 @@ Al utilizar NewPipe, su dirección IP será visible para los proveedores de víd There are a number of public instances, with some instances having [Tor](tor.md) onion services support. -[:octicons-home-16: Página Principal](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Instancias Públicas"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -224,11 +224,11 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requiere JavaScript para funcionar y existen varias instancias públicas. -[:octicons-repo-16: Repositorio](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Instancias Públicas"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribuir } +[:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } +[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute }
diff --git a/i18n/es/index.md b/i18n/es/index.md index 16943827..fedcbf60 100644 --- a/i18n/es/index.md +++ b/i18n/es/index.md @@ -62,12 +62,12 @@ Intentar proteger todos tus datos de todo el mundo y en todo momento es impráct ## ¡Te necesitamos! Aquí te indicamos cómo involucrarse: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Únete a nuestro foro" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Síguenos en Mastodon" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribuye a este sitio web" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Ayuda a traducir este sitio web" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chatea con nosotros en Matrix" } -[:material-information-outline:](about/index.md){ title="Conócenos mejor" } -[:material-hand-coin-outline:](about/donate.md){ title="Apoya el proyecto" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } Es importante que un sitio web como Privacy Guides se mantenga siempre actualizado. Necesitamos que nuestra audiencia vigile las actualizaciones de software para las aplicaciones listadas en nuestro sitio y también sigan las últimas noticias sobre proveedores que recomendamos. Es difícil mantenerse al día con el ritmo rápido de Internet, pero intentamos lo mejor. Si detectas un error, crees que un proveedor no debe ser listado, notas que falta un proveedor calificado, crees que un plugin de navegador ya no es la mejor opción, o descubres cualquier otro problema, por favor háznoslo saber. diff --git a/i18n/es/kb-archive.md b/i18n/es/kb-archive.md index c17f11f6..190388ad 100644 --- a/i18n/es/kb-archive.md +++ b/i18n/es/kb-archive.md @@ -8,10 +8,10 @@ description: Algunas páginas que solían estar en nuestra base de conocimientos Algunas páginas que solían estar en nuestra base de conocimientos ahora se pueden encontrar en nuestro blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Endurecimiento de la Configuración de Signal](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - Refuerzo del Sistema](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Sandboxing de Aplicaciones](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Borrado Seguro de Datos](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integración de la Eliminación de Metadatos](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [Guía de Configuración de iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Endurecimiento de la Configuración de Signal](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - Refuerzo del Sistema](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Sandboxing de Aplicaciones](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Borrado Seguro de Datos](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integración de la Eliminación de Metadatos](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [Guía de Configuración de iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/es/meta/admonitions.md b/i18n/es/meta/admonitions.md index 109c9fd5..47264923 100644 --- a/i18n/es/meta/admonitions.md +++ b/i18n/es/meta/admonitions.md @@ -165,15 +165,15 @@ Este formato se utiliza para generar tarjetas de recomendación. En particular, ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** es una plataforma autoalojable para la gestión de fotos. Admite la sincronización y compartición de álbumes, así como una variedad de otras [características](https://www.photoprism.app/features). No incluye E2EE, por lo que es mejor alojarlo en un servidor en el que confíes y que esté bajo tu control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-github: GitHub](https://github.com/photoprism) @@ -188,12 +188,12 @@ Este formato se utiliza para generar tarjetas de recomendación. En particular, ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** es una plataforma autoalojable para la gestión de fotos. Permite sincronizar y compartir álbumes, así como otras muchas [funciones](https://www.photoprism.app/features). No incluye E2EE, por lo que es mejor alojarlo en un servidor en el que confíes y que esté bajo tu control. +**PhotoPrism** es una plataforma autoalojable para la gestión de fotos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). No incluye E2EE, por lo que es mejor alojarlo en un servidor en el que confíes y que esté bajo tu control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
Downloads "Descargas" @@ -212,10 +212,10 @@ Se trata de un tipo especial de advertencia plegable, utilizada para generar la ```markdown title="Downloads Section"
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ Se trata de un tipo especial de advertencia plegable, utilizada para generar la Downloads "Descargas" - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/es/meta/translations.md b/i18n/es/meta/translations.md index d9f64d4f..886b7ca5 100644 --- a/i18n/es/meta/translations.md +++ b/i18n/es/meta/translations.md @@ -2,9 +2,9 @@ title: Traducciones --- -Crowdin poseé una buena documentación, y sugerimos consultar la guía de [Inicio rápido](https://support.crowdin.com/crowdin-intro/). Nuestro sitio se encuentra escrito en gran parte en [Markdown](https://en.wikipedia.org/wiki/Markdown), por lo que debe ser fácil contribuir. Esta página contiene algunos consejos útiles para la traducción de algunas sintaxis específicas que puedes encontrar en nuestro sitio. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Nuestro sitio se encuentra escrito en gran parte en [Markdown](https://en.wikipedia.org/wiki/Markdown), por lo que debe ser fácil contribuir. Esta página contiene algunos consejos útiles para la traducción de algunas sintaxis específicas que puedes encontrar en nuestro sitio. -Por favor, únase a nuestra sala de localización en Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) si tienes algunas preguntas adicionales, y lee nuestra [publicación de anuncio en el blog](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) para obtener información adicional sobre el proyecto. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Tome en cuenta que la versión en Inglés del sitio es la versión primaria, lo que significa que los cambios se producen primero en esta. Si nota que un lenguaje está rezagado detrás de la versión en Inglés, por favor colabore. No podemos garantizar la exactitud de todas nuestras traducciones. Si tiene una sugerencia sobre contenido específico de su región, por favor abra un issue o pull request en nuestro [repositorio principal](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ Los sistemas de escritura CJK tienden a utilizar variantes alternativas de "anch - Los enlaces deben usar paréntesis regulares como `(` (paréntesis izquierdo U+0028) y `)` (paréntesis derecho U+0029) y no ` (` (paréntesis izquierdo de ancho completo U+FF08) o `) ` (paréntesis derecho de ancho completo U+FF09) - El texto indentado debe utilizar `:` (dos puntos U+003A) y no `:` (dos puntos de ancho completo U+FF1A) -- Las imágenes deben utilizar `!` (signo de exclamación U+0021) y no `! ` (signo de exclamación de ancho completoU+FF01) +- Las imágenes deben utilizar `!` (signo de exclamación U+0021) y no `! ` (signo de exclamación de ancho completoU+FF01) diff --git a/i18n/es/meta/uploading-images.md b/i18n/es/meta/uploading-images.md index bcd604ad..08608e57 100644 --- a/i18n/es/meta/uploading-images.md +++ b/i18n/es/meta/uploading-images.md @@ -17,7 +17,7 @@ Los logotipos de empresa tienen un tamaño de lienzo de: ### PNG -Utiliza [OptiPNG](https://sourceforge.net/projects/optipng/) para optimizar la imagen PNG: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/es/meta/writing-style.md b/i18n/es/meta/writing-style.md index fa5313da..c9c9d303 100644 --- a/i18n/es/meta/writing-style.md +++ b/i18n/es/meta/writing-style.md @@ -4,11 +4,11 @@ title: Estilo de escritura Privacy Guides está redactada en inglés americano, por lo que, en caso de duda, deberá consultar las [normas de estilo APA](https://apastyle.apa.org/style-grammar-guidelines/grammar). -En general, las [directrices federales sobre lenguaje sencillo de Estados Unidos ](https://www.plainlanguage.gov/guidelines/) ofrecen una buena visión general de cómo escribir de forma clara y concisa. A continuación destacamos algunas notas importantes de estas directrices. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. A continuación destacamos algunas notas importantes de estas directrices. ## Escribir para nuestro público -El [público](https://www.plainlanguage.gov/guidelines/audience/) previsto de las guías de privacidad es principalmente promedio, adultos que utilizan la tecnología. No simplifique el contenido como si se dirigiera a una clase de secundaria, pero tampoco abuse de terminología complicada sobre conceptos con los que los usuarios medios de ordenadores no estarían familiarizados. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. No simplifique el contenido como si se dirigiera a una clase de secundaria, pero tampoco abuse de terminología complicada sobre conceptos con los que los usuarios medios de ordenadores no estarían familiarizados. ### Abordar sólo lo que la gente quiere saber @@ -24,7 +24,7 @@ Escribimos *para* una gran variedad de personas, pero escribimos *para* la perso > > Cuando utilizas el "tú" para dirigirte a los usuarios, es más probable que entiendan cuál es su responsabilidad. -Fuente: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Evitar "usuarios" @@ -37,7 +37,7 @@ La organización es clave. El contenido debe fluir de la información más impor - Limita el documento a alrededor de cinco o seis secciones. Los documentos largos deberían dividirse en páginas separadas. - Marca ideas importantes con **negrita** o *cursiva*. -Fuente: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Comienza con una frase del tema @@ -45,7 +45,7 @@ Fuente: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > A menudo escribimos como pensamos, poniendo primero nuestras premisas y luego nuestra conclusión. Puede que sea la forma natural de desarrollar pensamientos, pero terminamos con la frase del tema al final del apartado. Muévelo hacia delante y haz que los usuarios sepan hacia dónde vas. No haga que los lectores retengan mucha información en la cabecera antes de ir al grano. -Fuente: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Elige tus palabras con cuidado @@ -65,7 +65,7 @@ Deberíamos intentar evitar las abreviaturas en la medida de lo posible, pero la > Las palabras innecesarias hacen perder el tiempo al público. Escribir bien es como conversar. Omita la información que el público no necesita saber. Esto puede resultar difícil como experto en la materia, por lo que es importante que alguien vea la información desde la perspectiva de la audiencia. -Fuente: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Mantener el texto conversacional @@ -77,7 +77,7 @@ Fuente: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > La voz activa deja claro quién debe hacer qué. Elimina la ambigüedad sobre las responsabilidades. No "Hay que hacerlo", sino "Debes hacerlo". -Fuente: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Utiliza "debes" para los requisitos diff --git a/i18n/es/mobile-browsers.md b/i18n/es/mobile-browsers.md index a250415a..ad7db7e9 100644 --- a/i18n/es/mobile-browsers.md +++ b/i18n/es/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ Estos son nuestras recomendaciones actuales sobre navegadores web para móviles ## Android -En Android, Firefox es incluso menos seguro que las alternativas basadas en Chromium: El motor de Mozilla, [GeckoView](https://mozilla.github.io/geckoview/), aún no soporta el aislamiento de sitios [](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) ni habilitar [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,15 +49,15 @@ En Android, Firefox es incluso menos seguro que las alternativas basadas en Chro ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** incluye un bloqueador de contenidos integrado y [funciones de privacidad](https://brave.com/privacy-features/), muchas de las cuales están activadas por defecto. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave se basa en el proyecto de navegador web Chromium, por lo que debería resultar familiar y tener mínimos problemas de compatibilidad con sitios web. -[:octicons-home-16: Página Principal]](https://brave.com/){ .md-button .md-button--primary } -[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Servicio Onion"" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Politica de Privacidad" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads "Descargas" @@ -77,7 +77,7 @@ Estas opciones se pueden encontrar en :material-menu: → **Configuración** → ##### Escudos -Brave incluye algunas medidas anti-fingerprinting en su función de [Escudos](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Sugerimos configurar estas opciones [globalmente](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) en todas las páginas que visite. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Valores generales predeterminados de los escudos de Brave @@ -101,7 +101,7 @@ Brave te permite seleccionar filtros de contenido adicionales dentro de la pági -1. Esta opción proporciona una funcionalidad similar a los [modos de bloqueo ](https://github.com/gorhill/uBlock/wiki/Blocking-mode)avanzados de uBlock Origin o la extensión [NoScript](https://noscript.net/). +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Borrar datos de navegación @@ -115,13 +115,13 @@ Brave te permite seleccionar filtros de contenido adicionales dentro de la pági
-- [x] Seleccione **Desactivar UDP sin proxy** en [Política de gestión de IP de WebRTC](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) -- [ ] Desmarque **Permite a los sitios comprobar si tienes métodos de pago guardados** -- [ ] Desmarque **Puerta de enlace IPFS** (1) -- [x] Seleccione **Cerrar pestañas al salir** -- [ ] Desmarque **Permitir estadísticas de productos que preservan la privacidad (P3A)** -- [ ] Desmarque **Enviar informes de diagnóstico automáticamente** -- [ ] Desmarque **Enviar automáticamente el ping diario de uso a Brave** +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Allow sites to check if you have payment methods saved** +- [ ] Uncheck **IPFS Gateway** (1) +- [x] Select **Close tabs on exit** +- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** +- [ ] Uncheck **Automatically send diagnostic reports** +- [ ] Uncheck **Automatically send daily usage ping to Brave**
@@ -129,7 +129,7 @@ Brave te permite seleccionar filtros de contenido adicionales dentro de la pági #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) permite que sus datos de navegación (historial, marcadores, etc.) sean accesibles en todos sus dispositivos sin necesidad de una cuenta y los protege con E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,11 +141,11 @@ En iOS, cualquier aplicación que puede navegar en internet está [limitada](htt ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** es el navegador predeterminado en iOS. Incluye [funciones de privacidad](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) como [Antirrastreo Inteligente](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Informe de Privacidad, pestañas de Navegación Privada aisladas y efímeras, Relay Privado de iCloud, protección de huellas digitales mediante la aleatorización y presentación de una versión simplificada de la configuración del sistema a los sitios web para que más dispositivos parezcan idénticos, y la posibilidad de bloquear las pestañas privadas con tus datos biométricos/PIN. También te permite separar tu navegación con diferentes perfiles. +**Safari** es el navegador predeterminado en iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. También te permite separar tu navegación con diferentes perfiles. -[:octicons-home-16: Página Principal](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentación} +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Se puede acceder al Informe de privacidad a través del menú Configuración de - [ ] Desactiva **Medición de anuncios para preservar la privacidad** -La medición de los clics en los anuncios ha utilizado tradicionalmente una tecnología de seguimiento que vulnera la intimidad del usuario. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) es una función de WebKit y un estándar web propuesto para permitir a los anunciantes medir la eficacia de las campañas web sin comprometer la privacidad del usuario. +La medición de los clics en los anuncios ha utilizado tradicionalmente una tecnología de seguimiento que vulnera la intimidad del usuario. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. La función tiene pocos problemas de privacidad por sí misma, así que aunque puede optar por dejarla activada, consideramos que el hecho de que se desactive automáticamente en Navegación Privada es un indicador para desactivar la función. @@ -201,9 +201,9 @@ Ten en cuenta que la Navegación Privada no guarda cookies ni datos de sitios we ##### iCloud Sync -La sincronización del historial de Safari, los grupos de pestañas, las pestañas de iCloud y las contraseñas guardadas son E2EE. Sin embargo, por defecto, los marcadores [no](https://support.apple.com/en-us/HT202303) lo son. Apple puede descifrarlos y acceder a ellos de acuerdo con su [política de privacidad](https://www.apple.com/legal/privacy/en-ww/). +La sincronización del historial de Safari, los grupos de pestañas, las pestañas de iCloud y las contraseñas guardadas son E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -Puedes activar E2EE para tus favoritos y tus descargas de Safari activando [Protección de Datos Avanzada](https://support.apple.com/en-us/HT212520). Vaya a su **Nombre de ID de Apple → iCloud → Protección de datos avanzada**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Vaya a su **Nombre de ID de Apple → iCloud → Protección de datos avanzada**. - [x] Activa **Protección de datos avanzada** @@ -225,9 +225,9 @@ AdGuard para iOS tiene algunas funciones premium; sin embargo, el bloqueo de con [:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Código Fuente" }
-Downloads "Descargas" +Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/es/multi-factor-authentication.md b/i18n/es/multi-factor-authentication.md index 3e008b78..bb1e635e 100644 --- a/i18n/es/multi-factor-authentication.md +++ b/i18n/es/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -Las **YubiKeys** están entre las llaves de seguridad más populares. Algunos modelos de YubiKey tienen un gran rango de caracteristicas como: [2ndo Factor Universal (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 WebAuthn](https://es.wikipedia.org/wiki/WebAuthn), [Yubico OTP](https://developers.yubico.com/OTP/), [PIV](https://en.wikipedia.org/wiki/FIPS_201), [OpenPGP](https://developers.yubico.com/PGP/) y autenticación [TOTP and HOTP](https://developers.yubico.com/OATH/). +Las **YubiKeys** están entre las llaves de seguridad más populares. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -Una de las ventajas de la YubiKey es que una llave puede hacer casi todo (YubiKey 5) lo que se podría esperar de una llave de seguridad. Le animamos a que realice el [quiz](https://www.yubico.com/quiz/) antes de comprarla para asegurarse de que su elección es la correcta. +Una de las ventajas de la YubiKey es que una llave puede hacer casi todo (YubiKey 5) lo que se podría esperar de una llave de seguridad. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Página Principal](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentación} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-La [tabla de comparación](https://www.yubico.com/store/compare/) muestra las características y cómo se comparan las YubiKeys. Le recomendamos que seleccione las llaves de las YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. Le recomendamos que seleccione las llaves de las YubiKey 5 Series. -Las YubiKeys se pueden programar utilizando [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) o [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Para gestionar los códigos TOTP, puede utilizar [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). Todos los clientes de Yubico son de código abierto. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). Todos los clientes de Yubico son de código abierto. Para los modelos que soportan HOTP y TOTP, hay 2 ranuras en la interfaz OTP que pueden utilizarse para HOTP y 32 ranuras para almacenar secretos TOTP. Estos secretos se almacenan cifrados en la llave y nunca se exponen a los dispositivos a los que se conectan. Una vez que se ha proporcionado una semilla (secreto compartido) a Yubico Authenticator, éste sólo proporcionará los códigos de seis dígitos, pero nunca la semilla. Este modelo de seguridad ayuda a limitar lo que un atacante puede hacer si compromete uno de los dispositivos que ejecutan Yubico Authenticator y hace que la YubiKey sea resistente a un atacante físico. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. Si desea caract **Nitrokey** tiene una clave de seguridad capaz de [FIDO2 y WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) llamada **Nitrokey FIDO2**. Para obtener compatibilidad con PGP, deberá adquirir una de sus otras llaves, como la **Nitrokey Start**, la **Nitrokey Pro 2** o la **Nitrokey Storage 2**. -[:octicons-home-16: Página Principal](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentación} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-La [tabla de comparación](https://www.nitrokey.com/#comparison) muestra las características y cómo se comparan los modelos de las Nitrokey. La **Nitrokey 3** listada tendrá un conjunto de características combinadas. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. La **Nitrokey 3** listada tendrá un conjunto de características combinadas. -Los modelos de Nitrokey se pueden configurar usando la [aplicación de Nitrokey](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). Para los modelos que admiten HOTP y TOTP, hay 3 ranuras para HOTP y 15 para TOTP. Algunas Nitrokeys pueden actuar como administrador de contraseñas. Pueden almacenar 16 credenciales diferentes y cifrarlas utilizando la misma contraseña que la interfaz OpenPGP. @@ -74,7 +74,7 @@ El restablecimiento de la interfaz OpenPGP en una Nitrokey también hará la bas -La Nitrokey Pro 2, la Nitrokey Storage 2 y la próxima Nitrokey 3 admiten la verificación de la integridad del sistema para portátiles con el firmware [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/). +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. El firmware de Nitrokey es de código abierto, a diferencia del de YubiKey. El firmware de los modelos NitroKey modernos (excepto el de la **NitroKey Pro 2**) se puede actualizar. @@ -127,7 +127,7 @@ Recomendamos encarecidamente que utilice aplicaciones TOTP para móviles en luga Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ Recomendamos encarecidamente que utilice aplicaciones TOTP para móviles en luga [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/es/news-aggregators.md b/i18n/es/news-aggregators.md index f0a4c309..6390b3bc 100644 --- a/i18n/es/news-aggregators.md +++ b/i18n/es/news-aggregators.md @@ -17,11 +17,11 @@ Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una ma **Akregator** es un lector de fuentes de noticias que es parte del proyecto [KDE](https://kde.org). Este incluye una búsqueda rápida, funcionalidades avanzadas de archivado y un navegador interno para facilitar la lectura de las noticias. -[:octicons-home-16: Página Principal](https://apps.kde.org/akregator){ .md-button .md-button--primary } -[:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentación} -[:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://apps.kde.org/akregator){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} +[:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads "Descargas" @@ -81,11 +81,11 @@ Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una ma **Fluent Reader** es un lector de noticias seguro y multiplataforma que cuenta con útiles funciones de privacidad, como la eliminación de cookies al salir, estrictas [políticas de seguridad de contenidos (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) y soporte para proxy, lo que significa que puede utilizarlo a través de [Tor](tor.md). -[:octicons-home-16: Página Principal](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute }
Downloads "Descargas" @@ -121,15 +121,15 @@ Un [lector de noticias](https://en.wikipedia.org/wiki/News_aggregator) es una ma **NetNewsWire** es un lector de fuentes gratuito y de código abierto para macOS e iOS centrado en un diseño y unas funciones nativos. Es compatible con los formatos de fuente típicos, además incluye soporte integrado para fuentes de Reddit. -[:octicons-home-16: Página Principal](https://netnewswire.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit le permite suscribirse a subreddits a través de RSS. Sustituya `[SUBREDDIT]` por el subreddit al que desea suscribirse. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -190,10 +190,10 @@ Puede suscribirse a los canales de YouTube sin iniciar sesión ni asociar la inf

Ejemplo

-Para suscribirse a un canal de YouTube con un cliente RSS, busque primero su [código de canal](https://support.google.com/youtube/answer/6180214). El código del canal se encuentra en la página "Acerca de" del canal de YouTube al que desea suscribirse, en: **Acerca de** > **Compartir** > **Copiar ID de canal**. Sustituya `[[CHANNEL ID]` a continuación: +Para suscribirse a un canal de YouTube con un cliente RSS, busque primero su [código de canal](https://support.google.com/youtube/answer/6180214). El código del canal se encuentra en la página "Acerca de" del canal de YouTube al que desea suscribirse, en: **Acerca de** > **Compartir** > **Copiar ID de canal**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ```
diff --git a/i18n/es/notebooks.md b/i18n/es/notebooks.md index e57c0f23..7ad52fb4 100644 --- a/i18n/es/notebooks.md +++ b/i18n/es/notebooks.md @@ -34,7 +34,7 @@ Si actualmente utilizas una aplicación como Evernote, Google Keep o Microsoft O - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ Si actualmente utilizas una aplicación como Evernote, Google Keep o Microsoft O ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. Ofrece cifrado de extremo a extremo en todas las plataformas con una potente sincronización para tomar tus notas sobre la marcha. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. Ofrece cifrado de extremo a extremo en todas las plataformas con una potente sincronización para tomar tus notas sobre la marcha. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ Si actualmente utilizas una aplicación como Evernote, Google Keep o Microsoft O Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook solo permite el cifrado local de notas con la función [private vault] **Joplin** es una aplicación gratuita, de código abierto y con todas las funciones para tomar notas y hacer tareas, que puede manejar un gran número de notas markdown organizadas en cuadernos y etiquetas. Ofrece encriptación de extremo a extremo y puede sincronizar a través de Nextcloud, Dropbox y más. También ofrece una fácil importación desde Evernote y notas en texto plano. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee ofrece 100MB de almacenamiento gratuito, con opciones de pago si necesit ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** es un [modo principal](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) para GNU Emacs. Org-mode sirve para tomar notas, mantener listas de tareas pendientes, planificar proyectos y crear documentos con un sistema de texto plano rápido y eficaz. La sincronización es posible con las herramientas [sincronización de archivos](file-sharing.md#file-sync). +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode sirve para tomar notas, mantener listas de tareas pendientes, planificar proyectos y crear documentos con un sistema de texto plano rápido y eficaz. La sincronización es posible con las herramientas [sincronización de archivos](file-sharing.md#file-sync). [:octicons-home-16: Página Principal](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentación} diff --git a/i18n/es/os/android-overview.md b/i18n/es/os/android-overview.md index ad9b445b..05eb7447 100644 --- a/i18n/es/os/android-overview.md +++ b/i18n/es/os/android-overview.md @@ -60,7 +60,7 @@ Muchos OEMs también han roto la implementación del Arranque Verificado que tie Las actualizaciones de firmware son fundamentales para mantener la seguridad y, sin ellas, tu dispositivo no puede ser seguro. Los fabricantes de equipos originales tienen acuerdos de asistencia con sus socios para proporcionar los componentes de código cerrado durante un periodo de asistencia limitado. Estos se detallan en los [boletines de seguridad mensuales de Android](https://source.android.com/security/bulletin). -Dado que los componentes del teléfono, como el procesador y las tecnologías de radio, dependen de componentes de código cerrado, las actualizaciones deben ser proporcionadas por los respectivos fabricantes. Por lo tanto, es importante que compres un dispositivo dentro de un ciclo de soporte activo. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) y [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) dan soporte a sus dispositivos por un período de 4 años, mientras que los productos más baratos suelen tener un ciclo de soporte más corto. Con la introducción del [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google ahora hace su propio SoC y van a ofrecer un mínimo de 5 años de soporte. Con la introducción de la serie Pixel 8, Google aumentó esa ventana de soporte a 7 años. +Dado que los componentes del teléfono, como el procesador y las tecnologías de radio, dependen de componentes de código cerrado, las actualizaciones deben ser proporcionadas por los respectivos fabricantes. Por lo tanto, es importante que compres un dispositivo dentro de un ciclo de soporte activo. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. Con la introducción del [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google ahora hace su propio SoC y van a ofrecer un mínimo de 5 años de soporte. Con la introducción de la serie Pixel 8, Google aumentó esa ventana de soporte a 7 años. Los dispositivos EOL que ya no son compatibles con el fabricante del SoC no pueden recibir actualizaciones de firmware de los proveedores OEM o de los distribuidores Android posteriores al mercado. Esto significa que los problemas de seguridad con esos dispositivos permanecerán sin solucionar. @@ -97,19 +97,19 @@ Android 13: Una aplicación puede solicitar un permiso para una función específica que tenga. Por ejemplo, cualquier aplicación que pueda escanear códigos QR necesitará el permiso de la cámara. Algunas aplicaciones pueden solicitar más permisos de los necesarios. -[Exodus](https://exodus-privacy.eu.org/) puede ser útil para comparar aplicaciones con fines similares. Si una aplicación requiere muchos permisos y tiene un montón de publicidad y analíticas, probablemente sea un mal signo. Recomendamos consultar cada uno de los rastreadores y leer sus descripciones, en lugar de limitarse a **contar el total** y asumir que todos los elementos enumerados son iguales. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. Si una aplicación requiere muchos permisos y tiene un montón de publicidad y analíticas, probablemente sea un mal signo. Recomendamos consultar cada uno de los rastreadores y leer sus descripciones, en lugar de limitarse a **contar el total** y asumir que todos los elementos enumerados son iguales.

Advertencia

-Si una aplicación es principalmente un servicio basado en web, el seguimiento puede producirse en el lado del servidor. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) indica que "no hay rastreadores", pero lo cierto es que sí rastrea los intereses y el comportamiento de los usuarios en todo el sitio. Las aplicaciones pueden eludir la detección si no utilizan las bibliotecas de código estándar producidas por la industria publicitaria, aunque esto es poco probable. +Si una aplicación es principalmente un servicio basado en web, el seguimiento puede producirse en el lado del servidor. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Las aplicaciones pueden eludir la detección si no utilizan las bibliotecas de código estándar producidas por la industria publicitaria, aunque esto es poco probable.

Nota

-Las aplicaciones que respetan la privacidad, como [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/), pueden mostrar algunos rastreadores como [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). Esta biblioteca incluye [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) que puede proporcionar [notificaciones push](https://es.wikipedia.org/wiki/Tecnología_push) en las aplicaciones. Este [es el caso](https://fosstodon.org/@bitwarden/109636825700482007) con Bitwarden. Esto no significa que Bitwarden utilice todas las funciones analíticas que ofrece Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). Esta biblioteca incluye [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) que puede proporcionar [notificaciones push](https://es.wikipedia.org/wiki/Tecnología_push) en las aplicaciones. Este [es el caso](https://fosstodon.org/@bitwarden/109636825700482007) con Bitwarden. Esto no significa que Bitwarden utilice todas las funciones analíticas que ofrece Google Firebase Analytics.
@@ -145,20 +145,20 @@ Si está utilizando un dispositivo con servicios de Google, ya sea su sistema op ### Programa de Protección Avanzada -Si tienes una cuenta de Google sugerimos que te inscribas en el [Programa de protección avanzada](https://landing.google.com/advancedprotection/). Está disponible sin costo a cualquiera que tenga dos o más llaves de seguridad de hardware con soporte para [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online). +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). Está disponible sin costo a cualquiera que tenga dos o más llaves de seguridad de hardware con soporte para [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online). El Programa de protección avanzada proporciona una supervisión de amenazas mejorada y permite: - Autenticación de dos factores más estricta; por ejemplo, [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **debe** utilizarse y se prohíbe el uso de [OTP por SMS](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) y [OAuth](https://en.wikipedia.org/wiki/OAuth) - Solo las aplicaciones de Google y de terceros verificadas pueden acceder a los datos de la cuenta - Escaneo de correos electrónicos inminentes en las cuentas de Gmail contra los intentos de [phishing](https://es.wikipedia.org/wiki/Phishing#T%C3%A9cnicas_de_phishing) -- Más estricto [escaneo seguro del navegador](https://www.google.com/chrome/privacy/whitepaper.html#malware) con Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Proceso de recuperación más estricto para cuentas con credenciales perdidas - Si no usas los servicios de Google Play aislados (común en los sistemas operativos por defecto), el programa de protección avanzada también viene con [beneficios adicionales](https://support.google.com/accounts/answer/9764949?hl=en) como: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - No permitir la instalación de aplicaciones fuera de Google Play Store, la tienda de aplicaciones del proveedor del sistema operativo o a través de [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Escaneo automático obligatorio con [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Advertencia sobre aplicaciones no verificadas ### Actualizaciones del sistema de Google Play @@ -169,7 +169,7 @@ Si tienes un dispositivo EOL (end-of-life) incluido con Android 10 o superior y ### ID de publicidad -Todos los dispositivos con los servicios de Google Play instalados automáticamente generan un [ID de publicidad](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) usado para la publicidad dirigida. Deshabilite esta función para limitar los datos recopilados sobre usted. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Deshabilite esta función para limitar los datos recopilados sobre usted. En las distribuciones de Android con los [servicios de Google Play aislados](https://grapheneos.org/usage#sandboxed-google-play), ve a :gear: **Ajustes** → **Aplicaciones** → **Google Play aislado** → **Ajustes de Google** → **Anuncios**, y selecciona *Eliminar el ID de publicidad*. diff --git a/i18n/es/os/ios-overview.md b/i18n/es/os/ios-overview.md index 781580dd..5ebb9831 100644 --- a/i18n/es/os/ios-overview.md +++ b/i18n/es/os/ios-overview.md @@ -22,7 +22,7 @@ La única fuente de aplicaciones en iOS es la App Store de Apple, que requiere u ### Telemetría Invasiva -Apple ha tenido históricamente problemas para anonimizar correctamente su telemetría en iOS. [En 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), se descubrió que Apple transmitía grabaciones de Siri -algunas con información altamente confidencial- a sus servidores para que terceros contratistas las revisaran manualmente. Aunque detuvieron temporalmente ese programa después de que se [informara ampliamente](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana) de esa práctica, el problema no se resolvió por completo [hasta 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple ha tenido históricamente problemas para anonimizar correctamente su telemetría en iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). Recientemente, se ha descubierto que Apple [transmite datos analíticos incluso cuando el envío de datos analíticos se encuentra desactivado](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) en iOS, y esta información [parece](https://twitter.com/mysk_co/status/1594515229915979776) estar fácilmente vinculados a identificadores de cuenta únicos de iCloud, a pesar de ser supuestamente anónimos. @@ -54,7 +54,7 @@ En la parte superior de la aplicación **Ajustes**, verás tu nombre y tu foto d #### Buscar -**Buscar** es un servicio que te permite rastrear tus dispositivos Apple y compartir tu ubicación con tus amigos y familiares. También te permite borrar el dispositivo a distancia en caso de robo, evitando que un ladrón acceda a tus datos. En Buscar, tus [datos de localización son E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) cuando: +**Buscar** es un servicio que te permite rastrear tus dispositivos Apple y compartir tu ubicación con tus amigos y familiares. También te permite borrar el dispositivo a distancia en caso de robo, evitando que un ladrón acceda a tus datos. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Tu localización se comparte con un familiar o amigo, y ambos utilizáis iOS 15 o superior. - Tu dispositivo está desconectado y es localizado por la red Buscar. @@ -117,7 +117,7 @@ Si no quieres que nadie pueda controlar tu teléfono con Siri cuando está bloqu Establecer una contraseña segura en tu teléfono es el paso más importante que puedes dar para la seguridad física del dispositivo. Tendrás que elegir entre seguridad y comodidad: Una contraseña más larga será molesta de escribir cada vez, pero una contraseña más corta o un PIN serán más fáciles de adivinar. Configurar Face ID o Touch ID junto con una contraseña segura puede ser un buen compromiso entre usabilidad y seguridad. -Selecciona **Activar Código** o **Cambiar Código** > **Opciones de Código** > **Código Alfanumérico Personalizado**. Asegúrate de crear una [contraseña segura](https://www.privacyguides.org/basics/passwords-overview/). +Selecciona **Activar Código** o **Cambiar Código** > **Opciones de Código** > **Código Alfanumérico Personalizado**. Make sure that you create a [secure password](../basics/passwords-overview.md). Si deseas utilizar Face ID o Touch ID, puedes seguir adelante y configurarlo ahora. Tu teléfono utilizará la contraseña que configuraste anteriormente como alternativa en caso de que falle la verificación biométrica. Los métodos de desbloqueo biométrico son ante todo una ventaja, aunque impiden que las cámaras de vigilancia o las personas por encima de su hombro te vean introducir el código. @@ -129,7 +129,7 @@ En algunos dispositivos antiguos, puede que tengas que pulsar el botón de encen - [x] Selecciona **Activar Protección** -Después de activar la protección de datos robados, [ciertas acciones](https://support.apple.com/en-us/HT212510) requerirán autenticación biométrica sin una contraseña de respaldo (en el caso de que un shoulder surfer haya obtenido tu PIN), tales como el uso de autorrelleno de contraseña, el acceso a la información de pago, y la desactivación del modo perdido. También añade un retardo de seguridad a ciertas acciones realizadas fuera de casa o de otro "lugar familiar", como el requerimiento de un temporizador de 1 hora para restablecer la contraseña de tu ID de Apple o cerrar sesión en tu ID de Apple. Este retraso pretende darte tiempo para activar el Modo Perdido y asegurar tu cuenta antes de que un ladrón pueda reiniciar tu dispositivo. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. También añade un retardo de seguridad a ciertas acciones realizadas fuera de casa o de otro "lugar familiar", como el requerimiento de un temporizador de 1 hora para restablecer la contraseña de tu ID de Apple o cerrar sesión en tu ID de Apple. Este retraso pretende darte tiempo para activar el Modo Perdido y asegurar tu cuenta antes de que un ladrón pueda reiniciar tu dispositivo. **Permitir Acceso al Estar Bloqueado** te da opciones para lo que puedes permitir cuando tu teléfono está bloqueado. Cuantas más de estas opciones deshabilites, menos podrá hacer alguien sin tu contraseña, pero menos cómodo será para ti. Elige a cuáles de ellos no quieres que alguien tenga acceso si llega a poner sus manos en tu teléfono. @@ -187,7 +187,7 @@ Desactiva **Anuncios Personalizados** si no quieres anuncios personalizados. Sel - [x] Selecciona **Activar el Informe de Privacidad de las Apps** -[Modo de Aislamiento](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) es un ajuste de seguridad que puedes activar para que tu teléfono sea más resistente a los ataques. Ten en cuenta que algunas aplicaciones y funciones [no funcionarán](https://support.apple.com/en-us/HT212650) como lo hacen normalmente. +[Modo de Aislamiento](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) es un ajuste de seguridad que puedes activar para que tu teléfono sea más resistente a los ataques. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Selecciona **Activar el Modo de Aislamiento** diff --git a/i18n/es/os/linux-overview.md b/i18n/es/os/linux-overview.md index 46b7bdca..8d16470f 100644 --- a/i18n/es/os/linux-overview.md +++ b/i18n/es/os/linux-overview.md @@ -15,12 +15,12 @@ En general, nuestro sitio web utiliza el término "Linux" para describir las dis Linux plantea algunos problemas de privacidad importantes que debes tener en cuenta. A pesar de estos inconvenientes, las distribuciones Linux de escritorio siguen siendo estupendas para la mayoría de la gente que desea: - Evitar la telemetría que, regularmente, viene con los sistemas operativos propietarios -- Mantener la ['libertad del software'](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Utilizar sistemas centrados en la privacidad como [Whonix](https://www.whonix.org) o [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Seguridad de Código Abierto -Es un [error común](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) pensar que Linux y otros programas de código abierto son intrínsecamente seguros simplemente porque el código fuente está disponible. Se espera que la verificación comunitaria se realice con regularidad, pero este no siempre es [el caso](https://seirdy.one/posts/2022/02/02/floss-security/). +Es un [error común](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) pensar que Linux y otros programas de código abierto son intrínsecamente seguros simplemente porque el código fuente está disponible. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). En realidad, la seguridad de las distribuciones depende de varios factores, como la actividad del proyecto, la experiencia de los desarrolladores, el nivel de rigor aplicado a las revisiones del código y la frecuencia con la que se presta atención a partes concretas del código base, que pueden permanecer intactas durante años. @@ -30,9 +30,9 @@ Por el momento, Linux de escritorio [está por detrás de alternativas](https:// - El **arranque verificado ** en Linux no es tan robusto como alternativas como el [Arranque Seguro](https://support.apple.com/guide/security/secac71d5623/web) de Apple o el [Arranque Verificado](https://source.android.com/security/verifiedboot) de Android. El arranque verificado evita la manipulación persistente por parte de malware y [los ataques evil maid](https://en.wikipedia.org/wiki/Evil_Maid_attack), pero sigue [sin estar disponible en gran medida incluso en las distribuciones más avanzadas](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Un aislamiento fuerte** para aplicaciones en Linux que es muy deficiente, incluso con aplicaciones en contenedores como Flatpaks o soluciones de aislamiento como Firejail. Flatpak es la utilidad de aislamiento más prometedora para Linux hasta el momento, pero sigue siendo deficiente en muchas áreas y permite [valores predeterminados inseguros](https://flatkill.org/2020/) que permiten a la mayoría de las aplicaciones eludir trivialmente su aislamineto. +- **Un aislamiento fuerte** para aplicaciones en Linux que es muy deficiente, incluso con aplicaciones en contenedores como Flatpaks o soluciones de aislamiento como Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Además, Linux se queda atrás en la implementación de [mitigaciones de exploits](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) que ahora son estándar en otros sistemas operativos, como Protección de Código Arbitrario en Windows o Tiempo de Ejecución Reforzado en macOS. Además, la mayoría de los programas Linux y el propio Linux están codificados en lenguajes poco seguros para la memoria. Los fallos de corrupción de memoria son responsables de la [mayoría de las vulnerabilidades](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) corregidas y a las que se asigna un CVE. Aunque esto también es cierto para Windows y macOS, estos están avanzando rápidamente en la adopción de lenguajes seguros para la memoria -como Rust y Swift, respectivamente-, mientras que no existe un esfuerzo similar para reescribir Linux en un lenguaje seguro para la memoria como Rust. +Además, Linux se queda atrás en la implementación de [mitigaciones de exploits](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) que ahora son estándar en otros sistemas operativos, como Protección de Código Arbitrario en Windows o Tiempo de Ejecución Reforzado en macOS. Además, la mayoría de los programas Linux y el propio Linux están codificados en lenguajes poco seguros para la memoria. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. Aunque esto también es cierto para Windows y macOS, estos están avanzando rápidamente en la adopción de lenguajes seguros para la memoria -como Rust y Swift, respectivamente-, mientras que no existe un esfuerzo similar para reescribir Linux en un lenguaje seguro para la memoria como Rust. ## Elegir tu distribución @@ -42,9 +42,9 @@ No todas las distribuciones Linux son iguales. Nuestra [página de recomendacion Recomendamos encarecidamente que elijas distribuciones que permanezcan cerca de los lanzamientos estables del software de origen, comúnmente denominadas como distribuciones de lanzamiento continuo. Esto se debe a que las distribuciones de lanzamiento de ciclo congelado, normalmente no actualizan las versiones de sus paquetes y se encuentran detrás en actualizaciones de seguridad. -Para las distribuciones congeladas como [Debian](https://www.debian.org/security/faq#handling), se espera que los encargados de mantener los paquetes adapten los parches para corregir vulnerabilidades, en lugar de actualizar el software a la "siguiente versión" lanzada por el desarrollador original. Algunas correcciones de seguridad [no](https://arxiv.org/abs/2105.14565) reciben un [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (en particular el software menos popular) y por lo tanto no llegan a la distribución con este modelo de parches. Como resultado, las correcciones de seguridad menores a veces se retrasan hasta el siguiente lanzamiento importante. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Algunas correcciones de seguridad [no](https://arxiv.org/abs/2105.14565) reciben un [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (en particular el software menos popular) y por lo tanto no llegan a la distribución con este modelo de parches. Como resultado, las correcciones de seguridad menores a veces se retrasan hasta el siguiente lanzamiento importante. -No creemos que retener paquetes y aplicar parches provisionales sea una buena idea, ya que se aparta de la forma en que el desarrollador podría haber previsto que funcionara el software. [Richard Brown](https://rootco.de/aboutme/) tiene una presentación sobre esto: +No creemos que retener paquetes y aplicar parches provisionales sea una buena idea, ya que se aparta de la forma en que el desarrollador podría haber previsto que funcionara el software. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch y las distribuciones basadas en Arch no son recomendables para quienes se i Para un sistema seguro, también se espera que tengas suficientes conocimientos de Linux para configurar correctamente la seguridad del sistema, como la adopción de un sistema [de control de acceso obligatorio](https://en.wikipedia.org/wiki/Mandatory_access_control), la configuración de [módulos del kernel](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security), listas negras, el endurecimiento de los parámetros de arranque, la manipulación de parámetros [sysctl](https://en.wikipedia.org/wiki/Sysctl), y saber qué componentes necesitan, como [Polkit](https://en.wikipedia.org/wiki/Polkit). -Cualquiera que utilice el [Repositorio de Usuario de Arch (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **debe** sentirse cómodo auditando los PKGBUILDs que descargue de ese servicio. Los paquetes AUR son contenidos producidos por la comunidad y no se examinan de ninguna manera, por lo que son vulnerables a los ataques a la cadena de suministro de software, como de hecho ha sucedido en [en el pasado](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Cualquiera que utilice el [Repositorio de Usuario de Arch (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **debe** sentirse cómodo auditando los PKGBUILDs que descargue de ese servicio. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). El AUR debe utilizarse siempre con moderación, y a menudo hay muchos malos consejos en diversas páginas que dirigen a la gente a utilizar ciegamente [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) sin suficiente advertencia. Se aplican advertencias similares al uso de Archivos de Paquetes Personales (PPA) de terceros en distribuciones basadas en Debian o Proyectos Comunitarios (COPR) en Fedora. @@ -83,11 +83,11 @@ Si tienes experiencia con Linux y deseas utilizar una distribución basada en Ar Además, estamos en **contra** de usar estos dos derivados de Arch específicamente: - **Manjaro**: Esta distribución retiene los paquetes durante 2 semanas para asegurarse de que sus propios cambios no se rompan, no para asegurarse de que el flujo ascendente sea estable. Cuando se utilizan paquetes AUR, suelen compilarse con las últimas [bibliotecas](https://en.wikipedia.org/wiki/Library_(computing)) de los repositorios de Arch. -- **Garuda**: Utilizan [Chaotic-AUR](https://aur.chaotic.cx/) que compila automáticamente y a ciegas paquetes del AUR. No existe ningún proceso de verificación que garantice que los paquetes AUR no sufran ataques en la cadena de suministro. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. No existe ningún proceso de verificación que garantice que los paquetes AUR no sufran ataques en la cadena de suministro. ### Núcleo Linux-libre y distribuciones "Libre" -Recomendamos encarecidamente **no ** utilizar el núcleo Linux-libre, ya que [elimina las mitigaciones de seguridad](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) y [suprime las advertencias del núcleo](https://news.ycombinator.com/item?id=29674846) sobre microcódigo vulnerable. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## Recomendaciones Generales @@ -95,7 +95,7 @@ Recomendamos encarecidamente **no ** utilizar el núcleo Linux-libre, ya que [el La mayoría de las distribuciones de Linux tienen una opción dentro de su instalador para habilitar [LUKS](../encryption.md#linux-unified-key-setup) FDE. Si esta opción no se configura en el momento de la instalación, tendrás que hacer una copia de seguridad de tus datos y volver a instalarla, ya que el cifrado se aplica después de [particionar el disco](https://en.wikipedia.org/wiki/Disk_partitioning), pero antes de formatear [el sistema de archivos](https://en.wikipedia.org/wiki/File_system). También te sugerimos que borres de forma segura tu dispositivo de almacenamiento: -- [Borrado Seguro de Datos :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Borrado Seguro de Datos :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ Si necesitas la función de suspensión en disco (hibernación), tendrás que ut ### Wayland -Recomendamos utilizar un entorno de escritorio compatible con el protocolo de visualización [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)), ya que se ha desarrollado teniendo [en cuenta](https://lwn.net/Articles/589147/) la seguridad. Su predecesor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) no soporta el aislamiento GUI, lo que permite a cualquier ventana [grabar, registrar e inyectar entradas en otras ventanas](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), haciendo inútil cualquier intento de aislamiento. Aunque hay opciones para hacer X11 anidado como [Xpra](https://en.wikipedia.org/wiki/Xpra) o [Xephyr](https://en.wikipedia.org/wiki/Xephyr), a menudo vienen con consecuencias negativas en el rendimiento, y no son ni convenientes de configurar ni preferibles sobre Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Su predecesor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) no soporta el aislamiento GUI, lo que permite a cualquier ventana [grabar, registrar e inyectar entradas en otras ventanas](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), haciendo inútil cualquier intento de aislamiento. Aunque hay opciones para hacer X11 anidado como [Xpra](https://en.wikipedia.org/wiki/Xpra) o [Xephyr](https://en.wikipedia.org/wiki/Xephyr), a menudo vienen con consecuencias negativas en el rendimiento, y no son ni convenientes de configurar ni preferibles sobre Wayland. -Afortunadamente, los [compositores wayland](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) como los incluidos con [GNOME](https://www.gnome.org) y [KDE Plasma](https://kde.org) ahora tienen un buen soporte para Wayland junto con algunos otros compositores que usan [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (por ejemplo [Sway](https://swaywm.org)). Algunas distribuciones como Fedora y Tumbleweed lo utilizan por defecto, y es posible que otras lo hagan en el futuro, ya que X11 está en [modo de mantenimiento duro](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). Si estás utilizando uno de esos entornos es tan fácil como seleccionar la sesión "Wayland" en el gestor de pantalla del escritorio ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). Si estás utilizando uno de esos entornos es tan fácil como seleccionar la sesión "Wayland" en el gestor de pantalla del escritorio ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). Estamos **en contra** de usar entornos de escritorio o gestores de ventanas que no tengan soporte para Wayland, como Cinnamon (por defecto en Linux Mint), Pantheon (por defecto en Elementary OS), MATE, Xfce e i3. ### Firmware de Propietario (Actualizaciones de Microcódigo) -Algunas distribuciones de Linux (como las basadas en [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)o las DIY) no incluyen las actualizaciones de [microcódigo](https://en.wikipedia.org/wiki/Microcode) de propietario que parchean vulnerabilidades de seguridad críticas. Algunos ejemplos notables de estas vulnerabilidades incluyen [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), y otras [vulnerabilidades de hardware](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Algunas distribuciones de Linux (como las basadas en [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)o las DIY) no incluyen las actualizaciones de [microcódigo](https://en.wikipedia.org/wiki/Microcode) de propietario que parchean vulnerabilidades de seguridad críticas. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). Nosotros **recomendamos encarecidamente** que instales las actualizaciones de microcódigo, ya que contienen importantes parches de seguridad para la CPU que no pueden mitigarse totalmente sólo con software. Tanto Fedora como openSUSE tienen las actualizaciones de microcódigo aplicadas por defecto. @@ -131,11 +131,11 @@ Además, algunas distribuciones no descargan automáticamente las actualizacione Muchas distribuciones Linux de escritorio (Fedora, openSUSE, etc.) vienen con [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) para configurar los ajustes de Ethernet y Wi-Fi. -Es posible [aleatorizar](https://fedoramagazine.org/randomize-mac-address-nm/) la [dirección MAC](https://en.wikipedia.org/wiki/MAC_address) cuando se utiliza NetworkManager. Esto proporciona un poco más de privacidad en las redes Wi-Fi, ya que hace más difícil rastrear dispositivos específicos en la red a la que estás conectado. [**No**](https://papers.mathyvanhoef.com/wisec2016.pdf) te hace anónimo. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. Esto proporciona un poco más de privacidad en las redes Wi-Fi, ya que hace más difícil rastrear dispositivos específicos en la red a la que estás conectado. [**No**](https://papers.mathyvanhoef.com/wisec2016.pdf) te hace anónimo. -Recomendamos cambiar la configuración a **aleatoria** en lugar de **estable**, como se sugiere en el [artículo](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -Si estás utilizando [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), necesitarás configurar [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) que habilitará [RFC 7844 (Perfiles de anonimato para clientes DHCP)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). La aleatorización de direcciones MAC es beneficiosa sobre todo para las conexiones Wi-Fi. En el caso de las conexiones Ethernet, aleatorizar la dirección MAC aporta pocas ventajas (si es que aporta alguna), ya que un administrador de red puede identificar trivialmente tu dispositivo por otros medios (como inspeccionar el puerto al que está conectado en el conmutador de red). La aleatorización de las direcciones MAC Wi-Fi depende del soporte del firmware de la Wi-Fi. @@ -151,6 +151,6 @@ Hay otros identificadores del sistema con los que conviene tener cuidado. Deber El Proyecto Fedora [cuenta](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) cuántos sistemas únicos acceden a sus réplicas utilizando una variable [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) en lugar de un ID único. Fedora hace esto para determinar la carga y aprovisionar mejores servidores para las actualizaciones cuando sea necesario. -Esta [opción](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) está actualmente desactivada por defecto. Recomendamos añadir `countme=false` en `/etc/dnf/dnf.conf` por si se habilita en el futuro. En sistemas que utilizan `rpm-ostree` como Silverblue, la opción countme se desactiva enmascarando el temporizador [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/). +Esta [opción](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) está actualmente desactivada por defecto. Recomendamos añadir `countme=false` en `/etc/dnf/dnf.conf` por si se habilita en el futuro. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE también utiliza un [ID único](https://en.opensuse.org/openSUSE:Statistics) para contar los sistemas, que puede desactivarse borrando el archivo `/var/lib/zypp/AnonymousUniqueId`. diff --git a/i18n/es/os/macos-overview.md b/i18n/es/os/macos-overview.md index c372a7ca..0da7e843 100644 --- a/i18n/es/os/macos-overview.md +++ b/i18n/es/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** es un sistema operativo Unix desarrollado por Apple para sus ordenadores Mac. Para mejorar la privacidad en macOS, puedes desactivar las funciones de telemetría y reforzar los ajustes de privacidad y seguridad existentes. -Los Mac basados en Intel más antiguos y los Hackintosh no son compatibles con todas las funciones de seguridad que ofrece macOS. Para mejorar la seguridad de los datos, recomendamos utilizar un Mac más reciente con [Apple Silicon](https://support.apple.com/en-us/HT211814). +Los Mac basados en Intel más antiguos y los Hackintosh no son compatibles con todas las funciones de seguridad que ofrece macOS. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Notas de Privacidad @@ -22,13 +22,13 @@ macOS realiza comprobaciones en línea al abrir una aplicación para verificar s Anteriormente, estas comprobaciones se realizaban a través de un protocolo OCSP no cifrado que podía filtrar información sobre las aplicaciones que ejecutaba en tu red. Apple actualizó su servicio OCSP para utilizar el cifrado HTTPS en 2021, y [publicó información](https://support.apple.com/HT202491) sobre su política de registro para este servicio. Además, prometieron añadir un mecanismo para que las personas pudieran optar por no participar en esta comprobación en línea, pero esto no se ha añadido a macOS todavía (julio de 2023). -Aunque [puedes](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) excluirte manualmente de esta comprobación con relativa facilidad, recomendamos no hacerlo a menos que las comprobaciones de revocación realizadas por macOS te pongan en grave peligro, ya que desempeñan un papel importante a la hora de garantizar que se bloquea la ejecución de aplicaciones comprometidas. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Configuración Recomendada Tu cuenta cuando configures por primera vez tu Mac será una cuenta de Administrador, que tiene mayores privilegios que una cuenta de usuario Estándar. macOS cuenta con una serie de protecciones que evitan que el malware y otros programas abusen de tus privilegios de Administrador, por lo que generalmente es seguro utilizar esta cuenta. -Sin embargo, en utilidades de protección como `sudo`, [en el pasado](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/), se han descubierto exploits. Si quieres evitar la posibilidad de que los programas que ejecutas abusen de tus privilegios de Administrador, puedes plantearte crear una segunda cuenta de usuario Estándar que utilices para las operaciones diarias. Esto tiene la ventaja añadida de hacer más obvio cuándo una aplicación necesita acceso de administrador, porque te pedirá las credenciales cada vez. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). Si quieres evitar la posibilidad de que los programas que ejecutas abusen de tus privilegios de Administrador, puedes plantearte crear una segunda cuenta de usuario Estándar que utilices para las operaciones diarias. Esto tiene la ventaja añadida de hacer más obvio cuándo una aplicación necesita acceso de administrador, porque te pedirá las credenciales cada vez. Si utilizas una segunda cuenta, no es estrictamente necesario que inicies sesión en tu cuenta de Administrador original desde la pantalla de inicio de sesión de macOS. Cuando estés haciendo algo como usuario Estándar que requiera permisos de Administrador, el sistema debería pedirte autenticación, donde puedes introducir tus credenciales de Administrador como usuario Estándar una sola vez. Apple proporciona [orientación](https://support.apple.com/HT203998) sobre cómo ocultar tu cuenta de Administrador si prefieres ver sólo una cuenta en tu pantalla de inicio de sesión. @@ -128,7 +128,7 @@ En los ordenadores Mac basados en Intel más antiguos, FileVault es la única fo ##### Modo hermético -El [modo hermético](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) desactiva algunas características para mejorar la seguridad. Algunas aplicaciones o características funcionan diferente, a comparación de cuando se encuentra desactivado. Por ejemplo, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) y [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) son desactivados en Safari con el modo hermético activado. Recomendamos activar el modo hermético y comprobar si este afecta significativamente su uso, porque muchos de los cambios que este hace son fáciles de manejar. +El [modo hermético](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) desactiva algunas características para mejorar la seguridad. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. Recomendamos activar el modo hermético y comprobar si este afecta significativamente su uso, porque muchos de los cambios que este hace son fáciles de manejar. - [x] Seleccione **Encender** diff --git a/i18n/es/os/qubes-overview.md b/i18n/es/os/qubes-overview.md index b5f0cd83..9fa79f7e 100644 --- a/i18n/es/os/qubes-overview.md +++ b/i18n/es/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes es un sistema operativo basado en el aislamiento de aplicaciones en *qubes* (formalmente, máquinas virtuales) para una mayor seguridad. --- -[**Qubes OS**](../desktop.md#qubes-os) es un sistema operativo de código abierto, que utiliza el hipervisor [Xen](https://en.wikipedia.org/wiki/Xen) para proporcionar una fuerte seguridad en la computación de escritororio, a través de *qubes* aislados (que son máquinas virtuales). Puedes asignarle a cada *qube* un nivel de confianza basado en su propósito. Qubes OS proporciona seguridad al utilizar el aislamiento. Este solo permite acciones en función de cada caso y, por lo tanto, es lo contrario de la [enumaración de la maldad](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) es un sistema operativo de código abierto, que utiliza el hipervisor [Xen](https://en.wikipedia.org/wiki/Xen) para proporcionar una fuerte seguridad en la computación de escritororio, a través de *qubes* aislados (que son máquinas virtuales). Puedes asignarle a cada *qube* un nivel de confianza basado en su propósito. Qubes OS proporciona seguridad al utilizar el aislamiento. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## ¿Cómo funciona Qubes OS? -Qubes utiliza la [compartimentación](https://www.qubes-os.org/intro/) para mantener el sistema seguro. Qubes son creados de plantillas, las predeterminadas siendo para Fedora, Debian y [Whonix](../desktop.md#whonix). Qubes OS también permite crear *qubes* [desechables](https://www.qubes-os.org/doc/how-to-use-disposables/) de un solo uso. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes son creados de plantillas, las predeterminadas siendo para Fedora, Debian y [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Parte de la información que se encuentra aquí y en la documentación de Qubes ![Arquitectura Qubes](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Arquitectura, Crédito: Qué es Qubes OS Introducción
-Cada qube tiene un [borde coloreado](https://www.qubes-os.org/screenshots/) que puede ayudar a seguir el rastro del dominio en que se ejecuta. Podrías, por ejemplo, usar un color específico para tu navegador bancario, mientras usas un color diferente para un navegador general no confiado. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. Podrías, por ejemplo, usar un color específico para tu navegador bancario, mientras usas un color diferente para un navegador general no confiado. ![Borde coloreado](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Bordes de ventana de Qubes, Crédito: Capturas de pantalla de Qubes
@@ -33,7 +33,7 @@ Qubes OS utiliza una Xen VM [dom0](https://wiki.xenproject.org/wiki/Dom0) para c ### Copiando y pegando texto -Puedes [copiar y pegar texto](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) utilizando `qvm-copy-to-vm` o las siguientes instrucciones: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Presiona **Ctrl+C** para decirle al *qube* que quieres copias algo. 2. Presiona **Ctrl+Shift+C** para decirle al *qube* que ponga este buffer a disposición del portapapeles global. @@ -47,13 +47,13 @@ Para copiar y pegar archivos y directorios (carpetas) entre un *qube* y otro, pu
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. Al hacerlo, los cambios no son inmediatos y pueden deshacerse fácilmente en caso de accidente. When you run a *qube*, it does not have a persistent filesystem. Puedes crear y eliminar archivos, pero los cambios son efímeros. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. Al hacerlo, los cambios no son inmediatos y pueden deshacerse fácilmente en caso de accidente. When you run a *qube*, it does not have a persistent filesystem. Puedes crear y eliminar archivos, pero los cambios son efímeros.
### Interacciones inter-VM -El [framework qrexec](https://www.qubes-os.org/doc/qrexec/) es una parte central de Qubes que permite la comunicación entre dominios. Está construido sobre la librería Xen *vchan*, que facilita el [aislamiento a través de políticas](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Conectarse a Tor a través de una VPN @@ -73,9 +73,9 @@ Tus qubes deberían estar configurados de forma similar a esta: ## Recursos Adicionales -Para obtener información adicional, te animamos a consultar las extensas páginas de documentación de Qubes OS que se encuentran en el [sitio web Qubes OS](https://www.qubes-os.org/doc/). Copias offline se pueden descargar desde el [repositorio de documentación ](https://github.com/QubesOS/qubes-doc)de Qubes OS. +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Copias offline se pueden descargar desde el [repositorio de documentación ](https://github.com/QubesOS/qubes-doc)de Qubes OS. -- [Probablemente, el sistema operativo más seguro del mundo](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Compartimentación del software vs. separación física](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Particionando mi vida digital en dominios seguros](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Artículos relacionados](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/es/passwords.md b/i18n/es/passwords.md index 88efe1f1..6b4e2c61 100644 --- a/i18n/es/passwords.md +++ b/i18n/es/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Administrador de contraseñas operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Administrador de contraseñas operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Administrador de contraseñas operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Administrador de contraseñas operatingSystem: - Windows @@ -127,7 +127,7 @@ Manténgase seguro y protegido en línea con un gestor de contraseñas cifrado y Los administradores de contraseñas integrados en programas como navegadores y sistemas operativos a veces no son tan buenos como los programas de administración de contraseñas específicos. La ventaja de un administrador de contraseñas incorporado es una buena integración con el software, pero a menudo puede ser muy simple y carecer de características de privacidad y seguridad que las ofertas independientes tienen. -Por ejemplo, el administrador de contraseñas de Microsoft Edge no ofrece E2EE. El administrador de contraseñas de Google tiene [optional](https://support.google.com/accounts/answer/11350823) E2EE, y [Apple 's](https://support.apple.com/en-us/HT202303) ofrece E2EE de forma predeterminada. +Por ejemplo, el administrador de contraseñas de Microsoft Edge no ofrece E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ Estos administradores de contraseñas sincronizan sus contraseñas con un servid [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ Estos administradores de contraseñas sincronizan sus contraseñas con un servid -Bitwarden también cuenta con [Bitwarden Send](https://bitwarden.com/products/send/), que permite compartir texto y archivos de forma segura con [cifrado de extremo a extremo](https://bitwarden.com/help/send-encryption). Se puede solicitar una [contraseña](https://bitwarden.com/help/send-privacy/#send-passwords) junto con el enlace de envío. Bitwarden Send también cuenta con [borrado automático](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). Se puede solicitar una [contraseña](https://bitwarden.com/help/send-privacy/#send-passwords) junto con el enlace de envío. Bitwarden Send también cuenta con [borrado automático](https://bitwarden.com/help/send-lifespan). Necesita el [Plan Premium](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) para poder compartir archivos. El plan gratuito sólo permite compartir texto. @@ -183,20 +183,20 @@ El código del lado del servidor de Bitwarden es de [código abierto](https://gi ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** es un administrador de contraseñas con un fuerte enfoque en la seguridad y la facilidad de uso, que le permite almacenar contraseñas, tarjetas de crédito, licencias de software y cualquier otra información sensible en una bóveda digital segura. Su bóveda es alojada en los servidores de 1Password por una [cuota mensual](https://1password.com/sign-up/). 1Password es [audited](https://support.1password.com/security-assessments/) de forma regular y ofrece una atención al cliente excepcional. 1Password es de código cerrado; sin embargo, la seguridad del producto está exhaustivamente documentada en su [libro blanco de seguridad](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** es un administrador de contraseñas con un fuerte enfoque en la seguridad y la facilidad de uso, que le permite almacenar contraseñas, tarjetas de crédito, licencias de software y cualquier otra información sensible en una bóveda digital segura. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password es de código cerrado; sin embargo, la seguridad del producto está exhaustivamente documentada en su [libro blanco de seguridad](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ Una ventaja que 1Password tiene sobre Bitwarden es su soporte de primera clase p Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ Estas opciones le permiten administrar una base de datos de contraseñas cifrada [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC almacena sus datos de exportación como archivos [CSV](https://es.wiki **KeePassDX** es un administrador de contraseñas ligero para Android, que permite editar datos encriptados en un único archivo en formato KeePass y puede rellenar los formularios de forma segura. [Contribuidor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) permite desbloquear contenido cosmético y funciones de protocolo no estándar, pero lo más importante es que ayuda y fomenta el desarrollo. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC almacena sus datos de exportación como archivos [CSV](https://es.wiki ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** es un administrador de contraseñas nativo y de código abierto para iOS y macOS. Es compatible con los formatos KeePass y Password Safe, por lo que Strongbox puede utilizarse junto con otros administradores de contraseñas, como KeePassXC, en plataformas que no sean Apple. Al emplear un [modelo freemium](https://strongboxsafe.com/pricing/), Strongbox ofrece la mayoría de las funciones en su nivel gratuito con más funciones orientadas a la comodidad [features](https://strongboxsafe.com/comparison/) -como la autenticación biométrica- bloqueadas tras una suscripción o licencia perpetua. +**Strongbox** es un administrador de contraseñas nativo y de código abierto para iOS y macOS. Es compatible con los formatos KeePass y Password Safe, por lo que Strongbox puede utilizarse junto con otros administradores de contraseñas, como KeePassXC, en plataformas que no sean Apple. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Además, hay una versión sin conexión: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). Esta versión tiene solo lo básico para reducir la superficie de ataque. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Esta versión tiene solo lo básico para reducir la superficie de ataque. ### Línea de comandos @@ -356,7 +356,7 @@ Estos productos son administradores de contraseñas mínimos que se pueden utili **gopass** es un gestor de contraseñas para línea de comandos escrito en Go. Funciona en los principales sistemas operativos de escritorio y servidor (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ Estos productos son administradores de contraseñas mínimos que se pueden utili
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/es/photo-management.md b/i18n/es/photo-management.md index ed661e3c..c3ae4be3 100644 --- a/i18n/es/photo-management.md +++ b/i18n/es/photo-management.md @@ -14,12 +14,12 @@ La mayoría de las soluciones de gestión de fotos en la nube, como Google Photo ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** es un servicio de copia de seguridad de fotos cifrado de extremo a extremo que admite copias de seguridad automáticas en iOS y Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** es un servicio de copia de seguridad de fotos cifrado de extremo a extremo que admite copias de seguridad automáticas en iOS y Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Página Principal](https://ente.io/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/ente-io){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" }
Downloads "Descargas" @@ -46,17 +46,17 @@ La mayoría de las soluciones de gestión de fotos en la nube, como Google Photo **Stingle** es una aplicación de galería y cámara con funciones integradas de copia de seguridad cifrada de extremo a extremo y de sincronización para tus fotos y vídeos. El almacenamiento comienza en 1 GB para cuentas gratuitas en su nube, o puedes alojar tu propio servidor API Stingle para una independencia total. -[:octicons-home-16: Página Principal](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/stingle){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads "Descargas" - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,12 +69,12 @@ La mayoría de las soluciones de gestión de fotos en la nube, como Google Photo ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** es una plataforma autoalojable para la gestión de fotos. Permite sincronizar y compartir álbumes, así como otras muchas [funciones](https://www.photoprism.app/features). No incluye E2EE, por lo que es mejor alojarlo en un servidor en el que confíes y que esté bajo tu control. +**PhotoPrism** es una plataforma autoalojable para la gestión de fotos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). No incluye E2EE, por lo que es mejor alojarlo en un servidor en el que confíes y que esté bajo tu control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
Downloads "Descargas" diff --git a/i18n/es/productivity.md b/i18n/es/productivity.md index 5e5560fd..cf11c0fa 100644 --- a/i18n/es/productivity.md +++ b/i18n/es/productivity.md @@ -17,11 +17,11 @@ La mayoría de las paquetes de ofimática en línea no admiten E2EE, lo que sign **Nextcloud** es un conjunto de programas gratuitos y de código abierto, para la creación de su propio servicio de almacenamiento de archivos en un servidor privado que usted controle. -[:octicons-home-16: Página Principal](https://nextcloud.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads "Descargas" @@ -52,11 +52,11 @@ No recomendamos utilizar la [aplicación con cifrado de extremo a extremo](https **CryptPad** es una alternativa privada a las herramientas de ofimática populares. Todos los contenidos de este servicio web están cifrados de extremo a extremo y pueden compartirse fácilmente con otros usuarios. -[:octicons-home-16: Página Principal](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute }
@@ -99,20 +99,20 @@ Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto **LibreOffice** es un paquete de ofimática gratuito y de código abierto con amplias funcionalidades. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto **OnlyOffice** es un paquete de ofimática gratuito y de código abierto basado en la nube con amplias funcionalidades, incluida la integración con Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Nuestro criterio del mejor caso representa lo que nos gustaría ver del proyecto - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -175,10 +175,10 @@ En general, definimos las paquetes ofimáticos como aplicaciones que podrían su **PrivateBin** es un pastebin en línea minimalista y de código abierto en el que el servidor no tiene ningún conocimiento de los datos pegados. Los datos se cifran/descifran en el navegador utilizando AES de 256 bits. Es la versión mejorada de ZeroBin. -[:octicons-home-16: Página Principal](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Instancias Públicas"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
diff --git a/i18n/es/real-time-communication.md b/i18n/es/real-time-communication.md index 2b7c0de9..55db0a37 100644 --- a/i18n/es/real-time-communication.md +++ b/i18n/es/real-time-communication.md @@ -20,20 +20,20 @@ Estos servicios de mensajería son ideales para proteger sus comunicaciones conf ![Logotipo de Signal](assets/img/messengers/signal.svg){ align=right } -**Signal** es una aplicación móvil desarrollada por Signal Messenger LLC. La aplicación proporciona mensajería instantánea y llamadas protegidas con el Protocolo Signal, un protocolo de cifrado extremadamente seguro que admite el secreto hacia adelante[^1] y la seguridad posterior al compromiso[^2]. +**Signal** es una aplicación móvil desarrollada por Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Página Principal](https://signal.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/signalapp){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requiere su número de teléfono para el registro, sin embargo, debería También puedes cambiar opcionalmente el ajuste **Quién puede Encontrarme por mi Número** a **Nadie**, si quieres evitar que las personas que ya tienen tu número de teléfono descubran tu cuenta/nombre de usuario de Signal. -Las listas de contactos en Signal se cifran utilizando su PIN de Signal y el servidor no tiene acceso a ellas. Los perfiles personales también están encriptados y sólo se comparten con los contactos con los que chatea. Signal admite [grupos privados](https://signal.org/blog/signal-private-group-system/), en los que el servidor no tiene constancia de la pertenencia a grupos, títulos de grupos, avatares de grupos o atributos de grupos. Signal tiene pocos metadatos cuando [Remitente Confidencial](https://signal.org/blog/sealed-sender/) está activado. La dirección del remitente se encripta junto con el cuerpo del mensaje, y sólo la dirección del destinatario es visible para el servidor. Remitente confidencial sólo está activado para las personas de su lista de contactos, pero se puede activar para todos los destinatarios con el consiguiente riesgo de recibir spam. +Las listas de contactos en Signal se cifran utilizando su PIN de Signal y el servidor no tiene acceso a ellas. Los perfiles personales también están encriptados y sólo se comparten con los contactos con los que chatea. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. La dirección del remitente se encripta junto con el cuerpo del mensaje, y sólo la dirección del destinatario es visible para el servidor. Remitente confidencial sólo está activado para las personas de su lista de contactos, pero se puede activar para todos los destinatarios con el consiguiente riesgo de recibir spam. -El protocolo fue [auditado](https://eprint.iacr.org/2016/1013.pdf) de forma independiente en 2016. La especificación del protocolo Signal puede encontrarse en su [documentación](https://signal.org/docs/). +El protocolo fue [auditado](https://eprint.iacr.org/2016/1013.pdf) de forma independiente en 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). Tenemos algunos consejos adicionales para configurar y endurecer su instalación de Signal: -[Configuración y Endurecimiento de Signal :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Configuración y Endurecimiento de Signal :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -75,10 +75,10 @@ Tenemos algunos consejos adicionales para configurar y endurecer su instalación [:octicons-code-16:](https://github.com/simplex-chat){ .card-link title="Código Fuente"" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat soporta funcionalidades básicas de chat en grupo, mensajería dire ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** es un servicio de mensajería instantánea encriptado que [connects](https://briarproject.org/how-it-works/) a otros clientes usando la Red Tor. Briar también puede conectarse a través de Wi-Fi o Bluetooth si está cerca. El modo de malla local de Briar puede ser útil cuando la disponibilidad de Internet es un problema. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar también puede conectarse a través de Wi-Fi o Bluetooth si está cerca. El modo de malla local de Briar puede ser útil cuando la disponibilidad de Internet es un problema. -[:octicons-home-16: Página Principal](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentación} -[:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Las opciones de donación están listadas en la parte inferior de la página principal" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} +[:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat soporta funcionalidades básicas de chat en grupo, mensajería dire Para añadir un contacto en Briar, ambos deben añadirse entre sí primero. Puede intercambiar enlaces `briar://` o escanear el código QR de un contacto si están cerca. -El software cliente fue [auditado](https://briarproject.org/news/2017-beta-released-security-audit/) de forma independiente, y el protocolo de enrutamiento anónimo utiliza la red Tor, que también ha sido auditada. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar tiene una [especificación publicada](https://code.briarproject.org/briar/briar-spec) completamente. @@ -141,24 +141,24 @@ Estos mensajeros no tienen secreto hacia adelante[^1], y aunque satisfacen ciert ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** es el [cliente](https://matrix.org/ecosystem/clients/) de referencia para el protocolo [Matrix](https://matrix.org/docs/guides/introduction), un [estándar abierto](https://matrix.org/docs/spec) para la comunicación descentralizada segura en tiempo real. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Los mensajes y los archivos compartidos en las salas privadas (las que requieren una invitación) son por defecto E2EE, al igual que las llamadas de voz y vídeo uno a uno. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Las llamadas de voz y vídeo en grupo [no](https://github.com/vector-im/element- El propio protocolo Matrix [soporta teóricamente el secreto hacia adelante](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], sin embargo [no está soportado actualmente en Element](https://github.com/vector-im/element-web/issues/7101) debido a que rompe algunos aspectos de la experiencia del usuario como las copias de seguridad de claves y el historial de mensajes compartidos. -El protocolo fue [auditado](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) de forma independiente en 2016. La especificación del protocolo Matrix puede encontrarse en su [documentación](https://spec.matrix.org/latest/). El [trinquete criptográfico Olm](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) utilizado por Matrix es una implementación del algoritmo [Double Ratchet](https://signal.org/docs/specifications/doubleratchet/) de Signal. +El protocolo fue [auditado](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) de forma independiente en 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,12 +181,12 @@ El protocolo fue [auditado](https://matrix.org/blog/2016/11/21/matrixs-olm-end-t **Session** es un servicio de mensajería descentralizado centrado en las comunicaciones privadas, seguras y anónimas. Session ofrece soporte para mensajes directos, chats de grupo y llamadas de voz. -Session utiliza la red descentralizada [Oxen Service Node Network](https://oxen.io/) para almacenar y enrutar los mensajes. Cada mensaje encriptado pasa por tres nodos de la Oxen Service Node Network, lo que hace prácticamente imposible que los nodos recopilen información significativa sobre quienes utilizan la red. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Cada mensaje encriptado pasa por tres nodos de la Oxen Service Node Network, lo que hace prácticamente imposible que los nodos recopilen información significativa sobre quienes utilizan la red. -[:octicons-home-16: Página Principal](https://getsession.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" }
Downloads "Descargas" diff --git a/i18n/es/router.md b/i18n/es/router.md index 7d8e0779..49a7dfe3 100644 --- a/i18n/es/router.md +++ b/i18n/es/router.md @@ -35,10 +35,10 @@ Puedes consultar [ la tabla de hardware](https://openwrt.org/toh/start) de OpenW **OPNsense** es una plataforma de enrutamiento y cortafuegos de código abierto basada en FreeBSD que incorpora muchas características avanzadas, como la conformación del tráfico, el equilibrio de carga y las capacidades de VPN, con muchas más características disponibles en forma de plugins. OPNsense se implementa habitualmente como cortafuegos perimetral, router, punto de acceso inalámbrico, servidor DHCP, servidor DNS y punto final VPN. -[:octicons-home-16: Página Principal](https://opnsense.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/es/search-engines.md b/i18n/es/search-engines.md index 934bfe89..bd20d052 100644 --- a/i18n/es/search-engines.md +++ b/i18n/es/search-engines.md @@ -10,7 +10,7 @@ Utilice un motor de búsqueda que no construya un perfil publicitario basado en Las recomendaciones aquí se basan en los méritos de la política de privacidad de cada servicio. No hay **garantías** de que estas políticas de privacidad se respeten. -Considere usar una [VPN](vpn.md) o [Tor](https://www.torproject.org/) si su modelo de amenaza requiere ocultar su dirección IP al proveedor de búsquedas. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,10 +24,10 @@ Brave Search incluye funciones exclusivas como Discusiones, que destaca los resu Le recomendamos que deshabilite [Estadísticas de uso anónimas](https://search.brave.com/help/usage-metrics), ya que está habilitado de forma predeterminada y se puede deshabilitar dentro de la configuración. -[:octicons-home-16: Página Principal](https://search.brave.com/){ .md-button .md-button--primary } -[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Servicio Onion" } -[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Politica de Privacidad" } -[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentación} +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation}
@@ -41,14 +41,14 @@ Brave Search tiene su sede en Estados Unidos. Su [política de privacidad](https ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** es uno de los buscadores privados más populares. Entre las funciones de búsqueda de DuckDuckGo que merecen ser destacadas se encuentran [bangs](https://duckduckgo.com/bang) y muchas [respuestas instantáneas](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). El motor de búsqueda se basa en una API comercial de Bing para ofrecer la mayoría de los resultados, pero utiliza numerosas [otras fuentes](https://help.duckduckgo.com/results/sources/) para las respuestas instantáneas y otros resultados no primarios. +**DuckDuckGo** es uno de los buscadores privados más populares. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo es el motor de búsqueda por defecto del Navegador Tor y es una de las pocas opciones disponibles en el navegador Safari de Apple. -[:octicons-home-16: Página Principal](https://duckduckgo.com){ .md-button .md-button--primary } -[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Servicio Onion" } -[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Politica de Privacidad" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentación} +[:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo es el motor de búsqueda por defecto del Navegador Tor y es una de la DuckDuckGo tiene su sede en Estados Unidos. Su [política de privacidad](https://duckduckgo.com/privacy) afirma que **registra** sus búsquedas para mejorar los productos, pero no su dirección IP ni ningún otro dato de identificación personal. -DuckDuckGo ofrece [otras dos versiones](https://help.duckduckgo.com/features/non-javascript/) de su motor de búsqueda y ninguna de ellas requiere JavaScript. Sin embargo, estas versiones carecen de funciones. Estas versiones también pueden utilizarse junto con su dirección [Tor onion](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) añadiendo [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) o [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) según la versión. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. Sin embargo, estas versiones carecen de funciones. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -66,9 +66,9 @@ DuckDuckGo ofrece [otras dos versiones](https://help.duckduckgo.com/features/non **SearXNG** es un metabuscador de código abierto y autoalojable que agrega los resultados de otros motores de búsqueda sin almacenar ninguna información. Es una bifurcación de [SearX](https://github.com/searx/searx) mantenida activamente. -[:octicons-home-16: Página Principal](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Instancias Públicos"} -[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} +[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ Cuando utilice una instancia de SearXNG, asegúrese de leer su política de priv ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** es un motor de búsqueda privado, conocido por mostrar resultados de búsqueda de [Google y Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-). Una de las características exclusivas de Startpage es la [Vista Anónima](https://www.startpage.com/en/anonymous-view/), que se esfuerza por normalizar la actividad de los usuarios para dificultar su identificación exclusiva. Esta función puede ser útil para ocultar [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) propiedades de la red y el navegador. A diferencia de lo que sugiere su nombre, no se debe confiar en esta función para mantener el anonimato. Si busca anonimato, utilice [Tor Browser](tor.md#tor-browser) en su lugar. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. A diferencia de lo que sugiere su nombre, no se debe confiar en esta función para mantener el anonimato. Si busca anonimato, utilice [Tor Browser](tor.md#tor-browser) en su lugar. -[:octicons-home-16: Página Principal](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentación} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage limita regularmente el acceso al servicio a ciertas direcciones IP, co -Startpage tiene su sede en los Países Bajos. Según su [política de privacidad](https://www.startpage.com/en/privacy-policy/), registran datos como: sistema operativo, tipo de navegador e idioma. No registran su dirección IP, consultas de búsqueda u otra información de identificación personal. +Startpage tiene su sede en los Países Bajos. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. No registran su dirección IP, consultas de búsqueda u otra información de identificación personal. -El accionista mayoritario de Startpage es System1, una empresa de tecnología publicitaria. No creemos que eso sea un problema, ya que tienen una [política de privacidad](https://system1.com/terms/privacy-policy) claramente separada. El equipo de Privacy Guides se puso en contacto con Startpage [en 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) para aclarar cualquier duda sobre la considerable inversión de System1 en el servicio. Quedamos satisfechos con las respuestas que recibimos. +El accionista mayoritario de Startpage es System1, una empresa de tecnología publicitaria. No creemos que eso sea un problema, ya que tienen una [política de privacidad](https://system1.com/terms/privacy-policy) claramente separada. The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. Quedamos satisfechos con las respuestas que recibimos. ## Criterios diff --git a/i18n/es/tools.md b/i18n/es/tools.md index 7b8e4ce4..d81069a5 100644 --- a/i18n/es/tools.md +++ b/i18n/es/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides es el sitio web más transparente y fiable para enco Si está buscando una solución específica para algo, estas son las herramientas de hardware y software que recomendamos en una variedad de categorías. Nuestras herramientas de privacidad recomendadas se eligen principalmente en función de sus características de seguridad, con un énfasis adicional en las herramientas descentralizadas y de código abierto. Son aplicables a una variedad de modelos de amenazas que van desde la protección contra los programas de vigilancia masiva global y la evasión de las grandes empresas tecnológicas hasta la mitigación de ataques, pero solo usted puede determinar lo que funcionará mejor según sus necesidades. -¡Si necesita ayuda para averiguar cuáles son las mejores herramientas de privacidad y programas alternativos para sus necesidades, inicie un debate en nuestro [foro](https://discuss.privacyguides.net/) o en nuestra comunidad [Matrix](https://matrix.to/#/#privacyguides:matrix.org)! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! Para obtener más información sobre cada proyecto, por qué han sido elegidos y otros consejos o trucos que recomendamos, haga clic en el enlace "Más información" de cada sección o en la propia recomendación para acceder a la sección correspondiente de la página. @@ -89,7 +89,7 @@ Para obtener más información sobre cada proyecto, por qué han sido elegidos y #### Proveedores de DNS -[Recomendamos](dns.md#recommended-providers) una serie de servidores DNS cifrados, como [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) y [Quad9](https://quad9.net/) entre otros, según varios criterios. Recomendamos que leas nuestras páginas sobre DNS antes de elegir un proveedor. En muchos casos no se recomienda utilizar un proveedor de DNS alternativo. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. Recomendamos que leas nuestras páginas sobre DNS antes de elegir un proveedor. En muchos casos no se recomienda utilizar un proveedor de DNS alternativo. [Más información :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/es/tor.md b/i18n/es/tor.md index 56347835..42047732 100644 --- a/i18n/es/tor.md +++ b/i18n/es/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://es.wikipedia.org/wiki/Tor_(red_de_anonimato) applicationCategory: Navegador Web operatingSystem: @@ -27,11 +27,11 @@ schema: La red **Tor** es un grupo de servidores operados por voluntarios que te permite conectarte gratuitamente y mejorar tu privacidad y seguridad en Internet. Individuos y organizaciones también pueden compartir información a través de la red Tor con los "servicios ocultos .onion" sin comprometer su privacidad. Debido a que el tráfico de Tor es difícil de bloquear y rastrear, Tor es una herramienta eficaz para eludir la censura. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Página Principal} -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Servicio Onion" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentación} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribuir } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor funciona enrutando tu tráfico de Internet a través de esos servidores operados por voluntarios, en lugar de hacer una conexión directa con el sitio que estás tratando de visitar. Esto ofusca de dónde viene el tráfico, y ningún servidor en la ruta de conexión es capaz de ver la ruta completa de dónde viene y a dónde va el tráfico, lo que significa que incluso los servidores a los que te estás conectando no pueden romper tu anonimato. @@ -60,20 +60,20 @@ Si un anonimato más completo es primordial para tu situación, deberías **solo **Tor Browser** es la elección si necesitas anonimato, ya que te proporciona acceso a la red de Tor y puentes, e incluye ajustes por defecto y extensiones que estan configuradas automáticamente a los niveles de seguridad por defecto: *Estándar*, *Más seguro* y *Más seguro de todos*. -[:octicons-home-16: Página Principal](https://www.torproject.org){ .md-button .md-button--primary } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Servicio Onion" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentación } -[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ Si un anonimato más completo es primordial para tu situación, deberías **solo -El navegador Tor está diseñado para evitar la toma de huellas digirtales o tu identificación debido a la configuración de tu navegador. Por lo tanto, es imperativo que **no** modifiques el navegador más allá de los [niveles de seguridad](https://tb-manual.torproject.org/security-settings/) predeterminados. +El navegador Tor está diseñado para evitar la toma de huellas digirtales o tu identificación debido a la configuración de tu navegador. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). Además de instalar Tor Browser en tu ordenador directamente, también hay sistemas operativos diseñados específicamente para conectarse a la red Tor como [Whonix](desktop.md#whonix) en [Qubes OS](desktop.md#qubes-os), que proporcionan incluso mayor seguridad y protecciones que el Navegador Tor estándar por sí solo. @@ -98,17 +98,17 @@ Además de instalar Tor Browser en tu ordenador directamente, también hay siste **Orbot** es una VPN de Tor gratuita para smartphones que enruta el tráfico desde cualquier aplicación en tu dispositivo a través de la red Tor. -[:octicons-home-16: Página Principal](https://orbot.app/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentación} -[:octicons-code-16:](https://orbot.app/code){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} +[:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribute }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ Todas las versiones están firmadas con la misma firma, por lo que deberían ser ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** es un navegador de código abierto que te permite navegar de manera anónima, a través de la red Tor en dispositivos iOS y se encuentra respaldado por el [Proyecto Tor](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Página Principal](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Política de Privacidad" } @@ -164,10 +164,10 @@ Todas las versiones están firmadas con la misma firma, por lo que deberían ser Las personas censuradas pueden utilizar proxies Snowflake para conectarse a la red Tor. Snowflake es una gran forma de contribuir a la red incluso si no tienes los conocimientos técnicos para dirigir un repetidor o puente Tor. -[:octicons-home-16: Página Principal](https://snowflake.torproject.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentación} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Código Fuente" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
@@ -181,4 +181,4 @@ Snowflake no aumenta tu privacidad de ninguna manera, ni se utiliza para conecta Ejecutar un proxy Snowflake es de bajo riesgo, incluso más que ejecutar un relé Tor o un puente ya que no son esfuerzos particularmente arriesgados. Sin embargo, no deja de ser un proxy de tráfico a través de tu red, lo que puede tener consecuencias en algunos aspectos, especialmente si tu red tiene un ancho de banda limitado. Asegúrate de que entiendes [cómo funciona Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) antes de decidir si ejecutas un proxy. -[^1]: El ajuste `IsolateDestAddr` se discute en [Tor mailing lis](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) y [Documentación sobre Stream Isolation de Whonix](https://www.whonix.org/wiki/Stream_Isolation), donde ambos proyectos sugieren que no suele ser un buen enfoque para la mayoría de la gente. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/es/vpn.md b/i18n/es/vpn.md index 16ae11ba..e418a238 100644 --- a/i18n/es/vpn.md +++ b/i18n/es/vpn.md @@ -25,7 +25,7 @@ Si buscas **anonimato**, deberías usar el navegador Tor. Si busca mayor **seguridad**, debería asegurarse siempre de que se conecta a sitios web que utilicen HTTPS. Una VPN no sustituye las buenas prácticas de seguridad. -[Descargar Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Mitos y FAQ de Tor](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Nuestros proveedores recomendados usan encriptación, aceptan Monero, soportan W **Proton VPN** es un fuerte contendiente en el espacio VPN, y han estado en funcionamiento desde 2016. Proton AG tiene su sede en Suiza y ofrece un nivel gratuito limitado, así como una opción premium con más funciones. -[:octicons-home-16: Página Principal](https://protonvpn.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -74,7 +74,7 @@ También pensamos que es mejor para la seguridad de las claves privadas del prov Los clientes VPN de Mullvad han sido auditados por Cure53 y Assured AB en un reporte de pentest \[publicado en cure53.de\](https://cure53.de/pentest-report_mullvad_v2.pdf). Los investigadores de seguridad concluyeron: -> Cure53 y Assured AB están satisfechos con los resultados de la auditoría y el software deja una impresión positiva en general. Con la dedicación a la seguridad del equipo interno de Mullvad VPN, los testers no tienen dudas de que el proyecto va por buen camino desde el punto de vista de la seguridad. Puedes ver informes individuales para cada plataforma en [protonvpn.com](https://protonvpn.com/blog/open-source/). En abril de 2022, Proton VPN se sometió a [otra auditoría](https://protonvpn.com/blog/no-logs-audit/) y el informe fue [elaborado por Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). El 9 de noviembre de 2021, [Securitum](https://research.securitum.com)proporcionó una carta de certificación [](https://proton.me/blog/security-audit-all-proton-apps) para las aplicaciones de Proton VPN. +> Cure53 y Assured AB están satisfechos con los resultados de la auditoría y el software deja una impresión positiva en general. Con la dedicación a la seguridad del equipo interno de Mullvad VPN, los testers no tienen dudas de que el proyecto va por buen camino desde el punto de vista de la seguridad. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). El 9 de noviembre de 2021, [Securitum](https://research.securitum.com)proporcionó una carta de certificación [](https://proton.me/blog/security-audit-all-proton-apps) para las aplicaciones de Proton VPN. #### :material-check:{ .pg-green } Clientes de código abierto @@ -86,31 +86,31 @@ Proton VPN, además de aceptar tarjetas de crédito/débito, PayPal y [Bitcoin]( #### :material-check:{ .pg-green } Soporte de WireGuard -Mullvad soporta el protocolo WireGuard®. [WireGuard](https://www.wireguard.com) es un protocolo más nuevo que utiliza criptografía de última generación [](https://www.wireguard.com/protocol/). Además, WireGuard aspira ser más simple y veloz. +Mullvad soporta el protocolo WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Además, WireGuard aspira ser más simple y veloz. -Proton VPN [recomienda](https://protonvpn.com/blog/wireguard/) el uso de WireGuard con su servicio. En las aplicaciones de Proton VPN para Windows, macOS, iOS, Android, ChromeOS y Android TV, WireGuard es el protocolo predeterminado; sin embargo, [la compatibilidad](https://protonvpn.com/support/how-to-change-vpn-protocols/) para el protocolo no está presente en su aplicación para Linux. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Reenvío Remoto de Puertos -Actualmente, Proton VPN solo admite el [ reenvío del puerto](https://protonvpn.com/support/port-forwarding/) remoto y efímero a través de NAT-PMP, con tiempos de arrendamiento de 60 segundos. La aplicación de Windows ofrece una opción de fácil acceso para ello, mientras que en otros sistemas operativos tendrás que ejecutar tu propio cliente [NAT-PMP](https://protonvpn.com/support/port-forwarding-manual-setup/). Las aplicaciones de torrents suelen soportar NAT-PMP de forma nativa. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Las aplicaciones de torrents suelen soportar NAT-PMP de forma nativa. #### :material-information-outline:{ .pg-orange } Evasión de la Censura -Proton VPN tiene su protocolo [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) que *puede* ayudar en situaciones en las que los protocolos VPN como OpenVPN o Wireguard están bloqueados con varias técnicas rudimentarias. Stealth encapsula el túnel VPN en una sesión TLS para que parezca tráfico de Internet más genérico. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsula el túnel VPN en una sesión TLS para que parezca tráfico de Internet más genérico. Por desgracia, no funciona muy bien en países donde se despliegan sofisticados filtros que analizan todo el tráfico saliente en un intento de descubrir túneles cifrados. Stealth tampoco está disponible aún en [Windows](https://github.com/ProtonVPN/win-app/issues/64) ni Linux. #### :material-check:{ .pg-green } Clientes Móviles -Además de proporcionar archivos de configuración estándar de OpenVPN, Proton VPN tiene clientes móviles para [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US)y [GitHub](https://github.com/ProtonVPN/android-app/releases), lo que permite conexiones fáciles a sus servidores. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Funcionalidad Adicional -Mullvad ha publicado su cliente en la \[App Store\](https://apps.apple.com/app/mullvad-vpn/id1488466513) y en \[Google Play\](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn), ambos con una interfaz fácil de usar en lugar de requerir la configuración manual de la conexión de WireGuard. El cliente móvil en Android también está disponible en \[F-Droid\](https://f-droid.org/packages/net.mullvad.mullvadvpn), lo que garantiza que se compila con \[builds reproducibles\](https://www.f-droid.org/en/2019/05/05/trust-privacy-and-free-software.html). Ofrecen bloqueo de contenidos y bloqueo de malware conocido con su servicio DNS. Además, Proton VPN también ofrece servidores "Tor" que te permiten conectarte fácilmente a sitios.onion, pero seguimos recomendando encarecidamente utilizar [el Navegador Tor oficial](https://www.torproject.org/) para este propósito. +Mullvad ha publicado su cliente en la \[App Store\](https://apps.apple.com/app/mullvad-vpn/id1488466513) y en \[Google Play\](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn), ambos con una interfaz fácil de usar en lugar de requerir la configuración manual de la conexión de WireGuard. El cliente móvil en Android también está disponible en \[F-Droid\](https://f-droid.org/packages/net.mullvad.mullvadvpn), lo que garantiza que se compila con \[builds reproducibles\](https://www.f-droid.org/en/2019/05/05/trust-privacy-and-free-software.html). Ofrecen bloqueo de contenidos y bloqueo de malware conocido con su servicio DNS. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } La función Killswitch no funciona en los Macs basados en Intel -Los fallos del sistema [pueden ocurrir](https://protonvpn.com/support/macos-t2-chip-kill-switch/) en Macs basados en Intel cuando se utiliza el killswitch de VPN. Utilizan \[ShadowSocks\](https://shadowsocks.org/en/index.html) en su configuración de ShadowSocks + OpenVPN, lo que les hace más resistentes contra los cortafuegos con \[Inspección profunda de paquete\](https://es.wikipedia.org/wiki/Deep_Packet_Inspection) que intentan bloquear las VPN. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. Utilizan \[ShadowSocks\](https://shadowsocks.org/en/index.html) en su configuración de ShadowSocks + OpenVPN, lo que les hace más resistentes contra los cortafuegos con \[Inspección profunda de paquete\](https://es.wikipedia.org/wiki/Deep_Packet_Inspection) que intentan bloquear las VPN. ### IVPN @@ -120,20 +120,20 @@ Los fallos del sistema [pueden ocurrir](https://protonvpn.com/support/macos-t2-c **IVPN** es un fuerte contendiente en el espacio de las VPNs, y ha estado en funcionamiento desde 2009. IVPN es basado en Gibraltar. -[:octicons-home-16: Página Principal](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Política de Privacidad" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/ivpn){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -141,7 +141,7 @@ Los fallos del sistema [pueden ocurrir](https://protonvpn.com/support/macos-t2-c #### :material-check:{ .pg-green } 37 Países -IVPN tiene [servidores en 37 países](https://www.ivpn.net/server-locations).(1) Elegir un proveedor VPN con un servidor más cercano a ti reducirá la latencia del tráfico de red que envíes. Esto se debe a que es una ruta más corta (menos saltos) hasta el destino. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Esto se debe a que es una ruta más corta (menos saltos) hasta el destino. { .annotate } 1. Última comprobación: 21-12-2023 @@ -150,11 +150,11 @@ También pensamos que es mejor para la seguridad de las claves privadas del prov #### :material-check:{ .pg-green } Auditado independientemente -IVPN se ha sometido a una auditoría de no-registrar en [por parte de Cure53](https://cure53.de/audit-report_ivpn.pdf) que concluyó de acuerdo con la afirmación de no-registrar de IVPN. IVPN también ha completado una [prueba de penetración exhaustiva Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) en enero de 2020. IVPN también ha dicho que tiene previsto tener [informes anuales](https://www.ivpn.net/blog/independent-security-audit-concluded) en el futuro. Se realizó una revisión adicional [en abril de 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) y fue producida por Cure53 [en su sitio web](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN se ha sometido a una auditoría de no-registrar en [por parte de Cure53](https://cure53.de/audit-report_ivpn.pdf) que concluyó de acuerdo con la afirmación de no-registrar de IVPN. IVPN también ha completado una [prueba de penetración exhaustiva Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) en enero de 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Clientes de Código Abierto -A partir de febrero de 2020, [las aplicaciones IVPN ya son de código abierto](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). El código fuente puede ser obtenido en su [organización GitHub](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). El código fuente puede ser obtenido en su [organización GitHub](https://github.com/ivpn). #### :material-check:{ .pg-green } Acepta Efectivo y Monero @@ -162,25 +162,25 @@ Además de aceptar tarjetas de crédito/débito y PayPal, IVPN acepta Bitcoin, * #### :material-check:{ .pg-green } Soporte de WireGuard -IVPN soporta el protocolo WireGuard®. [WireGuard](https://www.wireguard.com) es un protocolo más nuevo que utiliza criptografía de última generación [](https://www.wireguard.com/protocol/). Además, WireGuard aspira ser más simple y veloz. +IVPN soporta el protocolo WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Además, WireGuard aspira ser más simple y veloz. -IVPN [recomienda](https://www.ivpn.net/wireguard/) el uso de WireGuard con su servicio y, como tal, el protocolo es el predeterminado en todas las aplicaciones de IVPN. IVPN también ofrece un generador de configuración de WireGuard para utilizarlo con las [apps](https://www.wireguard.com/install/) oficiales. +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Reenvío Remoto de Puertos -Anteriormente, IVPN admitía el reenvío de puertos, pero eliminó la opción en [junio de 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). La ausencia de esta característica podría afectar negativamente a ciertas aplicaciones, especialmente a las aplicaciones peer-to-peer como los clientes torrent. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). La ausencia de esta característica podría afectar negativamente a ciertas aplicaciones, especialmente a las aplicaciones peer-to-peer como los clientes torrent. #### :material-check:{ .pg-green } Evasión de la censura -IVPN tiene modos de ofuscación usando el proyecto [v2ray](https://www.v2ray.com/en/index.html) que ayuda en situaciones donde los protocolos VPN como OpenVPN o Wireguard están bloqueados. Actualmente, esta característica sólo está disponible en la versión para escritorio y [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). Este cuenta con dos modos donde puede usar [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) sobre QUIC o conexiones TCP. QUIC es un moderno protocolo con mejor control de la congestión y puede ser más rápido con menor latencia. El modo TCP ayuda para que tus datos aparezcan como tráfico HTTP regular. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). Este cuenta con dos modos donde puede usar [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) sobre QUIC o conexiones TCP. QUIC es un moderno protocolo con mejor control de la congestión y puede ser más rápido con menor latencia. El modo TCP ayuda para que tus datos aparezcan como tráfico HTTP regular. #### :material-check:{ .pg-green } Clientes Móviles -Además de proporcionar los archivos de configuración estándar de OpenVPN, IVPN tiene clientes móviles para [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), y [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) y[GitHub](https://github.com/ivpn/android-app/releases) que permiten conexiones fáciles a sus servidores. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Funcionalidad Adicional -Proton VPN tiene sus propios servidores y centros de datos en Suiza, Islandia y Suecia. IVPN también proporciona la funcionalidad "[AntiTracker](https://www.ivpn.net/antitracker)", que bloquea las redes publicitarias y los rastreadores al nivel de la red. +Proton VPN tiene sus propios servidores y centros de datos en Suiza, Islandia y Suecia. IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,21 +190,21 @@ Proton VPN tiene sus propios servidores y centros de datos en Suiza, Islandia y **Mullvad** es una VPN rápida y económica que se centra en la transparencia y la seguridad. Llevan en funcionamiento desde **2009**. Mullvad tiene su sede en Suecia y no tiene prueba gratuita. -[:octicons-home-16: Página Principal](https://mullvad.net){ .md-button .md-button--primary } -[:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Servicio Onion" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Politica de Privacidad" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentación} -[:octicons-code-16:](https://github.com/mullvad){ .card-link title="Código Fuente" } +[:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } +[:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
-Downloads "Descargas" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -212,7 +212,7 @@ Proton VPN tiene sus propios servidores y centros de datos en Suiza, Islandia y #### :material-check:{ .pg-green } 40 Países -Mullvad tiene [servidores en 40 países](https://mullvad.net/servers/).(1) Elegir un proveedor de VPN con el servidor más cercano a ti reducirá la latencia del tráfico de red que envías. Esto se debe a que es una ruta más corta (menos saltos) hasta el destino. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Esto se debe a que es una ruta más corta (menos saltos) hasta el destino. { .annotate } 1. Última comprobación: 21-12-2023 @@ -225,11 +225,11 @@ Los clientes VPN de Mullvad han sido auditados por Cure53 y Assured AB en un rep > Cure53 y Assured AB están satisfechos con los resultados de la auditoría y el software deja una impresión general positiva. Con la dedicación a la seguridad del equipo interno de Mullvad VPN, los comprobadores no tienen dudas de que el proyecto va por buen camino desde el punto de vista de la seguridad. -En 2020 una segunda auditoría [fue anunciada](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) y el [informe final de auditoríase](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) fue hecho disponible en la página de Cure53: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > Los resultados del proyecto de mayo-junio de 2020 dirigido al complejo de Mullvad son bastante positivos. [...] El ecosistema general de aplicaciones utilizado por Mullvad deja una impresión sólida y estructurada. La estructura general de la aplicación facilita el despliegue de parches y correcciones de forma estructurada. Más que nada, los hallazgos detectados por Cure53 muestran la importancia de auditar y reevaluar constantemente los vectores de filtración actuales, para garantizar siempre la privacidad de los usuarios finales. Dicho esto, Mullvad hace un gran trabajo protegiendo al usuario final de las filtraciones comunes de Información personalmente identificable y de los riesgos relacionados con la privacidad. -En 2021 [se anunció](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) una auditoría de infraestructuras y el [informe final de auditoría](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) se publicó en el sitio web de Cure53. Otro informe se encargó a [en junio de 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) y está disponible en [la web de Assured](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Clientes de Código Abierto @@ -241,17 +241,17 @@ Mullvad, además de aceptar tarjetas de crédito/débito y PayPal, acepta Bitcoi #### :material-check:{ .pg-green } Soporte de WireGuard -IVPN soporta el protocolo WireGuard®. [WireGuard](https://www.wireguard.com) es un protocolo más nuevo que utiliza criptografía de última generación [](https://www.wireguard.com/protocol/). Además, WireGuard aspira ser más simple y veloz. +IVPN soporta el protocolo WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Además, WireGuard aspira ser más simple y veloz. -Mullvad [recomienda a](https://mullvad.net/en/help/why-wireguard/) el uso de WireGuard con su servicio. Es el protocolo predeterminado o único en las aplicaciones Android, iOS, macOS y Linux de Mullvad, pero en Windows debe [habilitar manualmente](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad también ofrece un generador de configuraciones WireGuard para su uso con las [aplicaciones](https://www.wireguard.com/install/) oficiales de WireGuard. +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } Soporte de IPv6 -Mullvad te permite acceder a [a servicios alojados en IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), a diferencia de otros proveedores que bloquean las conexiones IPv6. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Reenvío Remoto de Puertos -Anteriormente, Mullvad admitía el reenvío de puertos, pero eliminó la opción en [Mayo de 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). La ausencia de esta característica podría afectar negativamente a ciertas aplicaciones, especialmente a las aplicaciones peer-to-peer como los clientes torrent. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). La ausencia de esta característica podría afectar negativamente a ciertas aplicaciones, especialmente a las aplicaciones peer-to-peer como los clientes torrent. #### :material-check:{ .pg-green } Evasión de la censura @@ -259,11 +259,11 @@ Mullvad tiene un modo de ofuscación usando [Shadowsocks con v2ray](https://mull #### :material-check:{ .pg-green } Clientes Móviles -Mullvad ha publicado los clientes en [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) y [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn), ambos con una interfaz fácil de usar en lugar de tener que configurar manualmente la conexión WireGuard. El cliente de Android también está disponible en [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. El cliente de Android también está disponible en [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Funcionalidad Adicional -Mullvad es muy transparente sobre los nodos que [posee o alquila](https://mullvad.net/en/servers/). Utilizan [ShadowSocks](https://shadowsocks.org/) en su configuración ShadowSocks + OpenVPN, haciéndolos más resistentes contra cortafuegos con [Inspección de paquetes profundos](https://en.wikipedia.org/wiki/Deep_packet_inspection) intentando bloquear VPNs. Supuestamente, [China tiene que utilizar un método diferente para bloquear los servidores de ShadowSocks](https://github.com/net4people/bbs/issues/22). El sitio web de Mullvad también es accesible a través de Tor en [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supuestamente, [China tiene que utilizar un método diferente para bloquear los servidores de ShadowSocks](https://github.com/net4people/bbs/issues/22). El sitio web de Mullvad también es accesible a través de Tor en [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criterios diff --git a/i18n/fa/CODE_OF_CONDUCT.md b/i18n/fa/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/fa/CODE_OF_CONDUCT.md +++ b/i18n/fa/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/fa/about/index.md b/i18n/fa/about/index.md index 4ff38147..6cfafa4f 100644 --- a/i18n/fa/about/index.md +++ b/i18n/fa/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/fa/about/notices.md b/i18n/fa/about/notices.md index 19ab8f60..b8d264db 100644 --- a/i18n/fa/about/notices.md +++ b/i18n/fa/about/notices.md @@ -29,7 +29,7 @@ Privacy Guides is an open-source project contributed to under licenses that incl این بدان معناست که شما می‌توانید از محتوای قابل فهم بشری در این مخزن برای پروژه خود استفاده کنید، طبق شرایطی که در متن مجوز عمومی Creative Commons Attribution-NoDerivatives 4.0 International Public License تعیین شده است. شما می‌توانید این کار را به هر نحو منصفانه‌ای انجام دهید، اما نباید به هر نحوی که به نظر برسد Privacy Guides شما یا استفاده شما را تأیید می‌کند. شما **نمی‌توانید** از برندینگ Privacy Guides در پروژه خود استفاده کنید مگر با تأیید صریح از این پروژه. علامت تجاری برند Privacy Guides شامل عبارت "Privacy Guides" به همراه لوگوی سپر می‌باشد. -ما اعتقاد داریم که لوگوها و تصاویر دیگر موجود در `assets` که از تامین‌کنندگان شخص ثالث به دست می‌آیند، یا در دامنه عمومی هستند یا تحت استفاده عادلانه **fair use** قرار می‌گیرند. به طور خلاصه، مفهوم استفاده عادلانه قانونی اجازه استفاده از تصاویری که تحت حقوق تکثیر قرار دارند به منظور شناسایی موضوع برای اهداف نظر عمومی را می‌دهد. شما می‌توانید از تصاویری که تحت حقوق تکثیر قرار دارند برای شناسایی موضوع به منظور ارائه نظر عمومی استفاده کنید. لطفاً متن کامل مفهوم استفاده عادلانه قانونی را در [اینجا](https://www.copyright.gov/fair-use/more-info.html) بخوانید. با این حال، این لوگوها و تصاویر دیگر ممکن است همچنان تحت قوانین علامت تجاری در یک یا چند حقوق امتیاز موجود باشند. قبل از استفاده از این محتوا، لطفاً اطمینان حاصل کنید که از آن برای شناسایی شرکت یا سازمانی که علامت تجاری را دارد، استفاده می‌شود و شما در قوانینی که در شرایط استفاده مورد نظر شما اعمال می‌شود، حق استفاده از آن را دارید. *هنگام کپی محتوا از این وب سایت، شما به تنهایی مسئولیت اطمینان از عدم نقض حقوق تجاری یا حقوق تکثیر شخص دیگر را دارید.* +ما اعتقاد داریم که لوگوها و تصاویر دیگر موجود در `assets` که از تامین‌کنندگان شخص ثالث به دست می‌آیند، یا در دامنه عمومی هستند یا تحت استفاده عادلانه **fair use** قرار می‌گیرند. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. با این حال، این لوگوها و تصاویر دیگر ممکن است همچنان تحت قوانین علامت تجاری در یک یا چند حقوق امتیاز موجود باشند. قبل از استفاده از این محتوا، لطفاً اطمینان حاصل کنید که از آن برای شناسایی شرکت یا سازمانی که علامت تجاری را دارد، استفاده می‌شود و شما در قوانینی که در شرایط استفاده مورد نظر شما اعمال می‌شود، حق استفاده از آن را دارید. *هنگام کپی محتوا از این وب سایت، شما به تنهایی مسئولیت اطمینان از عدم نقض حقوق تجاری یا حقوق تکثیر شخص دیگر را دارید.* هنگامی که شما به وب سایت ما مشارکت می‌کنید، این کار را به موجب مجوزهای فوق انجام می‌دهید و به Privacy Guides یک مجوز دائمی، جهانی، غیر انحصاری، قابل انتقال، بدون نیاز به پرداخت حق کپی، بدون امکان لغو صدور می‌دهید. این مجوز حق دارد که از طریق زیرلیسانس‌دهندگان چندگانه، حقوقی را که بدین وسیله اعطا می‌کنید، تکثیر، اصلاح، نمایش، اجرا و توزیع مشارکت شما را به عنوان بخشی از پروژه ما، بهره‌برداری نماید. @@ -47,4 +47,4 @@ Privacy Guides is an open-source project contributed to under licenses that incl --- -*بخش‌هایی از این اطلاعیه به طور خودیار از منبع [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) در GitHub استفاده شده است. منبع مذکور و این صفحه خود به موجب مجوز [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/) منتشر شده‌اند.* +*بخش‌هایی از این اطلاعیه به طور خودیار از منبع [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) در GitHub استفاده شده است. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/fa/about/privacytools.md b/i18n/fa/about/privacytools.md index 512ebb93..0c889f62 100644 --- a/i18n/fa/about/privacytools.md +++ b/i18n/fa/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/fa/advanced/communication-network-types.md b/i18n/fa/advanced/communication-network-types.md index 43da8597..5d26d13e 100644 --- a/i18n/fa/advanced/communication-network-types.md +++ b/i18n/fa/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/fa/advanced/dns-overview.md b/i18n/fa/advanced/dns-overview.md index 8543dab7..0463f7fe 100644 --- a/i18n/fa/advanced/dns-overview.md +++ b/i18n/fa/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/fa/advanced/payments.md b/i18n/fa/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/fa/advanced/payments.md +++ b/i18n/fa/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/fa/advanced/tor-overview.md b/i18n/fa/advanced/tor-overview.md index 8a6ab1ce..cc7a2fad 100644 --- a/i18n/fa/advanced/tor-overview.md +++ b/i18n/fa/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/fa/android.md b/i18n/fa/android.md index 6a650455..2f79dd91 100644 --- a/i18n/fa/android.md +++ b/i18n/fa/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,7 +113,7 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/fa/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/fa/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/fa/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/fa/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/fa/assets/img/how-tor-works/tor-encryption.svg b/i18n/fa/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/fa/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/fa/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/fa/assets/img/how-tor-works/tor-path-dark.svg b/i18n/fa/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/fa/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/fa/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/fa/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/fa/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/fa/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/fa/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/fa/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/fa/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/fa/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/fa/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/fa/assets/img/how-tor-works/tor-path.svg b/i18n/fa/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/fa/assets/img/how-tor-works/tor-path.svg +++ b/i18n/fa/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/fa/basics/account-deletion.md b/i18n/fa/basics/account-deletion.md index cd89ea6f..857a57d8 100644 --- a/i18n/fa/basics/account-deletion.md +++ b/i18n/fa/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/fa/basics/common-misconceptions.md b/i18n/fa/basics/common-misconceptions.md index 74650997..5aeaae95 100644 --- a/i18n/fa/basics/common-misconceptions.md +++ b/i18n/fa/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/fa/basics/common-threats.md b/i18n/fa/basics/common-threats.md index a8102469..67bd483b 100644 --- a/i18n/fa/basics/common-threats.md +++ b/i18n/fa/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacy From Service Providers @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/fa/basics/email-security.md b/i18n/fa/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/fa/basics/email-security.md +++ b/i18n/fa/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/fa/basics/multi-factor-authentication.md b/i18n/fa/basics/multi-factor-authentication.md index e71b2157..17edeebc 100644 --- a/i18n/fa/basics/multi-factor-authentication.md +++ b/i18n/fa/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/fa/basics/passwords-overview.md b/i18n/fa/basics/passwords-overview.md index 63b87498..5a828342 100644 --- a/i18n/fa/basics/passwords-overview.md +++ b/i18n/fa/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/fa/basics/vpn-overview.md b/i18n/fa/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/fa/basics/vpn-overview.md +++ b/i18n/fa/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/fa/basics/why-privacy-matters.md b/i18n/fa/basics/why-privacy-matters.md index eba696ee..e80810bf 100644 --- a/i18n/fa/basics/why-privacy-matters.md +++ b/i18n/fa/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/fa/calendar.md b/i18n/fa/calendar.md index fd26697b..8390538c 100644 --- a/i18n/fa/calendar.md +++ b/i18n/fa/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/fa/cloud.md b/i18n/fa/cloud.md index 34b98b3d..166e2dd6 100644 --- a/i18n/fa/cloud.md +++ b/i18n/fa/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/fa/cryptocurrency.md b/i18n/fa/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/fa/cryptocurrency.md +++ b/i18n/fa/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/fa/data-redaction.md b/i18n/fa/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/fa/data-redaction.md +++ b/i18n/fa/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106)
diff --git a/i18n/fa/desktop-browsers.md b/i18n/fa/desktop-browsers.md index f37df77c..96d3ba29 100644 --- a/i18n/fa/desktop-browsers.md +++ b/i18n/fa/desktop-browsers.md @@ -70,8 +70,8 @@ schema: **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ schema: -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### افزونه‌ها @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ We are working on establishing defined criteria for every section of our site, a - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### بهترین شرایط Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - شامل قابلیت مسدود کردن محتوای داخلی است. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. این می تواند نسبت به نصب برنامه های مبتنی بر الکترون مزایایی داشته باشد، زیرا شما از به روز رسانی های امنیتی منظم مرورگر خود بهره مند می شوید. - شامل عملکرد افزودنی (bloatware) که بر حریم خصوصی کاربر تأثیر نمی گذارد، نمی شود. - به طور پیش فرض داده تله متری (Telemetry) را جمع آوری نمی کند. @@ -462,4 +462,4 @@ Our best-case criteria represents what we would like to see from the perfect pro - باید مستقیماً بر حریم خصوصی کاربر تأثیر بگذارد، یعنی صرفاً نباید اطلاعات ارائه دهد. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/fa/desktop.md b/i18n/fa/desktop.md index 5252084a..1fac706b 100644 --- a/i18n/fa/desktop.md +++ b/i18n/fa/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute }
@@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute }
@@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute }
@@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute }
@@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/fa/device-integrity.md b/i18n/fa/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/fa/device-integrity.md +++ b/i18n/fa/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/fa/dns.md b/i18n/fa/dns.md index 61171598..4a78760f 100644 --- a/i18n/fa/dns.md +++ b/i18n/fa/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## Recommended Providers -| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | +| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ After installation of either a configuration profile or an app that uses the DNS #### Signed Profiles -Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home features a polished web interface to view insights and manage blocked content. @@ -144,13 +144,13 @@ AdGuard Home features a polished web interface to view insights and manage block ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -159,8 +159,8 @@ Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to suc
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/fa/email-clients.md b/i18n/fa/email-clients.md index 980f054b..e2669425 100644 --- a/i18n/fa/email-clients.md +++ b/i18n/fa/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/fa/email.md b/i18n/fa/email.md index 8b90cdd7..3e1d01e1 100644 --- a/i18n/fa/email.md +++ b/i18n/fa/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail گزارش‌های خرابی داخلی دارد که اطلاعا #### :material-check:{ .pg-green } Custom Domains and Aliases -مشترکین Proton Mail پولی می توانند از دامنه خود با این سرویس یا آدرس [catch-all](https://proton.me/support/catch-all) استفاده کنند. Proton Mail همچنین از [subaddressing](https://proton.me/support/creating-aliases) پشتیبانی می‌کند که برای افرادی که نمی‌خواهند دامنه بخرند مفید است. +مشترکین Proton Mail پولی می توانند از دامنه خود با این سرویس یا آدرس [catch-all](https://proton.me/support/catch-all) استفاده کنند. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } روش های پرداخت خصوصی @@ -129,7 +129,7 @@ Proton Mail امکان به ارث بردن اطلاعات برای وراث ر #### :material-check:{ .pg-green } دامنه ها و نام های مستعار (Aliases) سفارشی -Mailbox.org به شما امکان می‌دهد از دامنه خود استفاده کنید و آدرس های [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) را پشتیبانی می‌کند. Mailbox.org همچنین از [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+do+I+use+it) پشتیبانی می کند. اگر نمی‌خواهید دامنه بخرید این قابلیت مفید است. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } روش های پرداخت خصوصی @@ -137,42 +137,32 @@ Mailbox.org به شما امکان می‌دهد از دامنه خود استف #### :material-check:{ .pg-green } امنیت حساب -Mailbox.org [تأیید هویت دو عاملی (2FA)](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) را فقط برای ایمیل وب خود پشتیبانی می کند. می توانید از TOTP یا [YubiKey](https://en.wikipedia.org/wiki/YubiKey) از طریق [YubiCloud](https://www.yubico.com/products/services-software/yubicloud) استفاده کنید. استانداردهای وب مانند [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) هنوز پشتیبانی نمی‌شوند. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). استانداردهای وب مانند [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) هنوز پشتیبانی نمی‌شوند. #### :material-information-outline:{ .pg-blue } امنیت داده -Mailbox.org امکان رمزگذاری نامه های دریافتی را با استفاده از [صندوق پستی رمزگذاری شده](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox) خود می دهد. پیام های جدیدی که دریافت می‌کنید بلافاصله با کلید عمومی شما رمزگذاری می‌شوند. - -با این حال، [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange)، پلتفرم نرم‌افزاری که Mailbox.org از آن استفاده می‌کند، - -مخاطبین (Contacts) و تقویم را رمزگذاری نمی‌کند. A [standalone option](calendar.md) may be more appropriate for that information.

- +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). پیام های جدیدی که دریافت می‌کنید بلافاصله با کلید عمومی شما رمزگذاری می‌شوند. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } رمزگذاری ایمیل -Mailbox.org دارای [رمزگذاری یکپارچه](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) در ایمیل وب خود است که ارسال پیام به افراد دارای کلیدهای عمومی OpenPGP را ساده می کند. آنها همچنین به [گیرندگان راه دور اجازه رمزگشایی ایمیل](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) در سرورهای Mailbox.org را می‌دهند. این ویژگی زمانی مفید است که گیرنده امکان استفاده از OpenPGP را ندارد و نمی تواند یک کپی از ایمیل را در صندوق پستی خود رمزگشایی کند. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. این ویژگی زمانی مفید است که گیرنده امکان استفاده از OpenPGP را ندارد و نمی تواند یک کپی از ایمیل را در صندوق پستی خود رمزگشایی کند. Mailbox.org همچنین از کشف کلیدهای عمومی از طریق HTTP از [دایرکتوری کلیدهای وب (WKD)](https://wiki.gnupg.org/WKD) پشتیبانی می کند. این قابلیت به افرادی که از سرویس Mailbox.org استفاده نمی‌کنند اجازه می‌دهد تا کلیدهای OpenPGP حساب‌های Mailbox.org را برای رمزگذاری E2EE سرویس‌های دیگر به راحتی پیدا کنند. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. - - #### :material-information-outline:{ .pg-blue } بستن حساب پس از پایان اشتراک، حساب شما محدود می شود. پس از [30 روز به صورت غیر قابل برگشت](https://kb.mailbox.org/en/private/payment-article/what-happens-at-the-end-of-my-contract) حذف می شود. - - #### :material-information-outline:{ .pg-blue } عملکردهای دیگر -با استفاده از [سرویس onion](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org) می‌توانید به حساب Mailbox.org خود از طریق IMAP/SMTP دسترسی پیدا کنید. با این حال، رابط وب ایمیل از طریق سرویس .onion آنها قابل دسترسی نیست و ممکن است با خطاهای گواهی TLS مواجه شوید. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). با این حال، رابط وب ایمیل از طریق سرویس .onion آنها قابل دسترسی نیست و ممکن است با خطاهای گواهی TLS مواجه شوید. -همه حساب‌ها دارای فضای ذخیره‌سازی ابری محدودی هستند که [قابل رمزگذاری](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive) است. Mailbox.org همچنین نام مستعار (Alias) [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely) را ارائه می دهد که رمزگذاری TLS را در اتصال بین سرورهای ایمیل اعمال می کند، در غیر این صورت پیام به هیچ وجه ارسال نخواهد شد. Mailbox.org همچنین از [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) علاوه بر پروتکل‌های دسترسی استاندارد مانند IMAP و POP3 پشتیبانی می‌کند. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org همچنین از [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) علاوه بر پروتکل‌های دسترسی استاندارد مانند IMAP و POP3 پشتیبانی می‌کند. Mailbox.org امکان به ارث بردن اطلاعات برای همه طرح‌هایش را دارد. می‌توانید انتخاب کنید که آیا می‌خواهید کدام یک از داده‌هایتان به وراث داده شود، مشروط بر اینکه آنها درخواست دهند و وصیت شما را ارائه دهند. همچنین می‌توانید فردی را با نام و آدرس معرفی کنید. - - ## سرویس دهندگان بیشتر این ارائه دهندگان ایمیل های شما را با رمزگذاری دانش صفر (zero-knowledge encryption) ذخیره می کنند که آنها را گزینه‌های خوبی برای ایمن نگه داشتن ایمیل های شما می‌کند. با این حال، آنها از استانداردهای رمزگذاری E2EE بین ارائه دهندگان مختلف ایمیل پشتیبانی نمی‌کنند. @@ -195,18 +185,18 @@ Mailbox.org امکان به ارث بردن اطلاعات برای همه طر [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -214,54 +204,38 @@ Mailbox.org امکان به ارث بردن اطلاعات برای همه طر Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use of third-party [email clients](email-clients.md), and you also won't be able to add [external email accounts](https://github.com/tutao/tutanota/issues/544#issuecomment-670473647) to the Tuta app. [Email import](https://github.com/tutao/tutanota/issues/630) is not currently supported either, though this is [due to be changed](https://tuta.com/blog/posts/kickoff-import). Emails can be exported [individually or by bulk selection](https://tuta.com/howto#generalMail) per folder, which may be inconvenient if you have many folders. - - #### :material-check:{ .pg-green } دامنه ها و نام های مستعار (Aliases) سفارشی -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. - - +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } روش های پرداخت خصوصی Tuta only directly accepts credit cards and PayPal, however [cryptocurrency](cryptocurrency.md) can be used to purchase gift cards via their [partnership](https://tuta.com/faq/#cryptocurrency) with Proxystore. - - #### :material-check:{ .pg-green } امنیت حساب Tuta supports [two factor authentication](https://tuta.com/faq#2fa) with either TOTP or U2F. - - #### :material-check:{ .pg-green } امنیت داده Tuta has [zero access encryption at rest](https://tuta.com/faq#what-encrypted) for your emails, [address book contacts](https://tuta.com/faq#encrypted-address-book), and [calendars](https://tuta.com/faq#calendar). این بدان معناست که پیام ها و سایر داده های ذخیره شده در حساب شما فقط توسط شما قابل خواندن است. - - #### :material-information-outline:{ .pg-blue } رمزگذاری ایمیل Tuta [does not use OpenPGP](https://tuta.com/support/#pgp). Tuta accounts can only receive encrypted emails from non-Tuta email accounts when sent via a [temporary Tuta mailbox](https://tuta.com/support/#encrypted-email-external). - - #### :material-information-outline:{ .pg-blue } بستن حساب Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts) after six months. You can reuse a deactivated free account if you pay. - - #### :material-information-outline:{ .pg-blue } عملکردهای دیگر Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. - - ## Email Aliasing Services An email aliasing service allows you to easily generate a new email address for every website you register for. The email aliases you generate are then forwarded to an email address of your choosing, hiding both your "main" email address and the identity of your email provider. True email aliasing is better than plus addressing commonly used and supported by many providers, which allows you to create aliases like yourname+[anythinghere]@example.com, because websites, advertisers, and tracking networks can trivially remove anything after the + sign to know your true email address. @@ -290,8 +264,6 @@ Our email aliasing recommendations are providers that allow you to create aliase Using an aliasing service requires trusting both your email provider and your aliasing provider with your unencrypted messages. Some providers mitigate this slightly with automatic PGP encryption, which reduces the number of parties you need to trust from two to one by encrypting incoming emails before they are delivered to your final mailbox provider. - - ### addy.io
@@ -312,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -329,8 +301,6 @@ Notable free features: - [x] 1 Recipient Mailboxes - [x] Automatic PGP Encryption - - ### SimpleLogin
@@ -340,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -350,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -369,14 +339,10 @@ Notable free features: - [x] Unlimited Replies - [x] 1 Recipient Mailbox - - ## خودمیزبانی ایمیل (Self-Hosting) ادمین‌های سیستم پیشرفته ممکن است راه اندازی سرور ایمیل خود را در نظر بگیرند. سرورهای ایمیل برای ایمن نگه داشتن چیزها و قابل اعتماد بودن تحویل ایمیل نیاز به توجه و نگهداری مداوم دارند. - - ### راه‌حل های نرم‌افزاری ترکیبی
@@ -386,9 +352,9 @@ Notable free features: **Mailcow** سرور ایمیل پیشرفته‌تری است که برای کسانی که تجربه لینوکس به نسبت بالایی دارند عالی است. هر آنچه را که در یک Docker Container نیاز دارید را شامل می‌شود: سرور ایمیل با پشتیبانی از DKIM، آنتی ویروس و نظارت بر هرزنامه، webmail و ActiveSync با SOGo، و مدیریت مبتنی بر وب با پشتیبانی 2FA. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute }
@@ -406,17 +372,13 @@ Notable free features: برای یک رویکرد دستی‌تر، این دو مقاله را انتخاب کرده‌ایم: -- [راه اندازی سرور ایمیل با OpenSMTPD ،Dovecot و Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (سال ۲۰۱۹) -- [چگونه سرور ایمیل خود را اجرا کنید](https://www.c0ffee.net/blog/mail-server-guide/) (اوت 2017) - - +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## معیار **Please note we are not affiliated with any of the providers we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements for any Email provider wishing to be recommended, including implementing industry best practices, modern technology and more. We suggest you familiarize yourself with this list before choosing an Email provider, and conduct your own research to ensure the Email provider you choose is the right choice for you. - - ### فناوری We regard these features as important in order to provide a safe and optimal service. You should consider whether the provider which has the features you require. @@ -424,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **حداقل شرایط صلاحیت:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -435,12 +397,10 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. - - ### حریم خصوصی We prefer our recommended providers to collect as little data as possible. @@ -456,8 +416,6 @@ We prefer our recommended providers to collect as little data as possible. - Accepts [anonymous payment options](advanced/payments.md) ([cryptocurrency](cryptocurrency.md), cash, gift cards, etc.) - Hosted in a jurisdiction with strong email privacy protection laws. - - ### Security Email servers deal with a lot of very sensitive data. We expect that providers will adopt best industry practices in order to protect their members. @@ -467,16 +425,16 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. -- Website security standards such as: - - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) +- Website security standards such as: + - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) - [Subresource Integrity](https://en.wikipedia.org/wiki/Subresource_Integrity) if loading things from external domains. - Must support viewing of [Message headers](https://en.wikipedia.org/wiki/Email#Message_header), as it is a crucial forensic feature to determine if an email is a phishing attempt. @@ -486,11 +444,9 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - [DNS Certification Authority Authorization (CAA) Resource Record](https://tools.ietf.org/html/rfc6844) in addition to DANE support. - Implementation of [Authenticated Received Chain (ARC)](https://en.wikipedia.org/wiki/Authenticated_Received_Chain), this is useful for people who post to mailing lists [RFC8617](https://tools.ietf.org/html/rfc8617). - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. -- Website security standards such as: - - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) - - +- Website security standards such as: + - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### اعتماد @@ -505,8 +461,6 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - رهبری قابل رویت عمومی. - گزارش‌های شفافیت متناوب. - - ### تبلیغات و بازاریابی با ارائه‌دهندگان ایمیلی که ما توصیه می‌کنیم، ما علاقه‌مند به بازاریابی مسئولانه هستیم. @@ -519,16 +473,14 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Claims of "unbreakable encryption." Encryption should be used with the intention that it may not be secret in the future when the technology exists to crack it. - Making guarantees of protecting anonymity 100%. When someone makes a claim that something is 100% it means there is no certainty for failure. We know people can quite easily deanonymize themselves in a number of ways, e.g.: - - - Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.) + + - Reusing personal information e.g. (email accounts, unique pseudonyms, etc.) that they accessed without anonymity software (Tor, VPN, etc.) - [Browser fingerprinting](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint) **Best Case:** - Clear and easy to read documentation. This includes things like, setting up 2FA, email clients, OpenPGP, etc. - - ### قابلیت‌های اضافی با اینکه این موارد الزامی نیستند، اما در انتخاب ارائه‌دهندگانی که توصیه ‌می‌کنیم، به عواملی مانند راحتی و حفظ حریم خصوصی نیز توجه می‌کنیم. diff --git a/i18n/fa/encryption.md b/i18n/fa/encryption.md index d774167a..aa3ee158 100644 --- a/i18n/fa/encryption.md +++ b/i18n/fa/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/fa/file-sharing.md b/i18n/fa/file-sharing.md index d7cd5832..f6732765 100644 --- a/i18n/fa/file-sharing.md +++ b/i18n/fa/file-sharing.md @@ -15,7 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/fa/financial-services.md b/i18n/fa/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/fa/financial-services.md +++ b/i18n/fa/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/fa/frontends.md b/i18n/fa/frontends.md index 01d5ea76..1769b24a 100644 --- a/i18n/fa/frontends.md +++ b/i18n/fa/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/fa/index.md b/i18n/fa/index.md index 59de05ad..a2ad124e 100644 --- a/i18n/fa/index.md +++ b/i18n/fa/index.md @@ -62,12 +62,12 @@ schema: ## ما به کمک شما نیاز داریم! اینطوری می‌توانید مشارکت کنید: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="به انجمن ما بپیوندید" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="ما را در Mastodon دنبال کنید" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="مشارکت در این وبسایت" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="به ترجمه این وبسایت کمک کنید" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="با ما در Matrix چت کنید" } -[:material-information-outline:](about/index.md){ title="درباره ما بیشتر بدانید" } -[:material-hand-coin-outline:](about/donate.md){ title="حمایت از پروژه" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } برای یک وبسایت مانند Privacy Guides، مهم است که همواره به‌روز باشد. ما نیاز داریم که مخاطبانمان به بروزرسانی‌های نرم‌افزاری برای برنامه‌های لیست شده در وبسایت‌‌، دقت کنند و اخبار جدید مربوط به ارائه‌دهندگانی که ما توصیه می‌کنیم را دنبال کنند. سخت است با سرعت بالای اینترنت هماهنگ شد، اما ما تلاش خود را بهترین شکل ممکن انجام می‌دهیم. اگر خطایی را مشاهده کردید، فکر می‌کنید که یک ارائه‌دهنده باید در لیست وجود نداشته باشد، یا متوجه شدید که یک ارائه‌دهنده متخصص حذف شده است، باور دارید که یک افزونه مرورگر دیگر بهترین انتخاب نیست یا هر مشکل دیگری را کشف کردید، لطفاً به ما اطلاع دهید. diff --git a/i18n/fa/kb-archive.md b/i18n/fa/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/fa/kb-archive.md +++ b/i18n/fa/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/fa/meta/admonitions.md b/i18n/fa/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/fa/meta/admonitions.md +++ b/i18n/fa/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/fa/meta/translations.md b/i18n/fa/meta/translations.md index bba371fd..fda60cbf 100644 --- a/i18n/fa/meta/translations.md +++ b/i18n/fa/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin مستندات خوبی دارد و پیشنهاد می کنیم [راهنمای شروع](https://support.crowdin.com/crowdin-intro/) را مطالعه کنید. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ For examples like the above admonitions, quotation marks, e.g.: `" "` must be us - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/fa/meta/uploading-images.md b/i18n/fa/meta/uploading-images.md index 7d83f813..8718a7ea 100644 --- a/i18n/fa/meta/uploading-images.md +++ b/i18n/fa/meta/uploading-images.md @@ -17,7 +17,7 @@ title: بارگذاری تصویر ### PNG -برای بهینه‌سازی تصویر PNG از [OptiPNG](https://sourceforge.net/projects/optipng/) استفاده کنید: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/fa/meta/writing-style.md b/i18n/fa/meta/writing-style.md index 01d2e3f6..848302c5 100644 --- a/i18n/fa/meta/writing-style.md +++ b/i18n/fa/meta/writing-style.md @@ -4,11 +4,11 @@ title: سبک نوشتن وبسایت Privacy Guides به زبان انگلیسی با لهجه امریکایی نوشته شده است و وقتی شک دارید باید به [دستورالعمل‌های سبک نوشتن APA](https://apastyle.apa.org/style-grammar-guidelines/grammar) مراجعه کنید. -به طور کلی [دستورالعمل‌های زبان ساده فدرال ایالات متحده (United States federal plain language guidelines)](https://www.plainlanguage.gov/guidelines/)، نمای کلی خوبی از نحوه نوشتن واضح و مختصر ارائه می‌دهند. در زیر به چند نکته مهم از این دستورالعمل ها اشاره می کنیم. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. در زیر به چند نکته مهم از این دستورالعمل ها اشاره می کنیم. ## برای مخاطبانمان می نویسیم -[مخاطب](https://www.plainlanguage.gov/guidelines/audience/) مورد نظر Privacy Guides، در درجه اول و فناوری‌های مورد استفاده روزمره بزرگسالان است. به گونه‌ای که گویی در حال خطاب به یک کلاس راهنمایی هستید، محتوا را بی‌حس نکنید، اما از اصطلاحات پیچیده درباره مفاهیمی که کاربران معمولی کامپیوتر با آن‌ها آشنا نیستند، بیش از حد استفاده نکنید. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. به گونه‌ای که گویی در حال خطاب به یک کلاس راهنمایی هستید، محتوا را بی‌حس نکنید، اما از اصطلاحات پیچیده درباره مفاهیمی که کاربران معمولی کامپیوتر با آن‌ها آشنا نیستند، بیش از حد استفاده نکنید. ### فقط درباره آنچه مخاطب میخواهند بدانند توضیح دهید @@ -24,7 +24,7 @@ title: سبک نوشتن > > هنگامی که از "شما" برای خطاب به کاربران استفاده می کنید، آنها بیشتر متوجه می شوند که مسئولیت آنها چیست. -منبع: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### اجتناب از "کاربران" @@ -37,7 +37,7 @@ title: سبک نوشتن - هر متن بیشتر از پنج یا شش بخش نشود. اسناد طولانی بهتر است به صفحات جداگانه تقسیم شوند. - مطالب مهم را **بولد** کنید یا *با حروف کج بنویسید*. -منبع: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### با یک جمله موضوعی شروع کنید @@ -45,7 +45,7 @@ title: سبک نوشتن > > ما اغلب به روشی که فکر می کنیم می‌نویسیم، ابتدا مقدمات و سپس نتیجه گیری خود را می‌نویسیم. ممکن است این روش طبیعی برای پرورش افکار باشد، اما ما با جمله موضوعی در پایان پاراگراف پایان می دهیم. جمله‌ها را به جلو ببرید و به کاربران اطلاع دهید که هدفتان چیست. خواننده را مجبور نکنید قبل از رسیدن به اصل مطلب، اطلاعات زیادی را در ذهن خود نگه دارند. -منبع: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## کلمات خود را با دقت انتخاب کنید @@ -65,7 +65,7 @@ title: سبک نوشتن > کلمات غیر ضروری وقت مخاطب شما را تلف می کند. یک نوشته خوب مثل یک مکالمه است. اطلاعاتی را که مخاطب نیازی به دانستن آنها ندارد حذف کنید. این می تواند به عنوان یک متخصص در موضوع دشوار باشد، بنابراین مهم است که به اطلاعات از دیدگاه مخاطب نگاه کنید. -منبع: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## متن به صورت مکالمه نگه دارید @@ -77,7 +77,7 @@ title: سبک نوشتن > صدای فعال مشخص می کند که چه کسی قرار است چه کاری انجام دهد. ابهام در مورد مسئولیت ها را از بین می برد. نه «باید انجام شود»، بلکه «تو باید انجامش دهی». -منبع: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### برای الزامات از "باید" استفاده کنید diff --git a/i18n/fa/mobile-browsers.md b/i18n/fa/mobile-browsers.md index e2e9b5dc..f73d5381 100644 --- a/i18n/fa/mobile-browsers.md +++ b/i18n/fa/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ These are our currently recommended mobile web browsers and configurations for s ## Android -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/fa/multi-factor-authentication.md b/i18n/fa/multi-factor-authentication.md index 830c33c8..ee60af63 100644 --- a/i18n/fa/multi-factor-authentication.md +++ b/i18n/fa/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/fa/news-aggregators.md b/i18n/fa/news-aggregators.md index 17438718..00b22c26 100644 --- a/i18n/fa/news-aggregators.md +++ b/i18n/fa/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/fa/notebooks.md b/i18n/fa/notebooks.md index d68f8c03..4895337d 100644 --- a/i18n/fa/notebooks.md +++ b/i18n/fa/notebooks.md @@ -32,7 +32,7 @@ cover: notebooks.webp - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -44,11 +44,11 @@ cover: notebooks.webp ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -56,12 +56,12 @@ cover: notebooks.webp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -78,22 +78,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -135,7 +135,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/fa/os/android-overview.md b/i18n/fa/os/android-overview.md index 1ffa3cdc..f866b6cb 100644 --- a/i18n/fa/os/android-overview.md +++ b/i18n/fa/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/fa/os/ios-overview.md b/i18n/fa/os/ios-overview.md index fc21c954..1f304940 100644 --- a/i18n/fa/os/ios-overview.md +++ b/i18n/fa/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/fa/os/linux-overview.md b/i18n/fa/os/linux-overview.md index 7b121d9e..a1d14d3d 100644 --- a/i18n/fa/os/linux-overview.md +++ b/i18n/fa/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## توصیه‌های عمومی @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/fa/os/macos-overview.md b/i18n/fa/os/macos-overview.md index e2d0998d..ecfa4eec 100644 --- a/i18n/fa/os/macos-overview.md +++ b/i18n/fa/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## فایرفاکس Firefox Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/fa/os/qubes-overview.md b/i18n/fa/os/qubes-overview.md index c76924d9..fcea270b 100644 --- a/i18n/fa/os/qubes-overview.md +++ b/i18n/fa/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/fa/passwords.md b/i18n/fa/passwords.md index da2b5d77..1514d105 100644 --- a/i18n/fa/passwords.md +++ b/i18n/fa/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/fa/photo-management.md b/i18n/fa/photo-management.md index a041bdcb..1bb46cae 100644 --- a/i18n/fa/photo-management.md +++ b/i18n/fa/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/fa/productivity.md b/i18n/fa/productivity.md index c63e28bb..1612e148 100644 --- a/i18n/fa/productivity.md +++ b/i18n/fa/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/fa/real-time-communication.md b/i18n/fa/real-time-communication.md index bb96b9c2..6a1f7de0 100644 --- a/i18n/fa/real-time-communication.md +++ b/i18n/fa/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/fa/router.md b/i18n/fa/router.md index 870cd79e..a54378c6 100644 --- a/i18n/fa/router.md +++ b/i18n/fa/router.md @@ -35,10 +35,10 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/fa/search-engines.md b/i18n/fa/search-engines.md index 7fc05e18..9ffdbb0b 100644 --- a/i18n/fa/search-engines.md +++ b/i18n/fa/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/fa/tools.md b/i18n/fa/tools.md index e10a0165..3c0afbab 100644 --- a/i18n/fa/tools.md +++ b/i18n/fa/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Learn more :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/fa/tor.md b/i18n/fa/tor.md index 04bc51b7..3c240ddc 100644 --- a/i18n/fa/tor.md +++ b/i18n/fa/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a -The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake does not increase your privacy in any way, nor is it used to connect t Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/fa/vpn.md b/i18n/fa/vpn.md index 7edcbc7c..dc920713 100644 --- a/i18n/fa/vpn.md +++ b/i18n/fa/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria diff --git a/i18n/fr/CODE_OF_CONDUCT.md b/i18n/fr/CODE_OF_CONDUCT.md index 8fdf1732..df0a379b 100644 --- a/i18n/fr/CODE_OF_CONDUCT.md +++ b/i18n/fr/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ Ce que nous attendons des membres de nos communautés : 2. **N'abusez pas de notre volonté d'aider** - Les membres de notre communauté ne sont pas un support technique gratuit. Nous sommes heureux de vous aider sur des étapes spécifiques de votre parcours personnel vers la protection de la vie privée, si vous êtes prêt à faire des efforts. Nous ne sommes pas obligés de répondre à des questions interminables et répétitives, sur des problèmes informatiques généraux résolus par une simple recherche sur Internet. Ne soyez **pas** un [vampire de l'aide](https://slash7.com/2006/12/22/vampires/). + Les membres de notre communauté ne sont pas un support technique gratuit. Nous sommes heureux de vous aider sur des étapes spécifiques de votre parcours personnel vers la protection de la vie privée, si vous êtes prêt à faire des efforts. Nous ne sommes pas obligés de répondre à des questions interminables et répétitives, sur des problèmes informatiques généraux résolus par une simple recherche sur Internet. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Comportez-vous de manière positive et constructive** diff --git a/i18n/fr/about/index.md b/i18n/fr/about/index.md index b59986af..17c12104 100644 --- a/i18n/fr/about/index.md +++ b/i18n/fr/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** est un site web à vocation sociale qui fournit [des informations](/kb) pour protéger la sécurité de vos données et votre vie privée. Notre mission est d'informer le public sur la valeur de la vie privée numérique et sur les initiatives gouvernementales mondiales visant à surveiller votre activité en ligne. Nous sommes un collectif à but non lucratif entièrement géré par des [membres bénévoles de l'équipe](https://discuss.privacyguides.net/g/team) et des contributeurs. Notre site est exempt de publicité et n'est affilié à aucun des fournisseurs cités. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title="Page d'accueil" } -[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Code source" } -[:octicons-heart-16:](donate.md){ .card-link title=Contribuer } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } +[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } +[:octicons-heart-16:](donate.md){ .card-link title=Contribute } > Pour trouver des applications [alternatives axées sur la protection de la vie privée], consultez des sites tels que Good Reports et **Privacy Guides**, qui répertorient les applications axées sur la protection de la vie privée dans diverses catégories, notamment les fournisseurs de courrier électronique (généralement payants) qui ne sont pas gérés par les grands géants du web. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) [Traduit de l'anglais] +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > Si vous êtes à la recherche d'un nouveau VPN, vous pouvez consulter le code de réduction d'à peu près tous les podcasts. Si vous cherchez un **bon** VPN, vous avez besoin d'une aide professionnelle. Il en va de même pour les clients de messagerie, les navigateurs, les systèmes d'exploitation et les gestionnaires de mots de passe. Comment savoir laquelle de ces options est la meilleure, la plus respectueuse de la vie privée ? Pour cela, il existe **Privacy Guides**, une plateforme sur laquelle un certain nombre de bénévoles recherchent jour après jour les meilleurs outils respectueux de la vie privée à utiliser sur internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Traduit du néerlandais] -Également présenté sur : [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), et [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## Histoire @@ -41,7 +41,7 @@ Privacy Guides a été lancé en septembre 2021 dans le prolongement du projet En 2022, nous avons achevé la transition de l'environnement de site web principal de Jekyll à MkDocs, en utilisant le logiciel de documentation `mkdocs-material`. Ce changement a rendu les contributions open source à notre site considérablement plus facile pour les personnes extérieures, parce qu'au lieu d'avoir besoin de connaître une syntaxe complexe pour écrire des messages efficacement, contribuer est maintenant aussi simple que d'écrire un document Markdown standard. -Nous avons également lancé notre nouveau forum de discussion sur [discuss.privacyguides.net](https://discuss.privacyguides.net/) comme plateforme communautaire pour partager des idées et poser des questions sur notre mission. Cela complète notre communauté existante sur Matrix et remplace notre précédente plate-forme de Discussions GitHub, réduisant ainsi notre dépendance aux plateformes de discussion propriétaires. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. Cela complète notre communauté existante sur Matrix et remplace notre précédente plate-forme de Discussions GitHub, réduisant ainsi notre dépendance aux plateformes de discussion propriétaires. Jusqu'à présent en 2023, nous avons lancé des traductions internationales de notre site en [français](/fr/), [hébreu](/he/), et [néerlandais](/nl/), et d'autres langues sont à venir, rendu possible par notre excellente équipe de traduction sur [Crowdin](https://crowdin.com/project/privacyguides). Nous avons l'intention de poursuivre notre mission de sensibilisation et d'éducation, et trouver des moyens de mieux mettre en évidence les dangers d'un manque de sensibilisation à la protection de la vie privée à l'ère numérique moderne, et la prévalence et les conséquences des failles de sécurité dans l'industrie de la technologie. diff --git a/i18n/fr/about/notices.md b/i18n/fr/about/notices.md index 3457eb2d..98ed6542 100644 --- a/i18n/fr/about/notices.md +++ b/i18n/fr/about/notices.md @@ -29,7 +29,7 @@ Cela n'inclut pas le code tiers intégré dans ce dépôt, ou le code pour leque Cela signifie que vous pouvez utiliser le contenu lisible par l'homme de ce dépôt pour votre propre projet, conformément aux conditions décrites dans le texte de la license publique Creative Commons Attribution - Pas de Modification 4.0 International. Vous pouvez le faire de toute manière raisonnable, mais pas d'une manière qui suggère que Privacy Guides vous approuve ou approuve votre utilisation. Vous **ne pouvez pas** utiliser la marque Privacy Guides dans votre propre projet sans l'approbation expresse de ce projet. Les marques déposées de Privacy Guides comprennent l'appellation "Privacy Guides" ainsi que le logo de bouclier. -Nous estimons que les logos et autres images des `actifs` obtenus auprès de fournisseurs tiers sont soit du domaine public, soit **d'un usage raisonnable**. En résumé, la [doctrine d'usage raisonnable](https://fr.wikipedia.org/wiki/Fair_use) permet l'utilisation d'images protégées par le droit d'auteur afin d'identifier le sujet à des fins de commentaire public. Toutefois, ces logos et autres images peuvent encore être soumis aux lois sur les marques commerciales dans une ou plusieurs juridictions. Avant d'utiliser ce contenu, veuillez vous assurer qu'il est utilisé pour identifier l'entité ou l'organisation propriétaire de la marque et que vous avez le droit de l'utiliser en vertu des lois applicables dans les circonstances de votre utilisation prévue. *Lorsque vous copiez le contenu de ce site web, vous êtes seul responsable de vous assurer que vous ne violez pas la marque ou le droit d'auteur de quelqu'un d'autre.* +Nous estimons que les logos et autres images des `actifs` obtenus auprès de fournisseurs tiers sont soit du domaine public, soit **d'un usage raisonnable**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. Toutefois, ces logos et autres images peuvent encore être soumis aux lois sur les marques commerciales dans une ou plusieurs juridictions. Avant d'utiliser ce contenu, veuillez vous assurer qu'il est utilisé pour identifier l'entité ou l'organisation propriétaire de la marque et que vous avez le droit de l'utiliser en vertu des lois applicables dans les circonstances de votre utilisation prévue. *Lorsque vous copiez le contenu de ce site web, vous êtes seul responsable de vous assurer que vous ne violez pas la marque ou le droit d'auteur de quelqu'un d'autre.* Lorsque vous contribuez à notre site web, vous le faites dans le cadre des licences susmentionnées et vous accordez à Privacy Guides une licence perpétuelle, mondiale, non exclusive, transférable, libre de redevances et irrévocable, avec le droit d'accorder une sous-licence à plusieurs niveaux de sous-licenciés, pour reproduire, modifier, afficher, exécuter et distribuer votre contribution dans le cadre de notre projet. @@ -47,4 +47,4 @@ Vous ne devez pas mener d'activités de collecte de données systématiques ou a --- -*Certaines parties de cet avis ont été reprises du projet [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) sur GitHub. Cette ressource et cette page elle-même sont publiées sous [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Certaines parties de cet avis ont été reprises du projet [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) sur GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/fr/about/privacytools.md b/i18n/fr/about/privacytools.md index 045ddf90..ff23f015 100644 --- a/i18n/fr/about/privacytools.md +++ b/i18n/fr/about/privacytools.md @@ -14,13 +14,13 @@ Une fois le déménagement terminé, le fondateur de PrivacyTools est revenu et PrivacyTools a été créé en 2015 par "BurungHantu", qui voulait faire une ressource d'information sur la vie privée - des outils utiles suite aux révélations de Snowden. Le site est devenu un projet open-source florissant avec [de nombreux contributeurs](https://github.com/privacytools/privacytools.io/graphs/contributors), dont certains se sont vus confier diverses responsabilités organisationnelles, telles que l'exploitation de services en ligne comme Matrix et Mastodon, la gestion et l'examen des modifications apportées au site sur GitHub, la recherche de sponsors pour le projet, la rédaction d'articles de blog et l'exploitation de plateformes de sensibilisation aux médias sociaux comme Twitter, etc. -À partir de 2019, BurungHantu s'est éloigné de plus en plus du développement actif du site web et des communautés, et a commencé à retarder les paiements dont il était responsable liés aux serveurs que nous exploitions. Pour éviter que notre administrateur système ne paie les coûts du serveur de sa propre poche, nous avons changé les méthodes de don indiquées sur le site, passant des comptes PayPal et crypto personnels de BurungHantu à une nouvelle page OpenCollective sur [31 octobre 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). Cela avait pour avantage de rendre nos finances totalement transparentes, une valeur à laquelle nous croyons fermement, et déductibles des impôts aux États-Unis, car elles étaient détenues par l'Open Collective Foundation 501(c)3. Ce changement a été accepté à l'unanimité par l'équipe et n'a pas été contesté. +À partir de 2019, BurungHantu s'est éloigné de plus en plus du développement actif du site web et des communautés, et a commencé à retarder les paiements dont il était responsable liés aux serveurs que nous exploitions. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). Cela avait pour avantage de rendre nos finances totalement transparentes, une valeur à laquelle nous croyons fermement, et déductibles des impôts aux États-Unis, car elles étaient détenues par l'Open Collective Foundation 501(c)3. Ce changement a été accepté à l'unanimité par l'équipe et n'a pas été contesté. ## Pourquoi nous sommes passés à autre chose En 2020, l'absence de BurungHantu s'est considérablement accentuée. À un moment, nous avons demandé que les serveurs de noms du domaine soient remplacés par des serveurs de noms contrôlés par notre administrateur système afin d'éviter toute perturbation future, et ce changement n'a été effectué que plus d'un mois après la demande initiale. Il disparaissait du chat public et des salles de chat privées de l'équipe sur Matrix pendant des mois, faisant occasionnellement une apparition pour donner un petit feedback ou promettre d'être plus actif avant de disparaître à nouveau. -En octobre 2020, l'administrateur système de PrivacyTools (Jonah) [a quitté](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) le projet en raison de ces difficultés, cédant le contrôle à un autre contributeur de longue date. Jonah a opéré presque tous les services de PrivacyTools et a agi comme le chef de projet *de facto* pour le développement du site web en l'absence de BurungHantu, donc son départ a été un changement significatif pour l'organisation. À l'époque, en raison de ces changements organisationnels importants, BurungHantu a promis à l'équipe restante qu'il reviendrait prendre le contrôle du projet à l'avenir. ==L'équipe PrivacyTools l'a contacté via plusieurs méthodes de communication au cours des mois suivants, mais n'a reçu aucune réponse.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah a opéré presque tous les services de PrivacyTools et a agi comme le chef de projet *de facto* pour le développement du site web en l'absence de BurungHantu, donc son départ a été un changement significatif pour l'organisation. À l'époque, en raison de ces changements organisationnels importants, BurungHantu a promis à l'équipe restante qu'il reviendrait prendre le contrôle du projet à l'avenir. ==L'équipe PrivacyTools l'a contacté via plusieurs méthodes de communication au cours des mois suivants, mais n'a reçu aucune réponse.== ## Dépendance des noms de domaine @@ -34,25 +34,25 @@ Sans contact avec BurungHantu, nous avons décidé que le meilleur plan d'action ## Appel à l'action de la communauté -Fin juillet 2021, nous avons informé [ la communauté](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) PrivacyTools de notre intention de choisir un nouveau nom et de poursuivre le projet sur un nouveau domaine, qui sera [choisi](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) le 2 août 2022. En fin de compte, "Privacy Guides" a été choisi, avec le domaine `privacyguides.org` déjà détenu par Jonah pour un projet secondaire de 2020 qui n'a pas été développé. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. En fin de compte, "Privacy Guides" a été choisi, avec le domaine `privacyguides.org` déjà détenu par Jonah pour un projet secondaire de 2020 qui n'a pas été développé. ## Contrôle de r/privacytoolsIO -En même temps que les problèmes du site privacytools.io, l'équipe de modération de r/privacytoolsIO était confrontée à des difficultés pour gérer le subreddit. Le subreddit a toujours été géré de manière indépendante du développement du site Web, mais BurungHantu en était également le principal modérateur, et il était le seul modérateur à bénéficier des privilèges de "contrôle total". u/trai_dep était le seul modérateur actif à l'époque, et [a posté](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) une demande aux administrateurs de Reddit le 28 juin 2021, demandant qu'on lui accorde le poste de modérateur principal et tous les privilèges de contrôle, afin d'apporter les changements nécessaires au Subreddit. +En même temps que les problèmes du site privacytools.io, l'équipe de modération de r/privacytoolsIO était confrontée à des difficultés pour gérer le subreddit. Le subreddit a toujours été géré de manière indépendante du développement du site Web, mais BurungHantu en était également le principal modérateur, et il était le seul modérateur à bénéficier des privilèges de "contrôle total". u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit exige que les subreddits aient des modérateurs actifs. Si le modérateur principal est inactif pendant une longue période (par exemple un an), le poste de modérateur principal peut être réattribué au modérateur suivant. Pour que cette demande ait été accordée, BurungHantu devait avoir été complètement absent de toute activité Reddit pendant une longue période, ce qui était cohérent avec ses comportements sur d'autres plateformes. > Si vous avez été retiré en tant que modérateur d'un sous-rédit via la demande Reddit, c'est parce que votre manque de réponse et votre manque d'activité ont qualifié le sous-rédit pour un transfert de r/redditrequest. > -> r/redditrequest est le moyen utilisé par Reddit pour s'assurer que les communautés ont des modérateurs actifs et fait partie du [code de conduite des modérateurs](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Début de la transition -Le 14 septembre 2021, nous [avons annoncé](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) le début de notre migration vers ce nouveau domaine : +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] nous avons jugé nécessaire d'effectuer ce changement plus tôt que prévu afin que les gens soient informés de cette transition le plus tôt possible. Cela nous laisse suffisamment de temps pour effectuer la transition du nom de domaine, qui est actuellement redirigé vers www.privacyguides.org, et nous espérons que tout le monde aura le temps de remarquer le changement, de mettre à jour les signets et les sites web, etc. -Ce changement [a entraîné :](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirection de www.privacytools.io vers [www.privacyguides.org](https://www.privacyguides.org). - Archiver le code source sur GitHub pour préserver notre travail passé et le suivi de tickets, que nous avons continué à utiliser pendant des mois de développement futur de ce site. @@ -63,11 +63,11 @@ Les choses semblaient se dérouler sans problème, et la plupart de notre commun ## Événements suivants -Environ une semaine après la transition, BurungHantu est revenu en ligne pour la première fois depuis près d'un an, mais personne dans notre équipe n'était prêt à revenir à PrivacyTools en raison de son manque de fiabilité historique. Au lieu de s'excuser de son absence prolongée, il est immédiatement passé à l'offensive et a présenté le passage à Privacy Guides comme une attaque contre lui et son projet. Il a ensuite [supprimé](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) nombre de ces messages lorsque la communauté lui a fait remarquer qu'il avait été absent et avait abandonné le projet. +Environ une semaine après la transition, BurungHantu est revenu en ligne pour la première fois depuis près d'un an, mais personne dans notre équipe n'était prêt à revenir à PrivacyTools en raison de son manque de fiabilité historique. Au lieu de s'excuser de son absence prolongée, il est immédiatement passé à l'offensive et a présenté le passage à Privacy Guides comme une attaque contre lui et son projet. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. À ce stade, BurungHantu a déclaré qu'il voulait continuer à travailler sur privacytools.io par lui-même et a demandé que nous supprimions la redirection de www.privacytools.io vers [www.privacyguides.org](https://www.privacyguides.org). Nous avons accepté et lui avons demandé de garder les sous-domaines de Matrix, Mastodon et PeerTube actifs pour que nous les gérions comme un service public pour notre communauté pendant au moins quelques mois, afin de permettre aux utilisateurs de ces plateformes de migrer facilement vers d'autres comptes. En raison de la nature fédérée des services que nous fournissions, ils étaient liés à des noms de domaine spécifiques, ce qui rendait la migration très difficile (et dans certains cas impossible). -Malheureusement, parce que le contrôle du sous-breddit r/privacytoolsIO n'a pas été retourné à BurungHantu à sa demande (plus d'informations ci-dessous), ces sous-domaines ont été [coupés](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) au début d'octobre, mettant fin à toute possibilité de migration vers les utilisateurs utilisant toujours ces services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Suite à cela, BurungHantu a lancé de fausses accusations selon lesquelles Jonah aurait volé les dons du projet. BurungHantu avait plus d'un an depuis l'incident présumé pour informer la communauté, et pourtant, il n'en a informé personne avant la migration vers Privacy Guides. L'équipe [et la communauté](https://twitter.com/TommyTran732/status/1526153536962281474)ont demandé à plusieurs reprises à BurungHantu de fournir des preuves et de s'expliquer sur la raison de son silence, mais il ne l'a pas fait. @@ -77,11 +77,11 @@ BurungHantu a également publié [un message sur Twitter](https://twitter.com/pr Depuis le 25 septembre 2022, nous voyons les plans de BurungHantu se dessiner sur privacytools.io, et c'est la raison pour laquelle nous avons décidé de créer cette page explicative aujourd'hui. Le site qu'il exploite semble être une version fortement optimisée pour le référencement du site qui recommande des outils en échange d'une compensation financière. Très récemment, IVPN et Mullvad, deux fournisseurs de VPN presque universellement [recommandés](../vpn.md) par la communauté de la protection de la vie privée et remarquables pour leur position contre les programmes d'affiliation ont été retirés de PrivacyTools. A leur place ? NordVPN, Surfshark, ExpressVPN, et hide.me; Des géantes sociétés de VPN avec des plateformes et des pratiques commerciales peu fiables, connues pour leur marketing agressif et leurs programmes d'affiliation. -==**PrivacyTools est devenu exactement le type de site contre lequel nous [avons mis en garde](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) sur le blog PrivacyTools en 2019.**== Nous avons essayé de garder notre distance avec PrivacyTools depuis la transition, mais leur harcèlement continu à l'égard de notre projet et maintenant leur abus absurde de la crédibilité que leur marque a gagné depuis plus de 6 ans de contributions open source est extrêmement troublant à nos yeux. Ceux d'entre nous qui luttent vraiment pour la protection de la vie privée ne se battent pas les uns contre les autres et ne reçoivent pas nos conseils des plus offrant. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Ceux d'entre nous qui luttent vraiment pour la protection de la vie privée ne se battent pas les uns contre les autres et ne reçoivent pas nos conseils des plus offrant. ## r/privacytoolsIO maintenant -Après le lancement de [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), il n'était pas pratique pour u/trai_dep de continuer à modérer les deux subreddits, et avec l'adhésion de la communauté à la transition, r/privacytoolsIO a été [transformé en](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) en un subreddit restreint dans un post du 1er novembre 2021 : +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] La croissance de ce sous-reddit a été le résultat de grands efforts, sur plusieurs années, par l'équipe PrivacyGuides.org. Et par chacun d'entre vous. > @@ -89,7 +89,7 @@ Après le lancement de [r/PrivacyGuides](https://www.reddit.com/r/privacyguides) Les sous-reddits n'appartiennent à personne, et ils n'appartiennent surtout pas aux détenteurs de marques. Ils appartiennent à leurs communautés, et la communauté et ses modérateurs ont pris la décision de soutenir le déplacement vers r/PrivacyGuides. -Dans les mois qui ont suivi, BurungHantu a menacé et supplié de rendre le contrôle du subreddit à son compte, en violation des [règles](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) de Reddit : +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Les représailles d'un modérateur à l'égard des demandes de suppression sont interdites. @@ -107,12 +107,12 @@ Ainsi, les fonds dans OpenCollective appartiennent à Privacy Guides, ils ont é Ce sujet a fait l'objet de nombreuses discussions au sein de nos communautés à divers endroits, et il est probable que la plupart des personnes qui lisent cette page connaissent déjà les événements qui ont conduit au passage aux guides de confidentialité. Certains de nos précédents billets sur le sujet peuvent contenir des détails supplémentaires que nous avons omis ici par souci de brièveté. Ils ont été mis en lien ci-dessous dans un souci d'exhaustivité. -- [28 juin 2021 demande de contrôle de r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [27 juillet 2021 : annonce de nos intentions de déménager sur le blog PrivacyTools, écrite par l'équipe](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [13 septembre 2021 : annonce du début de notre transition vers Privacy Guides sur r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [28 juin 2021 demande de contrôle de r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [27 juillet 2021 : annonce de nos intentions de déménager sur le blog PrivacyTools, écrite par l'équipe](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [13 septembre 2021 : annonce du début de notre transition vers Privacy Guides sur r/privacytoolsIO](https://reddit.com/pnql46) - [Annonce du 17 septembre 2021 sur OpenCollective par Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [30 septembre 2021 Fil Twitter détaillant la plupart des événements décrits sur cette page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [1er octobre 2021, publication de u/dng99 constatant un échec du sous-domaine](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [2 avr 2022 réponse de u/dng99 à l'article de blog accusatoire de PrivacyTools](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [1er octobre 2021, publication de u/dng99 constatant un échec du sous-domaine](https://reddit.com/comments/pymthv/comment/hexwrps) +- [2 avr 2022 réponse de u/dng99 à l'article de blog accusatoire de PrivacyTools](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [16 mai 2022 réponse de @TommyTran732 sur Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post sur le forum de Techlore par @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/fr/advanced/communication-network-types.md b/i18n/fr/advanced/communication-network-types.md index 7f890710..dbd0f281 100644 --- a/i18n/fr/advanced/communication-network-types.md +++ b/i18n/fr/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Certaines messageries auto-hébergées vous permettent de configurer votre propr - Peut inclure des [restrictions de contrôle ou d'accès](https://drewdevault.com/2018/08/08/Signal.html). Cela peut inclure des choses telles que : - Être [interdit de connecter des clients tiers](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) au réseau centralisé, ce qui pourrait permettre une plus grande personnalisation ou une meilleure expérience. Ces modalités sont souvent définies dans les conditions d'utilisation. - Documentation insuffisante ou inexistante pour les développeurs tiers. -- La [propriété](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), la politique de confidentialité et les opérations du service peuvent changer facilement lorsqu'une seule entité le contrôle, ce qui peut compromettre le service par la suite. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - L'auto-hébergement demande des efforts et des connaissances sur la manière de mettre en place un service. ## Réseaux Fédérés @@ -60,7 +60,7 @@ Lorsqu'ils sont auto-hébergés, les membres d'un serveur fédéré peuvent déc Les messageries P2P se connectent à un [réseau distribué](https://fr.wikipedia.org/wiki/Réseau_distribué) de nœuds pour relayer un message au destinataire sans serveur tiers. -Les clients (les pairs) se trouvent généralement les uns les autres grâce à l'utilisation d'un réseau de [calcul distribué](https://fr.wikipedia.org/wiki/Calcul_distribué). Citons par exemple les [Tables de Hachages Distribuées](https://fr.wikipedia.org/wiki/Table_de_hachage_distribuée) (THD), utilisées par les [Torrents](https://fr.wikipedia.org/wiki/BitTorrent) et [l'IPFS](https://fr.wikipedia.org/wiki/InterPlanetary_File_System). Une autre approche est celle des réseaux basés sur la proximité, où une connexion est établie par Wi-Fi ou Bluetooth (par exemple Briar ou le protocole de réseau social [Scuttlebutt](https://www.scuttlebutt.nz)). +Les clients (les pairs) se trouvent généralement les uns les autres grâce à l'utilisation d'un réseau de [calcul distribué](https://fr.wikipedia.org/wiki/Calcul_distribué). Citons par exemple les [Tables de Hachages Distribuées](https://fr.wikipedia.org/wiki/Table_de_hachage_distribuée) (THD), utilisées par les [Torrents](https://fr.wikipedia.org/wiki/BitTorrent) et [l'IPFS](https://fr.wikipedia.org/wiki/InterPlanetary_File_System). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Lorsqu'un pair a trouvé une route vers son contact par l'une de ces méthodes, une connexion directe est établie entre eux. Bien que les messages soient généralement chiffrés, un observateur peut toujours déduire l'emplacement et l'identité de l'expéditeur et du destinataire. diff --git a/i18n/fr/advanced/dns-overview.md b/i18n/fr/advanced/dns-overview.md index d6b75f6a..0e87cca9 100644 --- a/i18n/fr/advanced/dns-overview.md +++ b/i18n/fr/advanced/dns-overview.md @@ -18,7 +18,7 @@ Ci-dessous, nous discutons et fournissons un tutoriel pour prouver ce qu'un obse ### DNS non chiffré -1. En utilisant [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (qui fait partie du projet [Wireshark](https://fr. wikipedia. org/wiki/Wireshark)), nous pouvons surveiller et enregistrer le flux de paquets Internet. Cette commande enregistre les paquets qui répondent aux règles spécifiées : +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. Cette commande enregistre les paquets qui répondent aux règles spécifiées : ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Ci-dessous, nous discutons et fournissons un tutoriel pour prouver ce qu'un obse nslookup privacyguides.org 8.8.8.8 ``` -3. Ensuite, nous voulons [ analyser](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) les résultats : +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Un DNS chiffré peut faire référence à un certain nombre de protocoles, les p ### DNS sur TLS (DoT) -[**DNS sur TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) est une autre méthode de chiffrement des communications DNS qui est définie dans [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). La prise en charge a été implémentée pour la première fois dans Android 9, iOS 14, et sur Linux dans [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) dans la version 237. Ces dernières années, la préférence du secteur s'est déplacée de DoT vers DoH, car DoT est un protocole complexe [](https://dnscrypt.info/faq/) et sa conformité au RFC varie selon les implémentations existantes. Le DoT fonctionne également sur un port dédié 853 qui peut être facilement bloqué par des pare-feu restrictifs. +[**DNS sur TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) est une autre méthode de chiffrement des communications DNS qui est définie dans [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. Le DoT fonctionne également sur un port dédié 853 qui peut être facilement bloqué par des pare-feu restrictifs. ### DNS sur HTTPS (DoH) @@ -106,7 +106,7 @@ Dans cet exemple, nous allons enregistrer ce qui se passe lorsque nous faisons u wireshark -r /tmp/dns_doh.pcap ``` -Nous pouvons voir [l'établissement de la connexion](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) et [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) qui se produit avec toute connexion chiffrée. Lorsque l'on regarde les paquets de "données d'application" qui suivent, aucun d'entre eux ne contient le domaine que nous avons demandé ou l'adresse IP renvoyée. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. Lorsque l'on regarde les paquets de "données d'application" qui suivent, aucun d'entre eux ne contient le domaine que nous avons demandé ou l'adresse IP renvoyée. ## Pourquoi **ne devrais-je pas** utiliser un DNS chiffré ? @@ -158,9 +158,9 @@ La Server Name Indication (indication du nom du serveur) est généralement util tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -Cela signifie que même si nous utilisons des serveurs "DNS chiffrés", le domaine sera probablement divulgué par le SNI. Le protocole [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) apporte avec lui [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), qui empêche ce type de fuite. +Cela signifie que même si nous utilisons des serveurs "DNS chiffrés", le domaine sera probablement divulgué par le SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Des gouvernements, en particulier [la Chine](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) et [la Russie](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), ont déjà commencé à [bloquer](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) le protocole ou ont exprimé le souhait de le faire. Récemment, la Russie [a commencé à bloquer les sites web étrangers](https://github.com/net4people/bbs/issues/108) qui utilisent le standard [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3). En effet, le protocole [QUIC](https://fr.wikipedia.org/wiki/QUIC) qui fait partie de HTTP/3 exige que `ClientHello` soit également chiffré. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Récemment, la Russie [a commencé à bloquer les sites web étrangers](https://github.com/net4people/bbs/issues/108) qui utilisent le standard [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3). En effet, le protocole [QUIC](https://fr.wikipedia.org/wiki/QUIC) qui fait partie de HTTP/3 exige que `ClientHello` soit également chiffré. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ Le processus de signature DNSSEC est similaire à celui d'une personne qui signe DNSSEC met en œuvre une politique de signature numérique hiérarchique à travers toutes les couches du DNS. Par exemple, dans le cas d'une consultation de `privacyguides.org`, un serveur DNS racine signe une clé pour le serveur de noms `.org`, et le serveur de noms `.org` signe ensuite une clé pour le serveur de noms faisant autorité `privacyguides.org`. -Adapté de [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) par Google et [DNSSEC : An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) par Cloudflare, tous deux sous licence [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## Qu'est-ce que la minimisation QNAME ? diff --git a/i18n/fr/advanced/payments.md b/i18n/fr/advanced/payments.md index 1a8b1578..7a8718f4 100644 --- a/i18n/fr/advanced/payments.md +++ b/i18n/fr/advanced/payments.md @@ -9,7 +9,7 @@ Ce n'est pas pour rien que les données relatives à vos habitudes d'achat sont Pendant des siècles, **l'argent liquide** a été la principale forme de paiement privé. Dans la plupart des cas, l'argent liquide présente d'excellentes caractéristiques de confidentialité, est largement accepté dans la plupart des pays et est **fongible**, ce qui signifie qu'il n'est pas unique et qu'il est totalement interchangeable. -Les lois sur les paiements en espèces varient d'un pays à l'autre. Aux États-Unis, les paiements en espèces supérieurs à 10 000 $ doivent faire l'objet d'une déclaration spéciale à l'IRS sur le [formulaire 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). L'entreprise destinataire est tenue de vérifier l'identité du bénéficiaire (nom, adresse, profession, date de naissance et numéro de sécurité sociale ou autre numéro fiscal), à quelques exceptions près. Des limites inférieures sans pièce d'identité, telles que 3 000 $ ou moins, existent pour les échanges et les transferts de fonds. Les espèces contiennent également des numéros de série. Ces données ne sont presque jamais tracées par les commerçants, mais elles peuvent être utilisées par les services répressifs dans le cadre d'enquêtes ciblées. +Les lois sur les paiements en espèces varient d'un pays à l'autre. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). L'entreprise destinataire est tenue de vérifier l'identité du bénéficiaire (nom, adresse, profession, date de naissance et numéro de sécurité sociale ou autre numéro fiscal), à quelques exceptions près. Des limites inférieures sans pièce d'identité, telles que 3 000 $ ou moins, existent pour les échanges et les transferts de fonds. Les espèces contiennent également des numéros de série. Ces données ne sont presque jamais tracées par les commerçants, mais elles peuvent être utilisées par les services répressifs dans le cadre d'enquêtes ciblées. Malgré cela, c'est généralement la meilleure option. @@ -60,7 +60,7 @@ Il existe un certain nombre de projets de crypto-monnaies qui prétendent assure - [Crypto-monnaies recommandées :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Les crypto-monnaies privées font l'objet d'un examen de plus en plus minutieux de la part des agences gouvernementales. En 2020, [l'IRS a publié une prime de 625 000 $](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) pour des outils qui peuvent briser la confidentialité des transactions du réseau Lightning Bitcoin et/ou de Monero. En fin de compte, ils [ont versé à deux sociétés](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis et Integra Fec) un montant combiné de 1,25 million $ pour des outils qui prétendent le faire (on ne sait pas quel réseau de crypto-monnaies ces outils ciblent). En raison du secret qui entoure ce type d'outils, ==aucune de ces méthodes de traçage des crypto-monnaies n'a été confirmée de manière indépendante.== Cependant, il est tout à fait probable que des outils qui aident les enquêtes ciblées sur les transactions de crypto-monnaies privées existent, et que les crypto-monnaies privées ne parviennent qu'à contrecarrer la surveillance de masse. +Les crypto-monnaies privées font l'objet d'un examen de plus en plus minutieux de la part des agences gouvernementales. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. En fin de compte, ils [ont versé à deux sociétés](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis et Integra Fec) un montant combiné de 1,25 million $ pour des outils qui prétendent le faire (on ne sait pas quel réseau de crypto-monnaies ces outils ciblent). En raison du secret qui entoure ce type d'outils, ==aucune de ces méthodes de traçage des crypto-monnaies n'a été confirmée de manière indépendante.== Cependant, il est tout à fait probable que des outils qui aident les enquêtes ciblées sur les transactions de crypto-monnaies privées existent, et que les crypto-monnaies privées ne parviennent qu'à contrecarrer la surveillance de masse. ### Autres crypto-monnaies (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ Il existe deux types de portefeuilles pour les crypto-monnaies : les portefeuill ### Acquisition -Il peut être difficile d'acquérir des [crypto-monnaies](../cryptocurrency.md) comme Monero de façon privée. Les places de marché P2P telles que [LocalMonero](https://localmonero.co/), une plateforme qui facilite les échanges entre les personnes, sont une option qui peut être utilisée. Si l'utilisation d'un centre d'échange exigeant la connaissance du client (KYC) est un risque acceptable pour vous tant que les transactions ultérieures ne peuvent pas être tracées, une option beaucoup plus facile est d'acheter des Monero sur un centre d'échange comme [Kraken](https://kraken.com/), ou d'acheter des Bitcoin/Litecoin sur un centre d'échange KYC qui peuvent ensuite être échangés contre des Monero. Ensuite, vous pouvez retirer les Monero achetés vers votre propre portefeuille non gardien pour les utiliser de façon privée à partir de ce moment-là. +Il peut être difficile d'acquérir des [crypto-monnaies](../cryptocurrency.md) comme Monero de façon privée. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Ensuite, vous pouvez retirer les Monero achetés vers votre propre portefeuille non gardien pour les utiliser de façon privée à partir de ce moment-là. Si vous optez pour cette solution, veillez à acheter des Monero à des moments et dans des quantités différents de ceux où vous les dépenserez. Si vous achetez 5 000 $ de Monero sur un centre d'échange et que vous effectuez un achat de 5 000 $ avec du Monero une heure plus tard, ces actions pourraient potentiellement être corrélées par un observateur extérieur, quel que soit le chemin emprunté par le Monero. L'échelonnement des achats et l'achat de grandes quantités de Monero à l'avance pour les dépenser plus tard dans de multiples transactions plus petites peuvent permettre d'éviter ce piège. diff --git a/i18n/fr/advanced/tor-overview.md b/i18n/fr/advanced/tor-overview.md index 8b91ef2a..378779ab 100644 --- a/i18n/fr/advanced/tor-overview.md +++ b/i18n/fr/advanced/tor-overview.md @@ -21,7 +21,7 @@ Si vous avez la possibilité d'accéder à un fournisseur de VPN de confiance et Parce que nous [recommandons généralement](../basics/vpn-overview.md) déjà que la grande majorité des gens utilisent un fournisseur de VPN de confiance pour diverses raisons, la recommandation suivante concernant la connexion à Tor via un VPN s'applique probablement à vous. Il n'est pas nécessaire de désactiver votre VPN avant de vous connecter à Tor, comme certaines ressources en ligne pourraient vous le faire croire. -En vous connectant directement à Tor, vous vous distinguerez auprès des administrateurs de réseaux locaux ou de votre FAI. La détection et la corrélation de ce trafic [ont été effectuées](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) dans le passé par des administrateurs de réseau pour identifier et désanonymiser des utilisateurs spécifiques de Tor sur leur réseau. D'un autre côté, se connecter à un VPN est presque toujours moins suspect, parce que les fournisseurs de VPN commerciaux sont utilisés par les consommateurs de tous les jours pour une variété de tâches courantes telles que contourner les géo-restrictions, même dans les pays avec de lourdes restrictions d'Internet. +En vous connectant directement à Tor, vous vous distinguerez auprès des administrateurs de réseaux locaux ou de votre FAI. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. D'un autre côté, se connecter à un VPN est presque toujours moins suspect, parce que les fournisseurs de VPN commerciaux sont utilisés par les consommateurs de tous les jours pour une variété de tâches courantes telles que contourner les géo-restrictions, même dans les pays avec de lourdes restrictions d'Internet. Par conséquent, vous devriez faire un effort pour cacher votre adresse IP **avant** de vous connecter au réseau Tor. Vous pouvez le faire simplement en vous connectant à un VPN (par le biais d'un client installé sur votre ordinateur) et en accédant à [Tor](../tor.md) comme d'habitude, par exemple via le Navigateur Tor. Cela crée une chaîne de connexion comme : @@ -72,7 +72,7 @@ Comme nous l'avons déjà mentionné, Tor est également facilement identifiable ### L'utilisation de Tor n'est pas indétectable -**Même si vous utilisez des ponts et des transports enfichables,** le Tor Project ne fournit aucun outil pour cacher à votre FAI le fait que vous utilisez Tor. Même l'utilisation de "transports enfichables" obscurcis ou de ponts non publics ne permet pas de dissimuler le fait que l'on utilise un canal de communication privé. Les transports enfichables les plus populaires comme obfs4 (qui obscurcit votre trafic pour "ne ressembler à rien") et meek (qui utilise le domain fronting pour camoufler votre trafic) peuvent être [détectés](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) avec des techniques d'analyse du trafic assez classiques. Snowflake présente des problèmes similaires et peut être [facilement détecté](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *avant même* qu'une connexion Tor ne soit établie. +**Même si vous utilisez des ponts et des transports enfichables,** le Tor Project ne fournit aucun outil pour cacher à votre FAI le fait que vous utilisez Tor. Même l'utilisation de "transports enfichables" obscurcis ou de ponts non publics ne permet pas de dissimuler le fait que l'on utilise un canal de communication privé. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Il existe des transport enfichables autres que ces trois-là, mais ils reposent généralement sur la sécurité par l'obscurité pour échapper à la détection. Ils ne sont pas impossibles à détecter, ils sont simplement utilisés par si peu de personnes que cela ne vaut pas la peine de construire des détecteurs pour eux. Il ne faut pas s'y fier si vous êtes spécifiquement surveillé. @@ -193,6 +193,6 @@ Il est [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wi - [Comment Tor fonctionne - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Services onion Tor - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: Le premier relais de votre circuit est appelé "garde d'entrée" ou "garde". Il s'agit d'un relais rapide et stable qui reste le premier de votre circuit pendant 2 à 3 mois afin de vous protéger contre une attaque connue de rupture d'anonymat. Le reste de votre circuit change avec chaque nouveau site web que vous visitez, et tous ensemble ces relais fournissent les protections complètes de Tor en matière de vie privée. Pour en savoir plus sur le fonctionnement des relais de garde, consultez cet [article de blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) et ce [document](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sur les gardes d'entrée. ([https://support.torproject.org/fr/tbb/tbb-2/](https://support.torproject.org/fr/tbb/tbb-2/)) +[^1]: Le premier relais de votre circuit est appelé "garde d'entrée" ou "garde". Il s'agit d'un relais rapide et stable qui reste le premier de votre circuit pendant 2 à 3 mois afin de vous protéger contre une attaque connue de rupture d'anonymat. Le reste de votre circuit change avec chaque nouveau site web que vous visitez, et tous ensemble ces relais fournissent les protections complètes de Tor en matière de vie privée. Pour en savoir plus sur le fonctionnement des relais de garde, consultez cet [article de blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) et ce [document](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sur les gardes d'entrée. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Balise de relai: une (dis-)qualification spéciale des relais pour les positions de circuit (par exemple, "Guard", "Exit", "BadExit"), les propriétés de circuit (par exemple, "Fast", "Stable") ou les rôles (par exemple, "Authority", "HSDir"), tels qu'attribués par les autorités de l'annuaire et définis plus précisément dans la spécification du protocole de l'annuaire. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/fr/android.md b/i18n/fr/android.md index d95268e1..7fb32778 100644 --- a/i18n/fr/android.md +++ b/i18n/fr/android.md @@ -83,9 +83,9 @@ schema: **Android Open Source Project** est un système d'exploitation mobile open source dirigé par Google qui équipe la majorité des appareils mobiles dans le monde. La plupart des téléphones vendus avec Android sont modifiés pour inclure des intégrations et des applications invasives telles que Google Play Services. Vous pouvez donc améliorer considérablement votre vie privée sur votre appareil mobile en remplaçant l'installation par défaut de votre téléphone par une version d'Android dépourvue de ces fonctionnalités invasives. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Page d'accueil } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Code source" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } Voici les systèmes d'exploitation, les appareils et les applications Android que nous recommandons pour optimiser la sécurité et la confidentialité de votre appareil mobile. Pour en savoir plus sur Android : @@ -113,27 +113,27 @@ Les appareils en fin de vie (tels que les appareils à "support étendu" de Grap GrapheneOS apporte des améliorations supplémentaires en matière de [renforcement de la sécurité](https://fr.wikipedia.org/wiki/Durcissement_%28informatique%29) et de confidentialité. Il dispose d'un [allocateur de mémoire renforcé](https://github.com/GrapheneOS/hardened_malloc), d'autorisations pour le réseau et les capteurs, et de diverses autres [fonctions de sécurité](https://grapheneos.org/features). GrapheneOS est également livré avec des mises à jour complètes du micrologiciel et des versions signées, de sorte que le démarrage vérifié est entièrement pris en charge. -[:octicons-home-16: Page d'accueil ](https://grapheneos.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Politique de confidentialité" } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} -[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Code source" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribuer } +[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } -GrapheneOS prend en charge [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), qui exécute les [Services Google Play](https://fr.wikipedia.org/wiki/Services_Google_Play) entièrement sandboxed comme toute autre application normale. Cela signifie que vous pouvez profiter de la plupart des services Google Play, tels que [les notifications push](https://firebase.google.com/docs/cloud-messaging/), tout en vous donnant un contrôle total sur leurs autorisations et leur accès, et tout en les contenant à un [profil de travail](os/android-overview.md#work-profile) ou un [profil d'utilisateur](os/android-overview.md#user-profiles) spécifique de votre choix. +GrapheneOS prend en charge [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), qui exécute les [Services Google Play](https://fr.wikipedia.org/wiki/Services_Google_Play) entièrement sandboxed comme toute autre application normale. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Les téléphones Google Pixel sont les seuls appareils qui répondent actuellement aux [exigences de sécurité matérielle](https://grapheneos.org/faq#device-support) de GrapheneOS. -[Pourquoi nous recommandons GrapheneOS plutôt que CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Pourquoi nous recommandons GrapheneOS plutôt que CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS
-![Logo DivestOS](assets/img/android/divestos.svg){ align=right } +![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** est un léger dérivé de [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS hérite de nombreux [appareils pris en charge](https://divestos.org/index.php?page=devices&base=LineageOS) de LineageOS. Il a des versions signées, ce qui permet d'avoir un [démarrage vérifié](https://source.android.com/security/verifiedboot) sur certains appareils autres que des Pixel. [:octicons-home-16: Page d'accueil](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS hérite de nombreux [appareils pris en charge](https://divestos.org/ind
-DivestOS a une [correction](https://gitlab.com/divested-mobile/cve_checker) automatique des vulnérabilités de noyau ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)), moins de blobs propriétaires, et un fichier [hosts](https://divested.dev/index.php?page=dnsbl) personnalisé. Sa WebView renforcée, [Mulch](https://gitlab.com/divested-mobile/mulch), permet [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) pour toutes les architectures et [un partitionnement de l'état du réseau](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), et reçoit des mises à jour hors bande. DivestOS inclut également les correctifs de noyau de GrapheneOS et active toutes les fonctions de sécurité de noyau disponibles via le [renforcement defconfig](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). Tous les noyaux plus récents que la version 3.4 incluent une [désinfection](https://lwn.net/Articles/334747/) complète de la page et tous les ~22 noyaux compilés par Clang ont [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) activé. +DivestOS a une [correction](https://gitlab.com/divested-mobile/cve_checker) automatique des vulnérabilités de noyau ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)), moins de blobs propriétaires, et un fichier [hosts](https://divested.dev/index.php?page=dnsbl) personnalisé. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS inclut également les correctifs de noyau de GrapheneOS et active toutes les fonctions de sécurité de noyau disponibles via le [renforcement defconfig](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS met en œuvre certains correctifs de renforcement du système développés à l'origine pour GrapheneOS. DivestOS 16.0 et plus implémente les autorisations [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) et SENSORS de GrapheneOS, l'[allocateur de mémoire renforcé](https://github.com/GrapheneOS/hardened_malloc), l'[exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), la [constification](https://en.wikipedia.org/wiki/Java_Native_Interface) [JNI](https://en.wikipedia.org/wiki/Const_(computer_programming)), et des patchs de renforcement [bioniques](https://en.wikipedia.org/wiki/Bionic_(software)) partiels. Les versions 17.1 et supérieures offrent l'option de GrapheneOS pour [randomiser les adresses MAC](https://en.wikipedia.org/wiki/MAC_address#Randomization) entre réseaux, le contrôle [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) et les options de redémarrage/coupure Wi-Fi/coupure Bluetooth automatique [sur délai](https://grapheneos.org/features). +DivestOS met en œuvre certains correctifs de renforcement du système développés à l'origine pour GrapheneOS. DivestOS 16.0 et plus implémente les autorisations [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) et SENSORS de GrapheneOS, l'[allocateur de mémoire renforcé](https://github.com/GrapheneOS/hardened_malloc), l'[exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), la [constification](https://en.wikipedia.org/wiki/Java_Native_Interface) [JNI](https://en.wikipedia.org/wiki/Const_(computer_programming)), et des patchs de renforcement [bioniques](https://en.wikipedia.org/wiki/Bionic_(software)) partiels. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS utilise F-Droid comme magasin d'applications par défaut. Nous [recommandons normalement d'éviter F-Droid](#f-droid), mais ce n'est pas possible sur DivestOS ; les développeurs mettent à jour leurs applications via leurs propres dépôts F-Droid ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) et [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). Nous recommandons de désactiver l'application officielle F-Droid et d'utiliser [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **avec les dépôts DivestOS activés** pour maintenir ces composants à jour. Pour les autres applications, nos méthodes recommandées pour les obtenir restent applicables. +DivestOS utilise F-Droid comme magasin d'applications par défaut. Nous [recommandons normalement d'éviter F-Droid](#f-droid), mais ce n'est pas possible sur DivestOS ; les développeurs mettent à jour leurs applications via leurs propres dépôts F-Droid ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) et [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. Pour les autres applications, nos méthodes recommandées pour les obtenir restent applicables.

Avertissement

@@ -166,13 +166,13 @@ Lorsque vous achetez un appareil, nous vous recommandons d'en prendre un aussi n Évitez d'acheter des téléphones auprès des opérateurs de réseaux mobiles. Ces derniers ont souvent un **chargeur d'amorçage verrouillé** et ne supportent pas le [déverrouillage constructeur](https://source.android.com/devices/bootloader/locking_unlocking). Ces variantes de téléphone vous empêcheront d'installer tout type de distribution Android alternative. -Soyez très **prudent** lorsque vous achetez des téléphones d'occasion sur des marchés en ligne. Vérifiez toujours la réputation du vendeur. Si l'appareil est volé, il est possible qu'il soit enregistré dans la [base de données IMEI](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). Il y a également un risque d'être associé à l'activité de l'ancien propriétaire. +Soyez très **prudent** lorsque vous achetez des téléphones d'occasion sur des marchés en ligne. Vérifiez toujours la réputation du vendeur. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). Il y a également un risque d'être associé à l'activité de l'ancien propriétaire. Quelques conseils supplémentaires concernant les appareils Android et la compatibilité des systèmes d'exploitation : - N'achetez pas d'appareils qui ont atteint ou sont sur le point d'atteindre leur fin de vie, des mises à jour supplémentaires du micrologiciel doivent être fournies par le fabricant. - N'achetez pas de téléphones LineageOS ou /e/ OS préchargés ou tout autre téléphone Android sans prise en charge adéquate du [Démarrage Vérifié](https://source.android.com/security/verifiedboot) et sans mises à jour du micrologiciel. En outre, ces appareils ne vous permettent pas de vérifier s'ils ont été manipulés. -- En bref, si un appareil ou une distribution Android ne figure pas dans cette liste, il y a probablement une bonne raison. Consultez notre [forum](https://discuss.privacyguides.net/) pour en savoir plus ! +- En bref, si un appareil ou une distribution Android ne figure pas dans cette liste, il y a probablement une bonne raison. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Les Eléments Sécurisés comme le Titan M2 sont plus limités que le Trusted Ex Les téléphones Google Pixel utilisent un OS TEE appelé Trusty qui est [open source](https://source.android.com/security/trusty#whyTrusty), contrairement à de nombreux autres téléphones. -L'installation de GrapheneOS sur un téléphone Pixel est facile avec leur [installateur web](https://grapheneos.org/install/web). Si vous ne vous sentez pas à l'aise pour le faire vous-même et que vous êtes prêt à dépenser un peu plus d'argent, consultez le site [NitroPhone](https://shop.nitrokey.com/shop) car ils sont préchargés avec GrapheneOS et viennent de la société réputée [Nitrokey](https://www.nitrokey.com/about). +L'installation de GrapheneOS sur un téléphone Pixel est facile avec leur [installateur web](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. Quelques conseils supplémentaires pour l'achat d'un Google Pixel : @@ -218,16 +218,16 @@ Nous recommandons une grande variété d'applications Android sur ce site. Les a Shelter prend en charge le blocage de la recherche de contacts entre profils et le partage de fichiers entre profils via le gestionnaire de fichiers par défaut ([DocumentsUI](https://source.android.com/devices/architecture/modular-system/documentsui)). -[:octicons-repo-16: Dépôt](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } -[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Code source" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribuer } +[:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } +[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Avertissement

-Shelter est recommandé par rapport à [Insular](https://secure-system.gitlab.io/Insular/) et [Island](https://github.com/oasisfeng/island) car il prend en charge le [blocage de la recherche de contact](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). En utilisant Shelter, vous accordez une confiance totale à son développeur, car Shelter agit en tant qu'[administrateur de l'appareil](https://developer.android.com/guide/topics/admin/device-admin) pour créer le Profil professionnel, et il a un accès étendu aux données stockées dans ce dernier. @@ -322,11 +322,11 @@ Les métadonnées d'orientation de l'image ne sont pas supprimées. Si vous acti
-Obtainium vous permet de télécharger des fichiers d'installation APK à partir d'une grande variété de sources, et c'est à vous de vous assurer que ces sources et ces applications sont légitimes. Par exemple, l'utilisation d'Obtainium pour installer Signal à partir de [la page de téléchargement APK de Signal](https://signal.org/android/apk/) devrait être correcte, mais l'installation à partir de dépôts APK tiers comme Aptoide ou APKPure peut présenter des risques supplémentaires. Le risque d'installer une *mise à jour* malveillante est plus faible, car Android vérifie lui-même que toutes les mises à jour d'applications sont signées par le même développeur que l'application existante sur votre téléphone avant de les installer. +Obtainium vous permet de télécharger des fichiers d'installation APK à partir d'une grande variété de sources, et c'est à vous de vous assurer que ces sources et ces applications sont légitimes. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. Le risque d'installer une *mise à jour* malveillante est plus faible, car Android vérifie lui-même que toutes les mises à jour d'applications sont signées par le même développeur que l'application existante sur votre téléphone avant de les installer. ### Magasin d'applications de GrapheneOS -Le magasin d'applications de GrapheneOS est disponible sur [GitHub](https://github.com/GrapheneOS/Apps/releases). Il prend en charge Android 12 et plus et est capable de se mettre à jour. Le magasin d'applications contient des applications indépendantes construites par le projet GrapheneOS, telles que [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), et [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). Si vous recherchez ces applications, nous vous recommandons vivement de les obtenir à partir du magasin d'applications de GrapheneOS plutôt que du Play Store, car les applications de leur magasin sont signées par la signature du projet GrapheneOS à laquelle Google n'a pas accès. +Le magasin d'applications de GrapheneOS est disponible sur [GitHub](https://github.com/GrapheneOS/Apps/releases). Il prend en charge Android 12 et plus et est capable de se mettre à jour. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). Si vous recherchez ces applications, nous vous recommandons vivement de les obtenir à partir du magasin d'applications de GrapheneOS plutôt que du Play Store, car les applications de leur magasin sont signées par la signature du projet GrapheneOS à laquelle Google n'a pas accès. ### Aurora Store @@ -338,9 +338,9 @@ Le Google Play Store nécessite un compte Google pour se connecter, ce qui n'est **Aurora Store** est un client Google Play Store qui ne nécessite pas de compte Google, de services Google Play ou microG pour télécharger des applications. -[:octicons-home-16: Page d'accueil](https://auroraoss.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Politique de confidentialité" } -[:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Code source" } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" }
Téléchargements @@ -375,7 +375,7 @@ Sur GitLab, en prenant l'exemple de [Aurora Store](#aurora-store), vous naviguez Si vous téléchargez des fichiers APK à installer manuellement, vous pouvez vérifier leur signature à l'aide de l'outil [`apksigner`](https://developer.android.com/studio/command-line/apksigner), qui fait partie des [build-tools](https://developer.android.com/studio/releases/build-tools) d'Android. -1. Installez [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Téléchargez les [outils de ligne de commande d'Android Studio](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ Si vous téléchargez des fichiers APK à installer manuellement, vous pouvez v ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. Les hachés obtenus peuvent ensuite être comparés avec une autre source. Certains développeurs, comme Signal, [fournissent les empreintes numériques](https://signal.org/android/apk/) sur leur site web. +5. Les hachés obtenus peuvent ensuite être comparés avec une autre source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ Si vous téléchargez des fichiers APK à installer manuellement, vous pouvez v ![Logo F-Droid](assets/img/android/f-droid.svg){ align=right width=120px } -==Nous recommandons F-Droid uniquement comme moyen d'obtenir des applications qui ne peuvent pas être obtenues par les moyens ci-dessus.== F-Droid est souvent recommandé comme alternative à Google Play, en particulier dans la communauté de la vie privée. La possibilité d'ajouter des dépôts tiers et de ne pas être confiné au jardin clos de Google a conduit à sa popularité. F-Droid dispose en outre de [versions reproductibles](https://f-droid.org/en/docs/Reproducible_Builds/) pour certaines applications et est dédié aux logiciels libres et open source. Cependant, la façon dont F-Droid construit, signe et livre les paquets présente quelques inconvénients liés à la sécurité : +==Nous recommandons F-Droid uniquement comme moyen d'obtenir des applications qui ne peuvent pas être obtenues par les moyens ci-dessus.== F-Droid est souvent recommandé comme alternative à Google Play, en particulier dans la communauté de la vie privée. La possibilité d'ajouter des dépôts tiers et de ne pas être confiné au jardin clos de Google a conduit à sa popularité. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. Cependant, la façon dont F-Droid construit, signe et livre les paquets présente quelques inconvénients liés à la sécurité : En raison de leur processus de construction d'applications, les applications du dépôt officiel de F-Droid sont souvent en retard sur les mises à jour. Les mainteneurs de F-Droid réutilisent également les identifiants des paquets tout en signant les applications avec leurs propres clés, ce qui n'est pas idéal car cela donne à l'équipe F-Droid une confiance ultime. En outre, les conditions requises pour qu'une application soit incluse dans le répertoire officiel de F-Droid sont moins strictes que dans d'autres magasins d'applications comme Google Play, ce qui signifie que F-Droid a tendance à héberger beaucoup plus d'applications qui sont plus anciennes, non mises à jour, ou qui ne répondent plus aux [normes de sécurité modernes](https://developer.android.com/google/play/requirements/target-sdk). -D'autres dépôts tiers populaires pour F-Droid, tels que [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) atténuent certains de ces problèmes. Le dépôt IzzyOnDroid récupère les versions directement depuis GitHub et constitue la meilleure alternative aux dépôts des développeurs. Cependant, ce n'est pas quelque chose que nous pouvons entièrement recommander, car les applications sont généralement [retirées](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) de ce dépôt si elles sont ajoutées plus tard au dépôt principal de F-Droid. Bien que cela soit logique (puisque le but de ce dépôt particulier est d'héberger des applications avant qu'elles ne soient acceptées dans le dépôt principal de F-Droid), cela peut vous laisser avec des applications installées qui ne reçoivent plus de mises à jour. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. Le dépôt IzzyOnDroid récupère les versions directement depuis GitHub et constitue la meilleure alternative aux dépôts des développeurs. Cependant, ce n'est pas quelque chose que nous pouvons entièrement recommander, car les applications sont généralement [retirées](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) de ce dépôt si elles sont ajoutées plus tard au dépôt principal de F-Droid. Bien que cela soit logique (puisque le but de ce dépôt particulier est d'héberger des applications avant qu'elles ne soient acceptées dans le dépôt principal de F-Droid), cela peut vous laisser avec des applications installées qui ne reçoivent plus de mises à jour. -Cela dit, les dépôts [F-Droid](https://f-droid.org/en/packages/) et [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) abritent d'innombrables applications. Ils peuvent donc être un outil utile pour rechercher et découvrir des applications open-source que vous pouvez ensuite télécharger par d'autres moyens tels que le Play Store, Aurora Store ou en obtenant l'APK directement auprès du développeur. Vous devez faire preuve de discernement lorsque vous recherchez de nouvelles applications par cette méthode, et surveiller la fréquence des mises à jour de l'application. Des applications obsolètes peuvent s'appuyer sur des bibliothèques non maintenues, entre autres, ce qui constitue un risque potentiel pour la sécurité. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. Vous devez faire preuve de discernement lorsque vous recherchez de nouvelles applications par cette méthode, et surveiller la fréquence des mises à jour de l'application. Des applications obsolètes peuvent s'appuyer sur des bibliothèques non maintenues, entre autres, ce qui constitue un risque potentiel pour la sécurité.

F-Droid Basic

-Dans certains cas rares, le développeur d'une application ne la distribue que par le biais de F-Droid ([Gadgetbridge](https://gadgetbridge.org/) en est un exemple). Si vous avez vraiment besoin d'une telle application, nous vous recommandons d'utiliser le nouveau client [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) au lieu de l'application F-Droid originale pour l'obtenir. F-Droid Basic peut effectuer des mises à jour en arrière-plan, sans extension privilégiée ou root, et possède un ensemble de fonctionnalités réduit (limitant la surface d'attaque). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic peut effectuer des mises à jour en arrière-plan, sans extension privilégiée ou root, et possède un ensemble de fonctionnalités réduit (limitant la surface d'attaque).
diff --git a/i18n/fr/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/fr/assets/img/how-tor-works/tor-encryption-dark.svg index dfc36b34..0f1e0716 100644 --- a/i18n/fr/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/fr/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Votre - - Appareil - - - - Envoi de données à un site Web - - - - - Réception de données d'un site Web - - - - - Votre - - Appareil - - - - Entrée - - - - - Milieu - - - - - Sortie - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entrée - - - - - Milieu - - - - - Sortie - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/fr/assets/img/how-tor-works/tor-encryption.svg b/i18n/fr/assets/img/how-tor-works/tor-encryption.svg index ab96c4bb..f954fb0f 100644 --- a/i18n/fr/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/fr/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Votre - - Appareil - - - - Envoi de données à un site Web - - - - - Réception de données d'un site Web - - - - - Votre - - Appareil - - - - Entrée - - - - - Milieu - - - - - Sortie - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entrée - - - - - Milieu - - - - - Sortie - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/fr/assets/img/how-tor-works/tor-path-dark.svg b/i18n/fr/assets/img/how-tor-works/tor-path-dark.svg index 858b0b36..b04a23ae 100644 --- a/i18n/fr/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/fr/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - + + + Votre Appareil - - - Entrée - - - - - Milieu - - - - - Sortie - - - - - PrivacyGuides.org - - - - - - - - + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/fr/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/fr/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index 3d55104f..ce51beee 100644 --- a/i18n/fr/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/fr/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Votre - - - appareil - - - - - - Garde - - - Relai - - - Relai - - - - - caché...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendez-vous - - - Relai - - - - - Entrée - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/fr/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/fr/assets/img/how-tor-works/tor-path-hidden-service.svg index 5062bea6..8d008447 100644 --- a/i18n/fr/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/fr/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Votre - - - appareil - - - - - - Garde - - - Relai - - - Relai - - - - - caché...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendez-vous - - - Relai - - - - - Entrée - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/fr/assets/img/how-tor-works/tor-path.svg b/i18n/fr/assets/img/how-tor-works/tor-path.svg index 56128803..37208d94 100644 --- a/i18n/fr/assets/img/how-tor-works/tor-path.svg +++ b/i18n/fr/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + @@ -29,7 +29,7 @@ - Entrée + Entrée diff --git a/i18n/fr/basics/account-deletion.md b/i18n/fr/basics/account-deletion.md index b7069672..25586cba 100644 --- a/i18n/fr/basics/account-deletion.md +++ b/i18n/fr/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: Il est facile d'accumuler un grand nombre de comptes internet. Voici quelques conseils pour élaguer votre collection. --- -Au fil du temps, il est facile d'accumuler un certain nombre de comptes en ligne, dont beaucoup ne sont peut-être plus utilisés. La suppression de ces comptes inutilisés est une étape importante dans la récupération de votre vie privée, car les comptes inactifs sont vulnérables aux fuites de données. Il y a une fuite des données lorsque la sécurité d'un service est compromise et que des informations protégées sont consultées, transmises ou volées par des acteurs non autorisés. Les fuites de données sont malheureusement [très fréquentes](https://haveibeenpwned.com/PwnedWebsites) de nos jours, et donc le meilleur moyen de minimiser l'impact qu'elles ont sur votre vie et de pratiquer une bonne hygiène numérique. L'objectif de ce guide est donc de vous aider à traverser le processus fastidieux de la suppression d'un compte, souvent rendu difficile à cause du [dark pattern](https://www.deceptive.design/), une pratique que certains services utilisent afin que vous abandonniez l'idée de supprimer votre compte. +Au fil du temps, il est facile d'accumuler un certain nombre de comptes en ligne, dont beaucoup ne sont peut-être plus utilisés. La suppression de ces comptes inutilisés est une étape importante dans la récupération de votre vie privée, car les comptes inactifs sont vulnérables aux fuites de données. Il y a une fuite des données lorsque la sécurité d'un service est compromise et que des informations protégées sont consultées, transmises ou volées par des acteurs non autorisés. Les fuites de données sont malheureusement [très fréquentes](https://haveibeenpwned.com/PwnedWebsites) de nos jours, et donc le meilleur moyen de minimiser l'impact qu'elles ont sur votre vie et de pratiquer une bonne hygiène numérique. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Recherche d'anciens comptes ### Gestionnaire de mots de passe -Si vous disposez d'un gestionnaire de mots de passe que vous avez utilisé pendant toute votre vie numérique, cette partie sera très facile. Souvent, ils incluent une fonctionnalité intégrée pour détecter si vos informations d'identification ont été exposées dans une fuite de données - comme le [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/) de Bitwarden. +Si vous disposez d'un gestionnaire de mots de passe que vous avez utilisé pendant toute votre vie numérique, cette partie sera très facile. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Même si vous n'avez pas explicitement utilisé un gestionnaire de mots de passe auparavant, il y a de fortes chances que vous ayez utilisé celui de votre navigateur ou de votre téléphone sans même vous en rendre compte. Par exemple : [Firefox Password Manager](https://support.mozilla.org/fr/kb/gestionnaire-mots-passe), [Google Password Manager](https://passwords.google.com/intro) et [Edge Password Manager](https://support.microsoft.com/fr-fr/microsoft-edge/enregistrer-ou-oublier-des-mots-de-passe-dans-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Même si vous n'avez pas explicitement utilisé un gestionnaire de mots de passe auparavant, il y a de fortes chances que vous ayez utilisé celui de votre navigateur ou de votre téléphone sans même vous en rendre compte. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Les systèmes d'exploitation aussi, disposent souvent d'un gestionnaire de mots de passe qui peut vous aider à récupérer les mots de passe que vous avez oubliés : -- Windows [Credential Manager](https://support.microsoft.com/fr-fr/windows/acc%C3%A8s-au-gestionnaire-d-informations-d-identification-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/fr-fr/HT211145) -- iOS [Passwords](https://support.apple.com/fr-fr/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, accessible via [Seahorse](https://wiki.gnome.org/Apps/Seahorse) ou [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ Lorsque vous tentez de vous reconnecter, si le site renvoie un message d'erreur ### RGPD (résidents de l'Espace Économique Européen uniquement) -Les résidents de l'EEE disposent de droits supplémentaires concernant l'effacement des données spécifiés dans l'article [Article 17](https://www.gdpr.org/regulation/article-17.html) du RGPD. Si vous êtes concerné, lisez la politique de confidentialité de chaque service pour trouver des informations sur la manière d'exercer votre droit à l'effacement. La lecture de la politique de confidentialité peut s'avérer importante, car certains services proposent une option "Supprimer le compte" qui ne fait que le désactiver, vous devez dans ce cas prendre des mesures supplémentaires pour réellement supprimer votre compte. Parfois, la suppression effective peut impliquer de remplir des questionnaires, d'envoyer un courriel au responsable de la protection des données du service ou même de prouver que vous résidez dans l'EEE. Si vous envisagez de procéder de cette manière, n'écrasez **pas** les informations du compte - votre identité en tant que résident de l'EEE peut être requise. Notez que l'emplacement du service n'a pas d'importance ; le RGPD s'applique à toute personne desservant des utilisateurs européens. Si le service ne respecte pas votre droit à l'effacement, vous pouvez contacter votre [autorité nationale de protection des données](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) et vous pouvez avoir droit à une compensation monétaire. L'autorité nationale de protection des données en France est la [Commission Nationale de l'Informatique et des Libertés (CNIL)](https://www.cnil.fr/). Des modèles de courrier pour des clôtures de compte ou de suppression de données sont accessibles sur leur [site](https://www.cnil.fr/fr/modeles/courrier). Pour en savoir plus sur votre droit à l'effacement, voici un [article](https://www.cnil.fr/fr/le-droit-leffacement-supprimer-vos-donnees-en-ligne) de la CNIL. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. Si vous êtes concerné, lisez la politique de confidentialité de chaque service pour trouver des informations sur la manière d'exercer votre droit à l'effacement. La lecture de la politique de confidentialité peut s'avérer importante, car certains services proposent une option "Supprimer le compte" qui ne fait que le désactiver, vous devez dans ce cas prendre des mesures supplémentaires pour réellement supprimer votre compte. Parfois, la suppression effective peut impliquer de remplir des questionnaires, d'envoyer un courriel au responsable de la protection des données du service ou même de prouver que vous résidez dans l'EEE. Si vous envisagez de procéder de cette manière, n'écrasez **pas** les informations du compte - votre identité en tant que résident de l'EEE peut être requise. Notez que l'emplacement du service n'a pas d'importance ; le RGPD s'applique à toute personne desservant des utilisateurs européens. Si le service ne respecte pas votre droit à l'effacement, vous pouvez contacter votre [autorité nationale de protection des données](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) et vous pouvez avoir droit à une compensation monétaire. L'autorité nationale de protection des données en France est la [Commission Nationale de l'Informatique et des Libertés (CNIL)](https://www.cnil.fr/). Des modèles de courrier pour des clôtures de compte ou de suppression de données sont accessibles sur leur [site](https://www.cnil.fr/fr/modeles/courrier). Pour en savoir plus sur votre droit à l'effacement, voici un [article](https://www.cnil.fr/fr/le-droit-leffacement-supprimer-vos-donnees-en-ligne) de la CNIL. ### Remplacer les informations de compte @@ -59,4 +59,4 @@ Même lorsque vous êtes en mesure de supprimer un compte, il n'y a aucune garan ## Éviter la création de nouveaux comptes -Comme le dit le vieil adage, "Mieux vaut prévenir que guérir". Chaque fois que vous êtes tenté de vous inscrire à un nouveau service ou site web, demandez-vous : "En ai-je vraiment besoin ? Puis-je accomplir ce dont j'ai besoin sans compte ?" Il est souvent beaucoup plus difficile de supprimer un compte que d'en créer un. Et même après avoir supprimé ou modifié les informations sur votre compte, il se peut qu'il existe une version en cache provenant d'un tiers, comme [Internet Archive](https://archive.org/). Évitez la tentation quand vous le pouvez - votre futur vous en remerciera ! +Comme le dit le vieil adage, "Mieux vaut prévenir que guérir". Chaque fois que vous êtes tenté de vous inscrire à un nouveau service ou site web, demandez-vous : "En ai-je vraiment besoin ? Puis-je accomplir ce dont j'ai besoin sans compte ?" Il est souvent beaucoup plus difficile de supprimer un compte que d'en créer un. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Évitez la tentation quand vous le pouvez - votre futur vous en remerciera ! diff --git a/i18n/fr/basics/common-misconceptions.md b/i18n/fr/basics/common-misconceptions.md index 3f40a497..32a59ef3 100644 --- a/i18n/fr/basics/common-misconceptions.md +++ b/i18n/fr/basics/common-misconceptions.md @@ -88,7 +88,7 @@ Lorsque vous effectuez des achats en ligne, l'utilisation d'une [consigne à col 2. **Identité inconnue** - Une identité inconnue pourrait être un pseudonyme stable que vous utilisez régulièrement. Il n'est pas anonyme car il ne change pas. Si vous faites partie d'une communauté en ligne, vous souhaiterez peut-être conserver un personnage que les autres connaissent. Ce pseudonyme n'est pas anonyme car, s'il est surveillé suffisamment longtemps, les détails concernant le propriétaire peuvent révéler d'autres informations, telles que sa façon d'écrire, ses connaissances générales sur des sujets d'intérêt, etc. -Vous pouvez utiliser un VPN pour masquer votre adresse IP. Les transactions financières sont plus difficiles à masquer : Vous pouvez envisager d'utiliser des crypto-monnaies anonymes, comme [Monero](https://www.getmonero.org/). L'utilisation de monnaies alternatives peut également contribuer à masquer l'origine de votre monnaie. En règle générale, les centres d'échange exigent que le processus [KYC](https://fr.wikipedia.org/wiki/Know_your_customer) (connaissance du client) soit complété avant de vous autoriser à échanger de la monnaie fiduciaire contre tout type de cryptomonnaie. Les options de rencontres locales peuvent également être une solution, mais elles sont souvent plus coûteuses et nécessitent parfois un processus KYC. +Vous pouvez utiliser un VPN pour masquer votre adresse IP. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). L'utilisation de monnaies alternatives peut également contribuer à masquer l'origine de votre monnaie. En règle générale, les centres d'échange exigent que le processus [KYC](https://fr.wikipedia.org/wiki/Know_your_customer) (connaissance du client) soit complété avant de vous autoriser à échanger de la monnaie fiduciaire contre tout type de cryptomonnaie. Les options de rencontres locales peuvent également être une solution, mais elles sont souvent plus coûteuses et nécessitent parfois un processus KYC. 3. **Identité anonyme** - Même avec de l'expérience, les identités anonymes sont difficiles à maintenir sur de longues périodes. Il doit s'agir d'identités à court terme et de courte durée qui font l'objet d'une rotation régulière. diff --git a/i18n/fr/basics/common-threats.md b/i18n/fr/basics/common-threats.md index 47150162..23747514 100644 --- a/i18n/fr/basics/common-threats.md +++ b/i18n/fr/basics/common-threats.md @@ -55,7 +55,7 @@ Les attaques ciblées contre une personne spécifique sont plus difficiles à g -Si vous êtes préoccupé par les **attaques physiques** vous devriez utiliser un système d'exploitation avec une implémentation de démarrage vérifié sécurisé, à la manière d'Android, d'iOS, de macOS ou de [Windows (avec TPM)](https://docs.microsoft.com/fr-fr/windows/security/information-protection/secure-the-windows-10-boot-process). Vous devriez également vous assurer que votre disque est chiffré et que le système d'exploitation utilise un TPM, une [Enclave sécurisée](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) ou un [Element sécurisé](https://developers.google.com/android/security/android-ready-se) pour limiter le taux de tentatives de saisie de la phrase de passe. Vous devriez éviter de partager votre ordinateur avec des personnes en qui vous n'avez pas confiance, car la plupart des systèmes d'exploitation de bureau ne chiffrent pas les données séparément par utilisateur. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). Vous devriez également vous assurer que votre disque est chiffré et que le système d'exploitation utilise un TPM, une [Enclave sécurisée](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) ou un [Element sécurisé](https://developers.google.com/android/security/android-ready-se) pour limiter le taux de tentatives de saisie de la phrase de passe. Vous devriez éviter de partager votre ordinateur avec des personnes en qui vous n'avez pas confiance, car la plupart des systèmes d'exploitation de bureau ne chiffrent pas les données séparément par utilisateur. ## Protection de ses données des fournisseurs de services @@ -89,16 +89,16 @@ La surveillance de masse est un effort visant à surveiller le "comportement, de

Atlas of Surveillance

-Si vous souhaitez en savoir plus sur les méthodes de surveillance et la manière dont elles sont mises en œuvre dans les villes aux États-Unis, vous pouvez également consulter l'[Atlas de la Surveillance](https://atlasofsurveillance.org/) de l'[Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Les gouvernements justifient souvent les programmes de surveillance de masse comme des moyens nécessaires pour combattre le terrorisme et prévenir la criminalité. Cependant, en violation des droits de l'homme, ces programmes de surveillance sont, entre autres, le plus souvent utilisés pour cibler de manière disproportionnée les minorités et les dissidents politiques.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

Face aux [révélations d'Edward Snowden sur des programmes gouvernementaux tels que [PRISM](https://fr.wikipedia.org/wiki/PRISM_%28programme_de_surveillance%29) et [Upstream](https://fr.wikipedia.org/wiki/Upstream_collection)], les responsables des services de renseignement ont également admis que la NSA collectait secrètement depuis des années des enregistrements sur pratiquement tous les appels téléphoniques des Américains - qui appelle qui, quand ces appels sont passés et la durée de ces appels. Ce type d'informations, lorsqu'il est amassé par la NSA quotidiennement, peut révéler des détails terriblement sensibles sur la vie des gens en associant ces données : s'ils ont appelé un pasteur, une clinique d'avortement, un centre d'addiction ou une ligne d'assistance contre le suicide par exemple. @@ -144,7 +144,7 @@ Si vous avez déjà soumis vos véritables informations à des sites qui ne devr La censure en ligne peut être exercée (à des degrés divers) par des acteurs tels que des gouvernements totalitaires, des administrateurs de réseaux et des fournisseurs de services. Ces efforts pour contrôler la communication et restreindre l'accès à l'information seront toujours incompatibles avec le droit humain à la liberté d'expression.[^5] -La censure sur les plateformes privées est de plus en plus courante, car des plateformes comme Twitter et Facebook cèdent à la demande du public, aux pressions du marché et à celles des agences gouvernementales. Les pressions gouvernementales peuvent prendre la forme de demandes secrètes adressées aux entreprises, comme la Maison Blanche [demandant le retrait](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) d'une vidéo provocante sur YouTube, ou de demandes manifestes, comme le gouvernement chinois exigeant des entreprises qu'elles adhèrent à un régime de censure strict. +La censure sur les plateformes privées est de plus en plus courante, car des plateformes comme Twitter et Facebook cèdent à la demande du public, aux pressions du marché et à celles des agences gouvernementales. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. Les personnes concernées par la menace de la censure peuvent utiliser des technologies comme [Tor](../advanced/tor-overview.md) pour la contourner, et soutenir des plateformes de communication résistantes à la censure comme [Matrix](../real-time-communication.md#element), qui ne dispose pas d'une autorité centralisée pouvant fermer des comptes de manière arbitraire. @@ -162,5 +162,5 @@ Vous devez toujours tenir compte des risques encourus en essayant de contourner [^1]: Commission de surveillance de la vie privée et des libertés civiles des États-Unis : [Rapport sur le programme d'enregistrements téléphoniques mené en vertu de la section 215](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^2]: Conseil de surveillance de la vie privée et des libertés civiles des États-Unis : [*Rapport sur le programme d'enregistrements téléphoniques mené en vertu de la section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipédia : [*Capitalisme de surveillance*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Énumérer la méchanceté](https://www.ranum.com/security/computer_security/editorials/dumb/)" (ou "énumérer toutes les mauvaises choses que nous connaissons") comme le font de nombreux bloqueurs de contenu et programmes antivirus, ne permet pas de vous protéger correctement contre les menaces nouvelles et inconnues, car elles n'ont pas encore été ajoutées à la liste des filtres. Vous devriez également utiliser d'autres techniques d'atténuation. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Vous devriez également utiliser d'autres techniques d'atténuation. [^5]: Nations Unies : [*Déclaration universelle des droits de l'homme*](https://www.un.org/fr/about-us/universal-declaration-of-human-rights). diff --git a/i18n/fr/basics/email-security.md b/i18n/fr/basics/email-security.md index 7d003c85..a4fbe0df 100644 --- a/i18n/fr/basics/email-security.md +++ b/i18n/fr/basics/email-security.md @@ -13,7 +13,7 @@ Par conséquent, il est préférable d'utiliser l'e-mail pour recevoir des e-mai La méthode standard pour ajouter du E2EE aux e-mails entre différents fournisseurs d'e-mails est d'utiliser OpenPGP. Il existe différentes implémentations de la norme OpenPGP, les plus courantes étant [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) et [OpenPGP.js](https://openpgpjs.org). -Il existe une autre norme populaire auprès des entreprises, appelée [S/MIME](https://en.wikipedia.org/wiki/S/MIME), mais elle nécessite un certificat émis par une [Autorité de Certification](https://en.wikipedia.org/wiki/Certificate_authority) (toutes ne délivrent pas de certificats S/MIME). Elle est prise en charge par [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) et [Outlook sur le Web ou Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +Il existe une autre norme populaire auprès des entreprises, appelée [S/MIME](https://en.wikipedia.org/wiki/S/MIME), mais elle nécessite un certificat émis par une [Autorité de Certification](https://en.wikipedia.org/wiki/Certificate_authority) (toutes ne délivrent pas de certificats S/MIME). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Même si vous utilisez OpenPGP, il ne prend pas en charge la [confidentialité persistante](https://en.wikipedia.org/wiki/Forward_secrecy), ce qui signifie que si votre clé privée ou celle du destinataire est volée, tous les messages précédents chiffrés avec cette clé seront exposés. C'est pourquoi nous recommandons, dans la mesure du possible, les [messageries instantanées](../real-time-communication.md) qui mettent en œuvre la confidentialité persistante par rapport aux e-mails pour les communications de personne à personne. @@ -23,7 +23,7 @@ La norme Web Key Directory (WKD) permet aux clients d'e-mail de découvrir la cl Outre les [clients d'e-mail que nous recommandons](../email-clients.md) et qui prennent en charge le WKD, certains fournisseurs d'e-mail avec interface web prennent également en charge le WKD. Le fait que *votre propre clé* soit publiée sur le WKD pour que d'autres puissent l'utiliser dépend de la configuration de votre domaine. Si vous utilisez un [fournisseur d'e-mail](../email.md#openpgp-compatible-services) qui prend en charge le WKD, tel que Proton Mail ou Mailbox.org, il peut publier votre clé OpenPGP sur son domaine pour vous. -Si vous utilisez votre propre domaine personnalisé, vous devrez configurer le WKD séparément. Si vous contrôlez votre nom de domaine, vous pouvez configurer le WKD quel que soit votre fournisseur d'e-mail. Une façon simple de le faire est d'utiliser la fonction "[WKD en tant que Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" de keys.openpgp.org, en définissant un enregistrement CNAME sur le sous-domaine `openpgpkey` de votre domaine pointé vers `wkd.keys.openpgp.org`, puis en envoyant votre clé sur [keys.openpgp.org](https://keys.openpgp.org/). Vous pouvez également [héberger vous-même le WKD sur votre propre serveur web](https://wiki.gnupg.org/WKDHosting). +Si vous utilisez votre propre domaine personnalisé, vous devrez configurer le WKD séparément. Si vous contrôlez votre nom de domaine, vous pouvez configurer le WKD quel que soit votre fournisseur d'e-mail. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Vous pouvez également [héberger vous-même le WKD sur votre propre serveur web](https://wiki.gnupg.org/WKDHosting). Si vous utilisez un domaine partagé d'un fournisseur qui ne prend pas en charge le WKD, comme @gmail.com, vous ne pourrez pas partager votre clé OpenPGP avec d'autres personnes via cette méthode. @@ -33,7 +33,7 @@ Les fournisseurs d'e-mail qui vous permettent d'utiliser les protocoles d'accès ### Comment puis-je protéger mes clés privées ? -Une carte à puce (telle qu'une [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) ou [Nitrokey](https://www.nitrokey.com)) fonctionne en recevant un e-mail chiffré d'un appareil (téléphone, tablette, ordinateur, etc.) exécutant un client d'e-mail/une interface d'e-mail web. Le message est ensuite déchiffré par la carte à puce et le contenu déchiffré est renvoyé à l'appareil. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Le message est ensuite déchiffré par la carte à puce et le contenu déchiffré est renvoyé à l'appareil. Il est préférable que le déchiffrement ait lieu sur la carte à puce afin d'éviter d'exposer votre clé privée à un dispositif compromis. diff --git a/i18n/fr/basics/multi-factor-authentication.md b/i18n/fr/basics/multi-factor-authentication.md index 5eeb96c2..01057650 100644 --- a/i18n/fr/basics/multi-factor-authentication.md +++ b/i18n/fr/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP est l'une des formes les plus courantes de MFA. Lorsque vous configurez un Le code limité dans le temps est alors dérivé du secret partagé et de l'heure courante. Comme le code n'est valable que pour une courte période, sans accès au secret partagé, un adversaire ne peut pas générer de nouveaux codes. -Si vous disposez d'une clé de sécurité matérielle avec support TOTP (comme une YubiKey avec [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), nous vous recommandons de stocker vos "secrets partagés" sur le matériel. Un matériel tel que la YubiKey a été développé dans l'intention de rendre le "secret partagé" difficile à extraire et à copier. Une clé YubiKey n'est pas non plus connectée à Internet, contrairement à un téléphone équipé d'une application TOTP. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Un matériel tel que la YubiKey a été développé dans l'intention de rendre le "secret partagé" difficile à extraire et à copier. Une clé YubiKey n'est pas non plus connectée à Internet, contrairement à un téléphone équipé d'une application TOTP. Contrairement à [WebAuthn](#fido-fast-identity-online), TOTP n'offre aucune protection contre les attaques d'[hammeçonnage](https://en.wikipedia.org/wiki/Phishing) ou de réutilisation. Si un adversaire obtient de vous un code valide, il peut l'utiliser autant de fois qu'il le souhaite jusqu'à son expiration (généralement 60 secondes). @@ -122,13 +122,13 @@ Au-delà de la simple sécurisation des connexions à votre site web, l'authenti ### Windows -Yubico dispose d'un [fournisseur d'identifiants](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) dédié qui ajoute l'authentification à épreuve-réponse pour le flux de connexion nom d'utilisateur + mot de passe pour les comptes Windows locaux. Si vous avez une YubiKey avec le support d'authentification de Challenge-Response, jetez un œil au [Guide de configuration de Yubico pour Windows](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), qui vous permettra de configurer la MFA sur votre ordinateur Windows. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS dispose d'un [support natif](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) pour l'authentification par carte à puce (PIV). Si vous avez une carte à puce ou une clé de sécurité matérielle qui prend en charge l'interface PIV telle que la YubiKey, nous vous recommandons de suivre la documentation de votre fournisseur de sécurité de carte à puce/matérielle et de configurer l'authentification à second facteur pour votre ordinateur macOS. -Yubico a un guide [Utiliser votre YubiKey comme une Smart Card dans macOS](https://support.yubico.com/hc/en-us/articles/360016649059) qui peut vous aider à configurer votre YubiKey sur macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. Une fois votre carte à puce/clé de sécurité configurée, nous vous recommandons d'exécuter cette commande dans le terminal : @@ -147,22 +147,22 @@ Si le nom d'hôte de votre système change (par exemple à cause du DHCP), vous
-Le module `pam_u2f` sous Linux peut fournir une authentification à deux facteurs pour se connecter sur la plupart des distributions Linux populaires. Si vous avez une clé de sécurité matérielle qui prend en charge U2F, vous pouvez configurer l'authentification MFA pour votre connexion. Yubico a un guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) qui devrait fonctionner sur n'importe quelle distribution. Les commandes du gestionnaire de paquets - telles que `apt-get`- et les noms de paquets peuvent toutefois différer. Ce guide ne s'applique **pas** à Qubes OS. +Le module `pam_u2f` sous Linux peut fournir une authentification à deux facteurs pour se connecter sur la plupart des distributions Linux populaires. Si vous avez une clé de sécurité matérielle qui prend en charge U2F, vous pouvez configurer l'authentification MFA pour votre connexion. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. Les commandes du gestionnaire de paquets - telles que `apt-get`- et les noms de paquets peuvent toutefois différer. Ce guide ne s'applique **pas** à Qubes OS. ### Qubes OS -Qubes OS prend en charge l'authentification Challenge-Response avec YubiKeys. Si vous avez une YubiKey avec un support d'authentification Challenge-Response, jetez un coup d'oeil à la documentation de Qubes OS [YubiKey](https://www.qubes-os.org/doc/yubikey/) si vous voulez configurer la MFA sur Qubes OS. +Qubes OS prend en charge l'authentification Challenge-Response avec YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Clés de sécurité matérielles -La MFA par SSH peut être configuré en utilisant plusieurs méthodes d'authentification différentes qui sont populaires avec les clés de sécurité matérielle. Nous vous recommandons de consulter la [documentation](https://developers.yubico.com/SSH/) de Yubico sur la manière de la configurer. +La MFA par SSH peut être configuré en utilisant plusieurs méthodes d'authentification différentes qui sont populaires avec les clés de sécurité matérielle. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Mot de passe unique basé sur le temps (TOTP) -La MFA par SSH peut également être configurée en utilisant TOTP. DigitalOcean fourni un tutoriel [Comment configurer l'authentification multifacteurs pour SSH sur Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). La plupart des éléments devraient être les mêmes quelle que soit la distribution, mais les commandes du gestionnaire de paquets - telles que `apt-get`- et les noms des paquets peuvent différer. +La MFA par SSH peut également être configurée en utilisant TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). La plupart des éléments devraient être les mêmes quelle que soit la distribution, mais les commandes du gestionnaire de paquets - telles que `apt-get`- et les noms des paquets peuvent différer. ### KeePass (et KeePassXC) -Les bases de données KeePass et KeePassXC peuvent être sécurisées en utilisant Challenge-Response ou HOTP comme second facteur d'authentification. Yubico a fourni un tutoriel pour KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) et il y en a également un autre sur le site [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) . +Les bases de données KeePass et KeePassXC peuvent être sécurisées en utilisant Challenge-Response ou HOTP comme second facteur d'authentification. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/fr/basics/passwords-overview.md b/i18n/fr/basics/passwords-overview.md index 8a9d332f..ba015b48 100644 --- a/i18n/fr/basics/passwords-overview.md +++ b/i18n/fr/basics/passwords-overview.md @@ -54,13 +54,13 @@ Pour générer une phrase secrète diceware à l'aide de vrais dés, suivez ces

Note

-Ces instructions supposent que vous utilisez la [grande liste de mots de l'EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) pour générer la phrase secrète, ce qui nécessite cinq lancers de dés par mot. D'autres listes de mots peuvent nécessiter plus ou moins de lancers par mot, et peuvent nécessiter un nombre différent de mots pour obtenir la même entropie. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. D'autres listes de mots peuvent nécessiter plus ou moins de lancers par mot, et peuvent nécessiter un nombre différent de mots pour obtenir la même entropie.
1. Lancez cinq fois un dé à six faces, en notant le nombre après chaque lancer. -2. Par exemple, disons que vous avez obtenu `2-5-2-6-6`. Cherchez dans la [grande liste de mots de l'EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) le mot qui correspond à `25266`. +2. Par exemple, disons que vous avez obtenu `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. Vous trouverez le mot `encrypt`. Notez ce mot. @@ -75,20 +75,20 @@ Vous ne devez **pas** relancer les mots jusqu'à ce que vous obteniez une combin Si vous n'avez pas accès à de vrais dés ou si vous préférez ne pas en utiliser, vous pouvez utiliser le générateur de mots de passe intégré à votre gestionnaire de mots de passe, car la plupart d'entre eux ont la possibilité de générer des phrases secrètes diceware en plus des mots de passe ordinaires. -Nous vous recommandons d'utiliser la [grande liste de mots de l'EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) pour générer vos phrases secrètes diceware, car elle offre exactement la même sécurité que la liste originale, tout en contenant des mots plus faciles à mémoriser. Il existe également [d'autres listes de mots dans différentes langues](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), si vous ne souhaitez pas que votre phrase secrète soit en anglais. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. Il existe également [d'autres listes de mots dans différentes langues](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), si vous ne souhaitez pas que votre phrase secrète soit en anglais.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. L'une des mesures permettant de déterminer la force d'une phrase secrète est son degré d'entropie. L'entropie par mot dans une phrase secrète est calculée comme suit : $\text{log}_2(\text{WordsInList})$ et l'entropie globale de la phrase secrète est calculée comme suit : $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Par conséquent, chaque mot de la liste susmentionnée génère ~12,9 bits d'entropie ($\text{log}_2(7776)$), et une phrase secrète de sept mots dérivée de cette liste a ~90,47 bits d'entropie ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. Pour calculer le nombre de phrases secrètes possibles, il suffit de faire $\text{WordsInList}^\text{WordsInPhrase}$, ou dans notre cas, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. Pour calculer le nombre de phrases secrètes possibles, il suffit de faire $\text{WordsInList}^\text{WordsInPhrase}$, ou dans notre cas, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. En moyenne, il faut essayer 50 % de toutes les combinaisons possibles pour deviner votre phrase. En gardant cela à l'esprit, même si votre adversaire est capable de faire ~1 000 000 000 000 de suppositions par seconde, il lui faudrait toujours ~27 255 689 ans pour deviner votre phrase secrète. C'est le cas même si les choses suivantes sont vraies : diff --git a/i18n/fr/basics/vpn-overview.md b/i18n/fr/basics/vpn-overview.md index 8c402f88..020e71aa 100644 --- a/i18n/fr/basics/vpn-overview.md +++ b/i18n/fr/basics/vpn-overview.md @@ -69,13 +69,13 @@ Si vous utilisez Tor alors il est *probablement* préférable de vous connecter Vous ne devriez pas utiliser cette fonctionnalité : l'avantage principal d'utiliser Tor est que vous ne faites pas confiance à votre fournisseur VPN, qui est annulée lorsque vous utilisez des nœuds Tor hébergés par votre VPN au lieu de vous connecter directement à Tor depuis votre ordinateur. -Actuellement, Tor supporte seulement le protocole TCP. UDP (utilisé par [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), et d'autres protocoles), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), et autres paquets seront lâchés. Pour compenser cela, les fournisseurs de VPN acheminent généralement tous les paquets non TCP par leur serveur VPN (votre premier saut). C'est le cas de [Proton VPN](https://protonvpn.com/support/tor-vpn/). De plus, lorsque vous utilisez cette configuration Tor par VPN, vous n'avez pas le contrôle sur d'autres fonctionnalités importantes de Tor telles que [Adresse de Destination Isolée](https://www.whonix.org/wiki/Stream_Isolation) (utilisation d'un circuit Tor différent pour chaque domaine que vous visitez). +Actuellement, Tor supporte seulement le protocole TCP. UDP (utilisé par [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), et d'autres protocoles), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), et autres paquets seront lâchés. Pour compenser cela, les fournisseurs de VPN acheminent généralement tous les paquets non TCP par leur serveur VPN (votre premier saut). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). La fonctionnalité doit être vue comme un moyen *pratique* pour accéder aux services cachés sur Tor, pas pour rester anonyme. Pour un véritable anonymat, utilisez le [Navigateur Tor](../tor.md). ## Propriété d'un VPN commercial -La plupart des services VPN sont détenus par les mêmes [quelques sociétés](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). Ces sociétés douteuses gèrent un grand nombre de petits services VPN afin de créer l'illusion que vous avez plus de choix qu'il n'y en a en réalité et de maximiser leurs profits. En règle générale, ces fournisseurs qui alimentent leur société écran ont des politiques de protection de la vie privée déplorables et il ne faut pas leur confier votre trafic internet. Vous devriez être très strict quant au fournisseur que vous décidez d'utiliser. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). Ces sociétés douteuses gèrent un grand nombre de petits services VPN afin de créer l'illusion que vous avez plus de choix qu'il n'y en a en réalité et de maximiser leurs profits. En règle générale, ces fournisseurs qui alimentent leur société écran ont des politiques de protection de la vie privée déplorables et il ne faut pas leur confier votre trafic internet. Vous devriez être très strict quant au fournisseur que vous décidez d'utiliser. Vous devez également vous méfier du fait que de nombreux sites d'évaluation de VPN ne sont que des véhicules publicitaires ouverts au plus offrant. ==Privacy Guides ne gagne pas d'argent en recommandant des produits externes et n'utilise jamais de programmes d'affiliation.== @@ -111,8 +111,8 @@ De nombreux dVPNs sont utilisés pour pousser une crypto-monnaie plutôt que pou ## Informations VPN liées -- [Le problème avec les sites d'évaluation des VPNs et de la vie privée](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Enquête sur les applications VPN gratuites](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Les propriétaires inconnus des VPNs dévoilés : 101 produits VPN gérés par seulement 23 sociétés](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [Cette société chinoise est secrètement à l'origine de 24 applications populaires qui cherchent à obtenir des autorisations dangereuses](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - un récit très précaire](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) par Dennis Schubert +- [Le problème avec les sites d'évaluation des VPNs et de la vie privée](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Enquête sur les applications VPN gratuites](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Les propriétaires inconnus des VPNs dévoilés : 101 produits VPN gérés par seulement 23 sociétés](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [Cette société chinoise est secrètement à l'origine de 24 applications populaires qui cherchent à obtenir des autorisations dangereuses](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/fr/basics/why-privacy-matters.md b/i18n/fr/basics/why-privacy-matters.md index c3d7e010..949ac882 100644 --- a/i18n/fr/basics/why-privacy-matters.md +++ b/i18n/fr/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ La protection de la vie privée doit être intégrée par défaut dans les [logi ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) par Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants à propos de l'Anonymat vs Vie Privée vs Sécurité](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/fr/calendar.md b/i18n/fr/calendar.md index 545594c6..97252b7b 100644 --- a/i18n/fr/calendar.md +++ b/i18n/fr/calendar.md @@ -13,26 +13,26 @@ Les calendriers contiennent certaines de vos données les plus sensibles ; utili ![logo Tuta](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offre un calendrier gratuit et chiffré sur toutes les plateformes prises en charge. Les fonctionnalités incluent: E2EE automatique de toutes les données, fonctionnalités de partage, fonctionnalité d'import/export, authentification multifacteur, et [plus](https://tuta.com/calendar-app-comparison/). +**Tuta** offre un calendrier gratuit et chiffré sur toutes les plateformes prises en charge. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Les calendriers multiples et la fonctionnalité de partage étendue sont réservés aux abonnés payants. -[:octicons-home-16: Page d'accueil](https://tuta.com/calendar){ .md-button .md-button--primary } -[:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Politique de confidentialité" } +[:octicons-home-16: Homepage](https://tuta.com/calendar){ .md-button .md-button--primary } +[:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Code source" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribuer } +[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -52,10 +52,10 @@ Les calendriers multiples et la fonctionnalité de partage étendue sont réserv [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Code source" }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/fr/cloud.md b/i18n/fr/cloud.md index ba23c12a..ef9e4195 100644 --- a/i18n/fr/cloud.md +++ b/i18n/fr/cloud.md @@ -56,15 +56,15 @@ Les nouveaux clients mobiles de Proton Drive n'ont pas encore fait l'objet d'un **Tresorit** est un fournisseur suisse-hongrois de stockage cloud chiffré fondé en 2011. Tresorit appartient à la Poste suisse, le service postal national de la Suisse. -[:octicons-home-16: Page d'accueil](https://tresorit.com/){ class="md-button md-button--primary" } -[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } +[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Les nouveaux clients mobiles de Proton Drive n'ont pas encore fait l'objet d'un Tresorit a fait l'objet d'un certain nombre d'audits de sécurité indépendants : -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/) : ISO/IEC 27001:2013[^1] [Certification](https://www.certipedia.com/quality_marks/9108644476) de conformité par TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/) : Test de pénétration par Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - Cet examen a permis d'évaluer la sécurité du client web de Tresorit, de l'application Android, de l'application Windows et de l'infrastructure associée. - Computest a découvert deux vulnérabilités qui ont été résolues. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/) : Test de pénétration par Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - Cette étude a analysé le code source complet de Tresorit et validé que la mise en œuvre correspond aux concepts décrits dans le [livre blanc](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf) de Tresorit. - Ernst & Young a également testé les clients web, mobiles et de bureau : "Les résultats des tests n'ont révélé aucun écart par rapport aux affirmations de Tresorit en matière de confidentialité des données". -Ils ont également reçu le Digital Trust Label, une certification de la [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) qui exige la réussite de [35 critères](https://digitaltrust-label.swiss/criteria/) liés à la sécurité, à la confidentialité et à la fiabilité. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Critères diff --git a/i18n/fr/cryptocurrency.md b/i18n/fr/cryptocurrency.md index b052301c..cb77b6d7 100644 --- a/i18n/fr/cryptocurrency.md +++ b/i18n/fr/cryptocurrency.md @@ -24,10 +24,10 @@ De nombreux projets de crypto-monnaies, voire la plupart, sont des escroqueries. **Monero** utilise une chaîne de blocs avec des technologies de protection de la vie privée qui obscurcissent les transactions afin d'obtenir un anonymat. Chaque transaction Monero cache le montant de la transaction, les adresses d'envoi et de réception, ainsi que la source des fonds, sans aucune difficulté, ce qui en fait un choix idéal pour les novices en matière de crypto-monnaies. -[:octicons-home-16: Page d'accueil](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Code source" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ Avec Monero, les observateurs extérieurs ne peuvent pas déchiffrer les adresse Pour une confidentialité optimale, assurez-vous d'utiliser un portefeuille sans garde, où la clé de visualisation reste sur l'appareil. Cela signifie que vous êtes le seul à pouvoir dépenser vos fonds et à voir les transactions entrantes et sortantes. Si vous utilisez un portefeuille de garde, le fournisseur peut voir **tout** ce que vous faites ; si vous utilisez un portefeuille "léger" dans lequel le fournisseur conserve votre clé privée, il peut voir presque tout ce que vous faites. Parmi les portefeuilles non gardiens, on peut citer : - [le client Monero officiel](https://getmonero.org/downloads) (bureau) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet prend en charge plusieurs crypto-monnaies. Une version de Cake Wallet réservée aux utilisateurs de Monero est disponible sur [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (bureau) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet prend en charge plusieurs crypto-monnaies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) Pour une confidentialité maximale (même avec un portefeuille sans garde), vous devriez utiliser votre propre nœud Monero. L'utilisation du nœud d'une autre personne expose certaines informations, telles que l'adresse IP à partir de laquelle vous vous connectez, les heures auxquelles vous synchronisez votre portefeuille et les transactions que vous envoyez à partir de votre portefeuille (mais pas d'autres détails sur ces transactions). Vous pouvez également vous connecter au nœud Monero de quelqu'un d'autre via Tor ou i2p. -En août 2021, CipherTrace [a annoncé](https://ciphertrace.com/enhanced-monero-tracing/) des capacités de traçage de Monero améliorées pour les agences gouvernementales. Des publications publiques montrent que le Financial Crimes Enforcement Network du département du Trésor américain [a accordé une licence à](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace pour son "module Monero" à la fin de l'année 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Des publications publiques montrent que le Financial Crimes Enforcement Network du département du Trésor américain [a accordé une licence à](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace pour son "module Monero" à la fin de l'année 2022. -La confidentialité du graphe des transactions Monero est limitée par son cercle de signatures relativement petit, en particulier contre les attaques ciblées. Les caractéristiques de confidentialité de Monero ont également été [remises en question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) par certains chercheurs en sécurité, et un certain nombre de vulnérabilités graves ont été trouvées et corrigées dans le passé, de sorte que les affirmations faites par des organisations comme CipherTrace ne sont pas hors de question. S'il est peu probable qu'il existe des outils de surveillance de masse de Monero comme il en existe pour le Bitcoin et d'autres, il est certain que les outils de traçage facilitent les enquêtes ciblées. +La confidentialité du graphe des transactions Monero est limitée par son cercle de signatures relativement petit, en particulier contre les attaques ciblées. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. S'il est peu probable qu'il existe des outils de surveillance de masse de Monero comme il en existe pour le Bitcoin et d'autres, il est certain que les outils de traçage facilitent les enquêtes ciblées. En fin de compte, Monero est la crypto-monnaie la plus respectueuse de la vie privée, mais ses revendications en matière de confidentialité **n'ont pas** été prouvées de manière définitive. Plus de temps et de recherche sont nécessaires pour évaluer si le Monero est suffisamment résistant aux attaques pour toujours offrir une protection adéquate de la vie privée. diff --git a/i18n/fr/data-redaction.md b/i18n/fr/data-redaction.md index f181ce0c..7c7d8986 100644 --- a/i18n/fr/data-redaction.md +++ b/i18n/fr/data-redaction.md @@ -88,12 +88,12 @@ L'application offre plusieurs façons d'effacer les métadonnées des images. À Metapho est une visionneuse simple et propre pour les métadonnées des photos telles que la date, le nom du fichier, la taille, le modèle d'appareil photo, la vitesse d'obturation et le lieu. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ Metapho est une visionneuse simple et propre pour les métadonnées des photos t **PrivacyBlur** est une application gratuite qui permet de brouiller les parties sensibles des photos avant de les partager en ligne. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ Metapho est une visionneuse simple et propre pour les métadonnées des photos t Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106)
diff --git a/i18n/fr/desktop-browsers.md b/i18n/fr/desktop-browsers.md index ae3b290d..87728d3e 100644 --- a/i18n/fr/desktop-browsers.md +++ b/i18n/fr/desktop-browsers.md @@ -69,10 +69,10 @@ Si vous avez besoin de naviguer anonymement sur Internet, vous devriez plutôt u Le **Navigateur Mullvad** est une version du [Navigateur Tor](tor.md#tor-browser) dont l'intégration au réseau Tor a été supprimée, visant à fournir les technologies de protection contre les empreintes numériques du Navigateur Tor aux utilisateurs de VPN. Il est développé par le projet Tor et distribué par [Mullvad](vpn.md#mullvad), et n'exige **pas** l'utilisation du VPN de Mullvad. -[:octicons-home-16: Page d'accueil](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Code source" } +[:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
Téléchargements @@ -85,7 +85,7 @@ Le **Navigateur Mullvad** est une version du [Navigateur Tor](tor.md#tor-browser -Comme le [Navigateur Tor](tor.md), le Navigateur Mullvad est conçu pour empêcher la prise d'empreintes numériques en rendant l'empreinte numérique de votre navigateur identique à celle de tous les autres utilisateurs du Navigateur Mullvad, et il inclut des paramètres par défaut et des extensions qui sont automatiquement configurés par les niveaux de sécurité par défaut : *Standard*, *Safer* et *Safest*. Il est donc impératif de ne pas modifier le navigateur mis à part l'ajustement des [niveaux de sécurité](https://tb-manual.torproject.org/security-settings/) par défaut. D'autres modifications rendraient votre empreinte numérique unique, ce qui irait à l'encontre de l'objectif poursuivi par l'utilisation de ce navigateur. Si vous souhaitez configurer votre navigateur de manière plus poussée et que la prise d'empreintes numériques ne vous préoccupe pas, nous vous recommandons plutôt [Firefox](#firefox). +Comme le [Navigateur Tor](tor.md), le Navigateur Mullvad est conçu pour empêcher la prise d'empreintes numériques en rendant l'empreinte numérique de votre navigateur identique à celle de tous les autres utilisateurs du Navigateur Mullvad, et il inclut des paramètres par défaut et des extensions qui sont automatiquement configurés par les niveaux de sécurité par défaut : *Standard*, *Safer* et *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). D'autres modifications rendraient votre empreinte numérique unique, ce qui irait à l'encontre de l'objectif poursuivi par l'utilisation de ce navigateur. Si vous souhaitez configurer votre navigateur de manière plus poussée et que la prise d'empreintes numériques ne vous préoccupe pas, nous vous recommandons plutôt [Firefox](#firefox). ### Système anti-empreintes numériques @@ -115,18 +115,18 @@ Le navigateur Mullvad est livré avec DuckDuckGo comme [moteur de recherche](sea **Firefox** offre de solides paramètres de confidentialité, tels que la [protection renforcée contre le suivi](https://support.mozilla.org/fr/kb/protection-renforcee-contre-pistage-firefox-ordinateur), qui peut contribuer à bloquer divers [types de suivi](https://support.mozilla.org/fr/kb/protection-renforcee-contre-pistage-firefox-ordinateur#w_what-enhanced-tracking-protection-blocks). -[:octicons-home-16: Page d'accueil](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} -[:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Code source" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} +[:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
-Téléchargements +Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Le navigateur Mullvad est livré avec DuckDuckGo comme [moteur de recherche](sea

Avertissement

-Firefox inclut un [jeton de téléchargement](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) unique dans les téléchargements fais à partir du site web de Mozilla et utilise la télémétrie dans Firefox pour envoyer le jeton. Le jeton n'est **pas** inclus dans les versions du [FTP de Mozilla](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox inclut un [jeton de téléchargement](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) unique dans les téléchargements fais à partir du site web de Mozilla et utilise la télémétrie dans Firefox pour envoyer le jeton. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Cela vous protège en bloquant les traceurs de réseaux sociaux, les scripts de ##### Suggestions Firefox (États-Unis uniquement) -Les [Suggestions Firefox](https://support.mozilla.org/en-US/kb/firefox-suggest) sont une fonctionnalité similaire aux suggestions de recherche qui ne sont disponible qu'aux États-Unis. Nous recommandons de les désactiver pour la même raison que nous recommandons de désactiver les suggestions de recherche. Si vous ne voyez pas ces options dans l'en-tête de la **barre d'adresse**, c'est que vous n'avez pas la nouvelle expérience et que vous pouvez ignorer ces changements. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. Nous recommandons de les désactiver pour la même raison que nous recommandons de désactiver les suggestions de recherche. Si vous ne voyez pas ces options dans l'en-tête de la **barre d'adresse**, c'est que vous n'avez pas la nouvelle expérience et que vous pouvez ignorer ces changements. - [ ] Décochez **Suggestions du web** - [ ] Décochez **Suggestions des sponsors** @@ -183,7 +183,7 @@ Cela vous protège contre les cookies persistants, mais ne vous protège pas con > Firefox nous envoie des données sur la version et la langue de votre Firefox ; le système d'exploitation de l'appareil et la configuration matérielle ; la mémoire, les informations de base sur les plantages et les erreurs; les résultats de processus automatisés tels que les mises à jour, la navigation sécurisée et l'activation de notre système. Lorsque Firefox nous envoie des données, votre adresse IP est temporairement collectée dans les journaux de notre serveur. -En outre, le service Firefox Accounts collecte [certaines données techniques](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). Si vous utilisez un compte Firefox, vous pouvez la refuser : +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). Si vous utilisez un compte Firefox, vous pouvez la refuser : 1. Ouvrez les [paramètres de votre profil sur accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Décochez **Collecte et utilisation de données** > **Aidez à améliorer les comptes Firefox** @@ -204,7 +204,7 @@ Protection maximale impose l'utilisation de DNS via HTTPS, et un avertissement d #### Synchronisation -La [Synchronisation Firefox](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) permet à vos données de navigation (historique, favoris, etc.) d'être accessibles sur tous vos appareils et les protège avec le chiffrement de bout en bout (E2EE). +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (avancé) @@ -215,7 +215,7 @@ Le [Navigateur Mullvad](#mullvad-browser) offre les mêmes protections contre la -Le projet [Arkenfox](https://github.com/arkenfox/user.js) fournit un ensemble d'options soigneusement étudiées pour Firefox. Si vous [décidez](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) d'utiliser Arkenfox, [quelques options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) sont subjectivement strictes et/ou peuvent empêcher certains sites web de fonctionner correctement. [Vous pouvez facilement modifier ces options](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) pour répondre à vos besoins. Nous **recommandons vivement** de lire l'intégralité de leur [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox permet également la prise en charge des [conteneurs](https://support.mozilla.org/fr/kb/conteneurs#w_for-advanced-users). +Le projet [Arkenfox](https://github.com/arkenfox/user.js) fournit un ensemble d'options soigneusement étudiées pour Firefox. Si vous [décidez](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) d'utiliser Arkenfox, [quelques options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) sont subjectivement strictes et/ou peuvent empêcher certains sites web de fonctionner correctement. [Vous pouvez facilement modifier ces options](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) pour répondre à vos besoins. Nous **recommandons vivement** de lire l'intégralité de leur [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox vise uniquement à contrecarrer les scripts de pistage basiques ou naïfs grâce aux paramètres de configuration de randomisation du canevas et de la résistance aux empreintes numérique intégrée à Firefox. Il ne vise pas à faire en sorte que votre navigateur se fonde dans une foule d'autres utilisateurs d'Arkenfox, comme le font le Navigateur Mullvad ou le Navigateur Tor, ce qui est le seul moyen de contrecarrer les scripts avancés de pistage des empreintes numérique. Rappelez-vous que vous pouvez toujours utiliser plusieurs navigateurs. Par exemple, vous pouvez envisager d'utiliser Firefox+Arkenfox pour quelques sites sur lesquels vous souhaitez rester connecté ou auxquels vous faites confiance, et le Navigateur Mullvad pour la navigation générale. @@ -223,25 +223,25 @@ Arkenfox vise uniquement à contrecarrer les scripts de pistage basiques ou naï
-![Logo Brave](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Le navigateur Brave** comprend un bloqueur de contenu intégré et des [fonctions de confidentialité](https://brave.com/privacy-features/), dont la plupart sont activées par défaut. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave est basé sur le projet de navigateur Web Chromium. Il devrait donc vous être familier et présenter un minimum de problèmes de compatibilité avec les sites Web. -[:octicons-home-16: Page d'accueil](https://brave.com/){ .md-button .md-button--primary } -[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Service onion" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Code source" } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ Ces options se trouvent dans :material-menu: → **Paramètres**. ##### Shields -Brave inclut certaines mesures contre la prise d'empreinte numérique dans sa fonction [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Nous vous suggérons de configurer ces options [de manière globale](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) sur toutes les pages que vous visitez. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Les options "Boucliers" peuvent être réduites par site selon les besoins, mais par défaut, nous recommandons de définir les paramètres suivants: @@ -290,23 +290,23 @@ Brave vous permet de sélectionner des filtres de contenu supplémentaires dans
-1. Cette option fournit une fonctionnalité similaire aux [modes de blocage](https://github.com/gorhill/uBlock/wiki/Blocking-mode) avancés de uBlock Origin ou l'extension [NoScript](https://noscript.net/). +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. Si vous souhaitez rester connecté à un site particulier que vous visitez souvent, vous pouvez définir des exceptions pour chaque site en cliquant sur l'icône Bouclier dans la barre d'adresse. ##### Confidentialité et sécurité
-- [x] Sélectionnez **Désactiver les UDP sans proxy** sous [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) -- [ ] Décochez **Utiliser les services Google pour la messagerie push** -- [ ] Décochez **Autoriser les analyses de produits préservant la vie privée (P3A)** -- [ ] Décochez **Envoyer automatiquement un ping quotidien d'utilisation à Brave** -- [ ] Décochez **Envoyer automatiquement des rapports de diagnostic** -- [ ] Décochez **Fenêtre privée avec Tor** (1) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Use Google services for push messaging** +- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** +- [ ] Uncheck **Automatically send daily usage ping to Brave** +- [ ] Uncheck **Automatically send diagnostic reports** +- [ ] Uncheck **Private window with Tor** (1)
-1. Brave **n'est pas** aussi résistant à la prise d'empreinte numérique que le navigateur Tor et beaucoup moins de personnes utilisent Brave avec Tor, vous sortirez donc du lot. Lorsqu'[un fort anonymat est nécessaire](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) utilisez le [Navigateur Tor ](tor.md#tor-browser). +1. Brave **n'est pas** aussi résistant à la prise d'empreinte numérique que le navigateur Tor et beaucoup moins de personnes utilisent Brave avec Tor, vous sortirez donc du lot. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Suppression à la fermeture

@@ -343,7 +343,7 @@ Les fonctionnalités Web3 de Brave peuvent potentiellement ajouter à l'empreint #### Synchronisation -La [Synchronisation Brave](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) permet à vos données de navigation (historique, signets, etc.) d'être accessibles sur tous vos appareils sans nécessiter de compte et les protège avec E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Récompenses et portefeuille Brave @@ -369,9 +369,9 @@ D'une manière générale, nous vous recommandons de limiter au maximum les exte [:octicons-code-16:](https://github.com/gorhill/uBlock){ .card-link title="Code source" }
-Téléchargements +Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -406,9 +406,9 @@ uBlock Origin possède également une version "Lite" de leur extension, qui offr [:octicons-code-16:](https://github.com/gorhill/uBlock/tree/master/platform/mv3){ .card-link title="Code source" }
-Téléchargements +Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ Nous travaillons à l'établissement de critères définis pour chaque section d - Disponible sur Linux, macOS et Windows. - Les modifications nécessaires pour rendre le navigateur plus respectueux de la vie privée ne devraient pas avoir d'impact négatif sur l'expérience des utilisateurs. - Bloque les cookies tiers par défaut. -- Prend en charge le [cloisonnement des états](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) pour atténuer le suivi intersite.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Dans le meilleur des cas Nos critères de cas idéal représentent ce que nous aimerions voir d'un projet parfait dans cette catégorie. Nos recommandations peuvent ne pas inclure tout ou partie de cette fonctionnalité, mais celles qui l'inclus peuvent être mieux classées que les autres sur cette page. - Comprend une fonctionnalité intégrée de blocage du contenu. -- Supporte la compartimentation des cookies (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Prend en charge des Progressive Web Apps. Les PWAs vous permettent d'installer certains sites web comme s'il s'agissait d'applications natives sur votre ordinateur. Cela peut présenter des avantages par rapport à l'installation d'applications basées sur Electron, car vous bénéficiez des mises à jour de sécurité régulières de votre navigateur. - Ne comprend pas de fonctionnalités supplémentaires (bloatware) qui n'ont pas d'incidence sur la vie privée des utilisateurs. - Ne collecte pas de télémétrie par défaut. @@ -462,4 +462,4 @@ Nos critères de cas idéal représentent ce que nous aimerions voir d'un projet - Doit avoir un impact direct sur la vie privée des utilisateurs, c'est-à-dire qu'il ne doit pas simplement fournir des informations. [^1]: uBlock Origin Lite *lui-même* ne consommera aucune ressource, parce qu'il utilise des APIs plus récentes qui permettent au navigateur de traiter nativement les listes de filtres, au lieu d'exécuter du code JavaScript dans l'extension pour gérer le filtrage. Cependant, cet avantage de ressource est seulement [théorique](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), parce qu'il est possible que le code de filtrage standard d'uBlock Origin soit plus efficace que le code de filtrage natif de votre navigateur. Cela n'a pas encore été comparé. -[^2]: L'implémentation de Brave est détaillée dans [Mises à jour de la confidentialité de Brave : partitionnement de l'état du réseau pour la confidentialité](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/fr/desktop.md b/i18n/fr/desktop.md index f8210836..43913963 100644 --- a/i18n/fr/desktop.md +++ b/i18n/fr/desktop.md @@ -17,17 +17,17 @@ Les distributions Linux sont généralement recommandées pour la protection de ![Logo Fedora](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** est la distribution que nous recommandons aux personnes qui découvrent Linux. Fedora adopte généralement les nouvelles technologies avant les autres distributions, par exemple, [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org), et bientôt. Ces nouvelles technologies s'accompagnent souvent d'améliorations générales en matière de sécurité, de vie privée et d'ergonomie. +**Fedora Workstation** est la distribution que nous recommandons aux personnes qui découvrent Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). Ces nouvelles technologies s'accompagnent souvent d'améliorations générales en matière de sécurité, de vie privée et d'ergonomie. -[:octicons-home-16: Page d'accueil](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora a un cycle de publication semi-continu. Si certains paquets comme [GNOME](https://www.gnome.org) sont gelés jusqu'à la prochaine version de Fedora, la plupart des paquets (y compris le noyau) sont mis à jour fréquemment tout au long de la durée de vie de la version. Chaque version de Fedora est supportée pendant un an, avec une nouvelle version publiée tous les 6 mois. +Fedora a un cycle de publication semi-continu. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Chaque version de Fedora est supportée pendant un an, avec une nouvelle version publiée tous les 6 mois. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora a un cycle de publication semi-continu. Si certains paquets comme [GNOME] **openSUSE Tumbleweed** est une distribution stable à publication continue. -openSUSE Tumbleweed dispose d'un système de [mise à jour transactionnelle](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) qui utilise [Btrfs](https://en.wikipedia.org/wiki/Btrfs) et [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) pour s'assurer que les livraisons peuvent être annulées en cas de problème. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Page d'accueil](https://get.opensuse.org/fr/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/fr/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed suit un modèle de publication continu où chaque mise à jour est pu **Arch Linux** est une distribution légère, de type do-it-yourself (DIY), ce qui signifie que vous n'obtenez que ce que vous installez. Pour plus d'informations, voir leur [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions_(Fran%C3%A7ais)). -[:octicons-home-16: Page d'accueil](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/title/Main_page_(Fran%C3%A7ais)){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute }
@@ -83,22 +83,22 @@ Une grande partie des [paquets d'Arch Linux](https://reproducible.archlinux.org) **Fedora Atomic Desktops** sont des variantes de Fedora qui utilisent le gestionnaire de paquets `rpm-ostree` et qui sont fortement axées sur les flux de travail conteneurisés et Flatpak pour les applications de bureau. Toutes ces variantes suivent le même calendrier de publication que Fedora Workstation, bénéficiant des mêmes mises à jour rapides et restant très proches de l'original. -[:octicons-home-16: Page d'accueil](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -Les [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) se présentent sous différentes formes en fonction de l'environnement de bureau que vous préférez, comme **Fedora Silverblue** (qui comprend [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (qui comprend [KDE](https://kde.org/)), **Fedora Sway Atomic**, ou **Fedora Budgie Atomic**. Cependant, nous ne recommandons pas la dernière solution car l'environnement de bureau Budgie [nécessite toujours X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. Cependant, nous ne recommandons pas la dernière solution car l'environnement de bureau Budgie [nécessite toujours X11](https://buddiesofbudgie.org/blog/wayland). -Ces systèmes d'exploitation diffèrent de Fedora Workstation car ils remplacent le gestionnaire de paquets [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) par une alternative beaucoup plus avancée appelée [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). Le gestionnaire de paquets `rpm-ostree` fonctionne en téléchargeant une image de base pour le système, puis en superposant des paquets par-dessus dans une arborescence de commits semblable à [git](https://en.wikipedia.org/wiki/Git). Lorsque le système est mis à jour, une nouvelle image de base est téléchargée et les surcouches seront appliquées à cette nouvelle image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). Le gestionnaire de paquets `rpm-ostree` fonctionne en téléchargeant une image de base pour le système, puis en superposant des paquets par-dessus dans une arborescence de commits semblable à [git](https://en.wikipedia.org/wiki/Git). Lorsque le système est mis à jour, une nouvelle image de base est téléchargée et les surcouches seront appliquées à cette nouvelle image. Une fois la mise à jour terminée, vous redémarrerez le système sur le nouveau déploiement. `rpm-ostree` conserve deux déploiements du système afin que vous puissiez facilement revenir en arrière si quelque chose se casse dans le nouveau déploiement. Il est également possible d'épingler plus de déploiements selon les besoins. -[Flatpak](https://www.flatpak.org) est la méthode principale d'installation du paquet sur ces distributions, car `rpm-ostree` n'est destiné qu'à superposer des paquets qui ne peuvent pas rester à l'intérieur d'un conteneur par dessus l'image de base. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -Comme alternative aux Flatpaks, il y a l'option de [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) pour créer des conteneurs [Podman](https://podman.io) avec un répertoire d'accueil partagé avec le système d'exploitation hôte et imiter un environnement Fedora traditionnel, ce qui est une [fonctionnalité utile](https://containertoolbx.org) pour un développeur averti. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,9 +108,9 @@ Comme alternative aux Flatpaks, il y a l'option de [Toolbox](https://docs.fedora NixOS est une distribution indépendante basée sur le gestionnaire de paquets Nix avec un accent sur la reproductibilité et la fiabilité. -[:octicons-home-16: Page d'accueil](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribuer } +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,9 +136,10 @@ Nix est un gestionnaire de paquets basé sur les sources ; s'il n'y a pas de paq **Whonix** est basée sur [Kicksecure](#kicksecure), une version de Debian axée sur la sécurité. Il vise à assurer la vie privée, la sécurité et l'anonymat sur Internet. Whonix est utilisé de préférence en conjonction avec [Qubes OS](#qubes-os). -[:octicons-home-16: Page d'accueil](https://www.whonix.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -146,9 +147,9 @@ Nix est un gestionnaire de paquets basé sur les sources ; s'il n'y a pas de paq Whonix est conçu pour fonctionner sous la forme de deux machines virtuelles : une "Station de travail" et une "Passerelle" Tor. Toutes les communications de la Station de travail doivent passer par la passerelle Tor. Cela signifie que même si la Station de travail est compromise par un logiciel malveillant quelconque, la véritable adresse IP reste cachée. -Parmi ses fonctionnalités, citons l'isolation des flux Tor, [l'anonymisation des frappes clavier](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [le swap chiffré](https://github.com/Whonix/swap-file-creator), et un allocateur de mémoire renforcé. Les prochaines versions de Whonix incluront probablement [des politiques AppArmor pour l'ensemble du système](https://github.com/Whonix/apparmor-profile-everything) et un [lanceur d'applications bac à sable](https://www.whonix.org/wiki/Sandbox-app-launcher) pour confiner complètement tous les processus sur le système. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix est utilisé de préférence [en conjonction avec Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). Nous avons un [guide recommandé](os/qubes-overview.md#connecting-to-tor-via-a-vpn) sur la configuration de Whonix en conjonction avec un VPN ProxyVM dans Qubes pour cacher vos activités Tor à votre FAI. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). Nous avons un [guide recommandé](os/qubes-overview.md#connecting-to-tor-via-a-vpn) sur la configuration de Whonix en conjonction avec un VPN ProxyVM dans Qubes pour cacher vos activités Tor à votre FAI. ### Tails @@ -158,9 +159,9 @@ Whonix est utilisé de préférence [en conjonction avec Qubes](https://www.whon **Tails** est un système d'exploitation autonome basé sur Debian qui fait passer toutes les communications par Tor, et qui peut démarrer sur presque n'importe quel ordinateur à partir d'un DVD, d'une clé USB ou d'une installation sur carte SD. Il utilise [Tor](tor.md) pour préserver la vie privée et l'anonymat tout en contournant la censure, et il ne laisse aucune trace de son passage sur l'ordinateur sur lequel il est utilisé après avoir été éteint. -[:octicons-home-16: Page d'accueil](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -177,7 +178,7 @@ Tails est excellent pour la contre-analyse en raison de son amnésie (ce qui sig Tails inclut [uBlock Origin](desktop-browsers.md#ublock-origin) dans le Navigateur Tor par défaut, ce qui peut potentiellement faciliter la tâche des adversaires pour identifier l'empreinte numérique des utilisateurs de Tails. Les machines virtuelles [Whonix](desktop.md#whonix) sont peut-être plus étanches, mais elles ne sont pas amnésiques, ce qui signifie que les données peuvent être récupérées sur votre périphérique de stockage. -De par sa conception, Tails est censé se réinitialiser complètement après chaque redémarrage. Le [stockage persistant](https://tails.boum.org/doc/persistent_storage/index.en.html) chiffré peut être configuré pour stocker certaines données entre les redémarrages. +De par sa conception, Tails est censé se réinitialiser complètement après chaque redémarrage. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Distributions axées sur la sécurité @@ -189,12 +190,12 @@ De par sa conception, Tails est censé se réinitialiser complètement après ch **Qubes OS** est un système d'exploitation open-source conçu pour fournir une sécurité forte pour l'informatique de bureau à travers des machines virtuelles sécurisées (ou "qubes"). Qubes est basé sur Xen, le système de fenêtre X, et Linux. Il peut exécuter la plupart des applications Linux et utiliser la plupart des pilotes Linux. -[:octicons-home-16: Page d'accueil](https://www.qubes-os.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Service onion" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Code source" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -214,11 +215,11 @@ Bien que nous [déconseillions](os/linux-overview.md#release-cycle) d'utiliser d **Kicksecure** - en termes simplifiés à l'extrême - est un ensemble de scripts, de configurations et de paquets qui réduisent considérablement la surface d'attaque de Debian. Il couvre par défaut un grand nombre de recommandations en matière de confidentialité et de durcissement. Il sert également de système d'exploitation de base pour [Whonix](#whonix). -[:octicons-home-16: Page d'accueil](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Code source" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/fr/device-integrity.md b/i18n/fr/device-integrity.md index 53417c44..4717b3bf 100644 --- a/i18n/fr/device-integrity.md +++ b/i18n/fr/device-integrity.md @@ -26,7 +26,7 @@ Cela signifie qu'un attaquant devrait régulièrement réinfecter votre appareil Si l'un des outils suivants indique une compromission potentielle par un logiciel espion tel que Pegasus, Predator ou KingsPawn, nous vous conseillons de contacter : -- Si vous êtes défenseur des droits de l'homme, journaliste ou membre d'une organisation de la société civile : le [laboratoire de sécurité d'Amnesty International](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - Si un appareil professionnel ou gouvernemental est compromis : contactez le responsable de la sécurité de votre entreprise, de votre département ou de votre agence - Les forces de l'ordre locales @@ -54,7 +54,7 @@ Les indicateurs publics de compromission ne suffisent pas à déterminer qu'un a Une prise en charge et un triage fiables et complets en matière de criminalistique numérique nécessitent l'accès à des indicateurs non publics, à des recherches et à des renseignements sur les menaces. -La société civile peut bénéficier d'un tel soutien par l'intermédiaire du [laboratoire de sécurité d'Amnesty International](https://www.amnesty.org/en/tech/) ou du [service d'assistance téléphonique sur la sécurité numérique d'Access Now](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ Ces outils peuvent déclencher des faux positifs. Si l'un de ces outils détecte ![Logo MVT](assets/img/device-integrity/mvt.webp){ align=right } -Le **Mobile Verification Toolkit** (**MVT**) est une collection d'utilitaires qui simplifie et automatise le processus d'analyse des appareils mobiles à la recherche de traces potentielles de ciblage ou d'infection par des campagnes connues de logiciels espions. MVT a été développé par Amnesty International et publié en 2021 dans le cadre du [Projet Pegasus](https://forbiddenstories.org/about-the-pegasus-project/). +Le **Mobile Verification Toolkit** (**MVT**) est une collection d'utilitaires qui simplifie et automatise le processus d'analyse des appareils mobiles à la recherche de traces potentielles de ciblage ou d'infection par des campagnes connues de logiciels espions. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Page d'accueil](https://mvt.re/){ .md-button .md-button--primary } -[:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Code source" } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } +[:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Téléchargements -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,8 +110,8 @@ MVT vous permet d'effectuer des analyses plus approfondies si votre appareil est **iMazing** fournit un outil gratuit d'analyse des logiciels espions pour les appareils iOS qui agit comme une interface graphique pour [MVT](#mobile-verification-toolkit). Il peut être beaucoup plus facile à utiliser que MVT, qui lui est un outil en ligne de commande conçu pour les technologues et les enquêteurs judiciaires. -[:octicons-home-16: Page d'accueil](https://imazing.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Politique de confidentialité" } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation}
@@ -167,7 +167,7 @@ Auditor n'est pas un outil de scan/analyse comme d'autres outils sur cette page, Auditor effectue l'attestation et la détection d'intrusion avec **deux** appareils, un _audité_ (l'appareil vérifié) et un _auditeur_ (l'appareil effectuant la vérification). L'auditeur peut être n'importe quel appareil Android 10+ (ou un service web distant géré par [GrapheneOS](android.md#grapheneos)), tandis que l'audité doit être un [appareil pris en charge](https://attestation.app/about#device-support) spécifique. Auditor fonctionne comme tel : -- En utilisant un modèle de [confiance à la première utilisation (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) entre un _auditeur_ et un _audité_, la paire établit une clé privée dans le [magasin de clés s'appuyant sur le matériel](https://source.android.com/security/keystore/) de l'_auditeur_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - L'_auditeur_ peut être une autre instance de l'application Auditor ou le [service d'attestation à distance](https://attestation.app). - L'_auditeur_ enregistre l'état et la configuration actuels de l'_audité_. - Si le système d'exploitation de l'_audité_ est altéré après l'appairage, l'auditeur sera informé de la modification de l'état et de la configuration de l'appareil. @@ -207,13 +207,13 @@ L'utilisation de ces applications ne suffit pas à déterminer qu'un appareil es
Téléchargements -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia est particulièrement efficace pour détecter les logiciels de harcèlement : si vous pensez être victime d'un logiciel de harcèlement, vous devriez [visiter cette page](https://stopstalkerware.org/information-for-survivors/) pour obtenir des conseils. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia est particulièrement efficace pour détecter les logiciels de harcèlem **iVerify** est une application iOS qui analyse automatiquement votre appareil pour vérifier les paramètres de configuration, le niveau des correctifs et d'autres aspects de la sécurité. Il vérifie également que votre appareil ne présente pas d'indicateurs de compromission par des outils de jailbreak ou des logiciels espions tels que Pegasus. -[:octicons-home-16: Page d'accueil](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Téléchargements -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/fr/dns.md b/i18n/fr/dns.md index e911aff4..e497475d 100644 --- a/i18n/fr/dns.md +++ b/i18n/fr/dns.md @@ -11,14 +11,14 @@ Les DNS chiffrés avec des serveurs tiers ne doivent être utilisés que pour co ## Fournisseurs recommandés -| Fournisseur DNS | Politique de confidentialité | Protocoles | Journalisation | ECS | Filtrage | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------ | --------------- | --------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Un peu[^1] | Oui | En fonction de la configuration personnelle. La liste des filtres utilisés peut être consultée ici. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH
DoT | Un peu[^2] | Non | En fonction de la configuration personnelle. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH
DoT
DNSCrypt
DoQ
DoH3 | Optionnelle[^3] | Non | En fonction de la configuration personnelle. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | Aucune[^4] | Non | En fonction de la configuration personnelle. La liste des filtres utilisés peut être consultée ici. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH
DoT
DNSCrypt
DoQ
DoH3 | Optionnelle[^5] | Optionnel | En fonction de la configuration personnelle. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Un peu[^6] | Optionnel | En fonction de la configuration personnelle, blocage des logiciels malveillants par défaut. | +| Fournisseur DNS | Politique de confidentialité | Protocoles | Journalisation | ECS | Filtrage | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------ | --------------- | --------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Un peu[^1] | Oui | En fonction de la configuration personnelle. La liste des filtres utilisés peut être consultée ici. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH
DoT | Un peu[^2] | Non | En fonction de la configuration personnelle. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH
DoT
DNSCrypt
DoQ
DoH3 | Optionnelle[^3] | Non | En fonction de la configuration personnelle. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | Aucune[^4] | Non | En fonction de la configuration personnelle. La liste des filtres utilisés peut être consultée ici. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH
DoT
DNSCrypt
DoQ
DoH3 | Optionnelle[^5] | Optionnel | En fonction de la configuration personnelle. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Un peu[^6] | Optionnel | En fonction de la configuration personnelle, blocage des logiciels malveillants par défaut. | ### Critères @@ -50,7 +50,7 @@ Après l'installation d'un profil de configuration ou d'une application qui util #### Profils signés -Apple ne fournit pas d'interface native pour la création de profils DNS chiffrés. Le [créateur de profil DNS Sécurisé](https://dns.notjakob.com/tool.html) est un outil non officiel permettant de créer vos propres profils DNS chiffrés, mais ils ne seront pas signés. Les profils signés sont préférables ; la signature valide l'origine d'un profil et contribue à garantir l'intégrité des profils. Un label vert "Vérifié" est attribué aux profils de configuration signés. Pour plus d'informations sur la signature de code, voir [A propos de la signature de code](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Les profils signés** sont fournis par [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), et [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple ne fournit pas d'interface native pour la création de profils DNS chiffrés. Le [créateur de profil DNS Sécurisé](https://dns.notjakob.com/tool.html) est un outil non officiel permettant de créer vos propres profils DNS chiffrés, mais ils ne seront pas signés. Les profils signés sont préférables ; la signature valide l'origine d'un profil et contribue à garantir l'intégrité des profils. Un label vert "Vérifié" est attribué aux profils de configuration signés. Pour plus d'informations sur la signature de code, voir [A propos de la signature de code](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Un logiciel de proxy DNS chiffré fourni un proxy local vers lequel le résolveu [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -123,9 +123,9 @@ Une solution DNS auto-hébergée est utile pour assurer le filtrage sur les plat
-![Logo AdGuard Home](assets/img/dns/adguard-home.svg){ align=right } +![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** est un logiciel libre [gouffre DNS](https://wikipedia.org/wiki/DNS_sinkhole) qui utilise le [filtrage DNS](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) pour bloquer les contenus web indésirables, tels que les publicités. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home est doté d'une interface web conviviale qui permet de visualiser et de gérer le contenu bloqué. @@ -142,25 +142,25 @@ AdGuard Home est doté d'une interface web conviviale qui permet de visualiser e
-![Logo Pi-hole](assets/img/dns/pi-hole.svg){ align=right } +![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** est un [gouffre DNS](https://wikipedia.org/wiki/DNS_sinkhole) open-source qui utilise le [filtrage DNS](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) pour bloquer les contenus web indésirables, tels que les publicités. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole est conçu pour être hébergé sur un Raspberry Pi, mais il n'est pas limité à ce type de matériel. Le logiciel est doté d'une interface web conviviale permettant de visualiser et de gérer les contenus bloqués. -[:octicons-home-16: Page d'accueil](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Code source" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
[^1]: AdGuard stocke des mesures de performance agrégées de ses serveurs DNS, à savoir le nombre de demandes complètes adressées à un serveur particulier, le nombre de demandes bloquées et la vitesse de traitement des demandes. Ils conservent et stockent également la base de données des domaines demandés dans les dernières 24 heures. "Nous avons besoin de ces informations pour identifier et bloquer les nouveaux traqueurs et menaces." "Nous enregistrons également le nombre de fois où tel ou tel traqueur a été bloqué. Nous avons besoin de ces informations pour supprimer les règles obsolètes de nos filtres." [https://adguard.com/fr/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare ne collecte et ne stocke que les données limitées des requêtes DNS qui sont envoyées au résolveur 1.1.1.1. Le service de résolution 1.1.1.1 n'enregistre pas de données personnelles, et la majeure partie des données de requête limitées et non personnellement identifiables n'est stockée que pendant 25 heures. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare ne collecte et ne stocke que les données limitées des requêtes DNS qui sont envoyées au résolveur 1.1.1.1. Le service de résolution 1.1.1.1 n'enregistre pas de données personnelles, et la majeure partie des données de requête limitées et non personnellement identifiables n'est stockée que pendant 25 heures. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D n'enregistre que les résolveurs Premium avec des profils DNS personnalisés. Les résolveurs libres n'enregistrent pas de données. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Le service DNS de Mullvad est disponible à la fois pour les abonnés et les non-abonnés de Mullvad VPN. Leur politique de confidentialité affirme explicitement qu'ils n'enregistrent pas les requêtes DNS de quelque manière que ce soit. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Le service DNS de Mullvad est disponible à la fois pour les abonnés et les non-abonnés de Mullvad VPN. Leur politique de confidentialité affirme explicitement qu'ils n'enregistrent pas les requêtes DNS de quelque manière que ce soit. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. Vous pouvez choisir les durées de conservation et les emplacements de stockage des journaux pour tous les journaux que vous choisissez de conserver. Si ce n'est pas spécifiquement demandé, aucune donnée n'est enregistrée. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 recueille certaines données à des fins de surveillance et de réponse aux menaces. Ces données peuvent ensuite être remélangées et partagées, par exemple à des fins de recherche sur la sécurité. Quad9 ne collecte ni n'enregistre les adresses IP ou d'autres données qu'elle juge personnellement identifiables. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 recueille certaines données à des fins de surveillance et de réponse aux menaces. Ces données peuvent ensuite être remélangées et partagées, par exemple à des fins de recherche sur la sécurité. Quad9 ne collecte ni n'enregistre les adresses IP ou d'autres données qu'elle juge personnellement identifiables. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/fr/email-clients.md b/i18n/fr/email-clients.md index 14c05c16..cba98889 100644 --- a/i18n/fr/email-clients.md +++ b/i18n/fr/email-clients.md @@ -28,17 +28,17 @@ OpenPGP ne prend pas non plus en charge la [confidentialité persistante](https: **Thunderbird** est un client d'e-mail, de groupes de discussion, de flux d'informations et de chat (XMPP, IRC, Matrix) gratuit, open-source et multiplateforme, développé par la communauté Thunderbird, et précédemment par la Fondation Mozilla. -[:octicons-home-16: Page d'accueil](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Politique de confidentialité" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} -[:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Code source" } +[:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
-Téléchargements +Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -74,8 +74,8 @@ Ces options se trouvent dans :material-menu: → **Paramètres** → **Confident **Apple Mail** est inclus dans macOS et peut être étendu pour prendre en charge OpenPGP avec [GPG Suite](/encryption/# gpg-suite), ce qui ajoute la possibilité d'envoyer des e-mails chiffrés. -[:octicons-home-16: Page d'accueil](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Politique de confidentialité" } +[:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation}
@@ -92,9 +92,9 @@ Apple Mail a la possibilité de charger le contenu distant en arrière-plan ou d **Canary Mail** est un client d'e-mail payant conçu pour rendre le chiffrement de bout en bout transparent grâce à des fonctions de sécurité telles que le verrouillage biométrique des applications. -[:octicons-home-16: Page d'accueil](https://canarymail.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Téléchargements @@ -124,11 +124,11 @@ Canary Mail est à source fermée. Nous le recommandons en raison du peu de choi **FairEmail** est une application d'e-mail minimale et open-source, utilisant des standards ouverts (IMAP, SMTP, OpenPGP) avec une faible consommation de données et de batterie. -[:octicons-home-16: Page d'accueil](https://email.faircode.eu){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Politique de confidentialité" } +[:octicons-home-16: Homepage](https://email.faircode.eu){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Code source" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribuer } +[:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Téléchargements @@ -146,13 +146,13 @@ Canary Mail est à source fermée. Nous le recommandons en raison du peu de choi ![Logo Evolution](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** est une application de gestion des informations personnelles qui fournit des fonctionnalités intégrées d'e-mail, de calendrier et de carnet d'adresses. Evolution dispose d'une vaste [documentation](https://help.gnome.org/users/evolution/stable/) pour vous aider à démarrer. +**Evolution** est une application de gestion des informations personnelles qui fournit des fonctionnalités intégrées d'e-mail, de calendrier et de carnet d'adresses. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. -[:octicons-home-16: Page d'accueil](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } -[:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Code source" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } +[:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Téléchargements @@ -173,11 +173,11 @@ Canary Mail est à source fermée. Nous le recommandons en raison du peu de choi À l'avenir, K-9 Mail sera le client Thunderbird [officiel](https://k9mail.app/2022/06/13/K-9-Mail-and-Thunderbird.html) pour Android . -[:octicons-home-16: Page d'accueil](https://k9mail.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Code source" } -[:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } +[:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute }
Téléchargements @@ -204,11 +204,11 @@ Lorsque vous répondez à un membre d'une liste de diffusion, l'option "répondr **Kontact** est une application de gestion des informations personnelles (PIM) issue du projet [KDE](https://kde.org). Il offre un client d'e-mail, un carnet d'adresses, un organiseur et un client RSS. -[:octicons-home-16: Page d'accueil](https://kontact.kde.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} -[:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Code source" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} +[:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Téléchargements @@ -228,10 +228,10 @@ Lorsque vous répondez à un membre d'une liste de diffusion, l'option "répondr **Mailvelope** est une extension de navigateur qui permet l'échange d'e-mails chiffrés selon la norme de chiffrement OpenPGP. -[:octicons-home-16: Page d'accueil](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Politique de confidentialité" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Code source" } +[:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" }
Téléchargements @@ -254,10 +254,10 @@ Lorsque vous répondez à un membre d'une liste de diffusion, l'option "répondr NeoMutt est un client textuel qui a une courbe d'apprentissage abrupte. Il est cependant très personnalisable. -[:octicons-home-16: Page d'accueil](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Code source" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Téléchargements diff --git a/i18n/fr/email.md b/i18n/fr/email.md index 45a49614..7aa67c40 100644 --- a/i18n/fr/email.md +++ b/i18n/fr/email.md @@ -52,10 +52,10 @@ OpenPGP ne prend pas non plus en charge la confidentialité persistante, ce qui [:octicons-code-16:](https://github.com/ProtonMail){ .card-link title="Code source" }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail dispose de rapports de plantages internes qu'il **ne partage pas** a #### :material-check:{ .pg-green } Domaines personnalisés et alias -Les abonnés payants à Proton Mail peuvent utiliser leur propre domaine avec le service ou une adresse [fourre-tout](https://proton.me/support/catch-all). Proton Mail prend également en charge le [sous-adressage](https://proton.me/support/creating-aliases), ce qui est utile pour les personnes qui ne souhaitent pas acheter un domaine. +Les abonnés payants à Proton Mail peuvent utiliser leur propre domaine avec le service ou une adresse [fourre-tout](https://proton.me/support/catch-all). Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Modes de paiement privés @@ -129,7 +129,7 @@ Proton Mail ne propose pas de fonction d'héritage numérique. #### :material-check:{ .pg-green } Domaines personnalisés et alias -Mailbox.org vous permet d'utiliser votre propre domaine et prend en charge les adresses [fourre-tout](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain). Mailbox.org prend également en charge le [sous-adressage](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), ce qui est utile pour les personnes qui ne souhaitent pas acheter un domaine. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Modes de paiement privés @@ -137,17 +137,17 @@ Mailbox.org n'accepte aucune crypto-monnaie en raison de la suspension des activ #### :material-check:{ .pg-green } Sécurité du compte -Mailbox.org prend en charge l'[authentification à deux facteurs](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) pour son interface d'e-mail web uniquement. Vous pouvez utiliser soit TOTP, soit une [YubiKey](https://fr.wikipedia.org/wiki/YubiKey) via le [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Les normes web telles que [WebAuthn](https://fr.wikipedia.org/wiki/WebAuthn) ne sont pas encore prises en charge. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Les normes web telles que [WebAuthn](https://fr.wikipedia.org/wiki/WebAuthn) ne sont pas encore prises en charge. #### :material-information-outline:{ .pg-blue } Sécurité des données -Mailbox.org permet le chiffrement des e-mails entrant à l'aide de sa [boîte mails chiffrée](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). Les nouveaux messages que vous recevrez seront alors immédiatement chiffrés avec votre clé publique. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). Les nouveaux messages que vous recevrez seront alors immédiatement chiffrés avec votre clé publique. -Cependant, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), la plateforme logicielle utilisée par Mailbox.org, [ne prend pas en charge](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) le chiffrement de votre carnet d'adresses et de votre calendrier. Une [option tierce](calendar.md) pourrait être plus appropriée pour ces informations. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. Une [option tierce](calendar.md) pourrait être plus appropriée pour ces informations. #### :material-check:{ .pg-green } Chiffrement des e-mails -Mailbox.org a [du chiffrement intégré](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) dans son interface d'e-mail web, ce qui simplifie l'envoi de messages à des personnes possédant des clés OpenPGP publiques. Ils permettent également aux [destinataires distants de déchiffrer un e-mail](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) sur les serveurs de Mailbox.org. Cette fonction est utile lorsque le destinataire distant ne dispose pas d'OpenPGP et ne peut pas déchiffrer une copie de l'e-mail dans sa propre boîte mail. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. Cette fonction est utile lorsque le destinataire distant ne dispose pas d'OpenPGP et ne peut pas déchiffrer une copie de l'e-mail dans sa propre boîte mail. Mailbox.org prend également en charge la découverte de clés publiques via HTTP à partir de leur [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). Cela permet aux personnes extérieures à Mailbox.org de trouver facilement les clés OpenPGP des comptes Mailbox.org, pour un E2EE inter-fournisseurs. Cela ne s'applique qu'aux adresses e-mails se terminant par un domaine Mailbox, comme @mailbox.org. Si vous utilisez un domaine personnalisé, vous devez [configurer le WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) séparément. @@ -157,9 +157,9 @@ Votre compte sera défini comme un compte d'utilisateur restreint à la fin de v #### :material-information-outline:{ .pg-blue } Fonctionnalités supplémentaires -Vous pouvez accéder à votre compte Mailbox.org via IMAP/SMTP en utilisant leur [service .onion](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). Cependant, leur interface d'e-mail web n'est pas accessible via leur service .onion et vous pouvez rencontrer des erreurs de certificat TLS. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). Cependant, leur interface d'e-mail web n'est pas accessible via leur service .onion et vous pouvez rencontrer des erreurs de certificat TLS. -Tous les comptes sont assortis d'un espace de stockage cloud limité qui [peut être chiffré](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org propose également l'alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), qui applique le chiffrement TLS à la connexion entre les serveurs d'e-mail, faute de quoi le message ne sera pas envoyé. Mailbox.org prend également en charge [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) en plus des protocoles d'accès standard comme IMAP et POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org prend également en charge [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) en plus des protocoles d'accès standard comme IMAP et POP3. Mailbox.org dispose d'une fonction d'héritage numérique pour toutes les offres. Vous pouvez choisir de transmettre certaines de vos données à vos héritiers, à condition d'en faire la demande et de fournir votre testament. Vous pouvez également désigner une personne par son nom et son adresse. @@ -181,22 +181,22 @@ Ces fournisseurs stockent vos e-mails avec un chiffrement à connaissance zéro, **Tuta** est un service d'e-mail qui met l'accent sur la sécurité et la confidentialité grâce à l'utilisation du chiffrement. Tuta est en activité depuis **2011** et est basée à Hanovre, en Allemagne. Les comptes commencent avec 1 Go de stockage avec leur offre gratuite. -[:octicons-home-16: Page d'accueil](https://tuta.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Politique de confidentialité" } +[:octicons-home-16: Homepage](https://tuta.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Code source" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribuer } +[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta ne prend pas en charge le [protocole IMAP](https://tuta.com/faq/#imap) ni l #### :material-check:{ .pg-green } Domaines personnalisés et alias -Les comptes Tuta payants peuvent utiliser 15 ou 30 alias en fonction de leur offre et un nombre illimité d'alias sur [domaines personnalisés](https://tuta.com/faq#custom-domain). Tuta ne permet pas le [sous-adressage (adresses plus)](https://tuta.com/faq#plus), mais vous pouvez utiliser une adresse [fourre-tout](https://tuta.com/howto#settings-global) avec un domaine personnalisé. +Les comptes Tuta payants peuvent utiliser 15 ou 30 alias en fonction de leur offre et un nombre illimité d'alias sur [domaines personnalisés](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Modes de paiement privés @@ -232,7 +232,7 @@ Tuta supprimera [les comptes gratuits inactifs](https://tuta.com/faq#inactive-ac Tuta offre la version professionnelle de [Tuta aux organisations à but non lucratif](https://tuta.com/blog/posts/secure-email-for-non-profit) gratuitement ou avec une forte réduction. -Tuta dispose également d'une fonction commerciale appelée [Secure Connect](https://tuta.com/secure-connect/). Cela garantit que le contact du client avec l'entreprise utilise E2EE. La fonctionnalité coûte 240 €/an. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). Cela garantit que le contact du client avec l'entreprise utilise E2EE. La fonctionnalité coûte 240 €/an. Tuta ne propose pas de fonction d'héritage numérique. @@ -280,18 +280,18 @@ L'utilisation d'un service d'alias nécessite de faire confiance à la fois à v [:octicons-heart-16:](https://addy.io/donate){ .card-link title=Contribuer }
-Téléchargements +Downloads - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-Le nombre d'alias partagés (qui se terminent par un domaine partagé comme @addy.io) que vous pouvez créer est limité à 10 sur l'offre gratuite d'addy.io, à 50 sur leur offre à $1/mois et illimité sur leur offre à $4/mois (facturé $3 pour un an). Vous pouvez créer un nombre illimité d'alias standard (qui se terminent par un domaine tel que @[nomdutilisateur].addy.io ou un domaine personnalisé sur les offres payantes), mais, comme nous l'avons déjà mentionné, cela peut nuire à la confidentialité car les gens peuvent trivialement relier vos alias standard en se basant sur le seul nom de domaine. Ils sont utiles lorsqu'un domaine partagé peut être bloqué par un service. Securitum [a audité](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io en septembre 2023 et aucune vulnérabilité significative [n'a été identifiée](https://addy.io/addy-io-security-audit.pdf). +Le nombre d'alias partagés (qui se terminent par un domaine partagé comme @addy.io) que vous pouvez créer est limité à 10 sur l'offre gratuite d'addy.io, à 50 sur leur offre à $1/mois et illimité sur leur offre à $4/mois (facturé $3 pour un an). Vous pouvez créer un nombre illimité d'alias standard (qui se terminent par un domaine tel que @[nomdutilisateur].addy.io ou un domaine personnalisé sur les offres payantes), mais, comme nous l'avons déjà mentionné, cela peut nuire à la confidentialité car les gens peuvent trivialement relier vos alias standard en se basant sur le seul nom de domaine. Ils sont utiles lorsqu'un domaine partagé peut être bloqué par un service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Fonctions gratuites notables : @@ -309,27 +309,27 @@ Fonctions gratuites notables : **SimpleLogin** est un service gratuit qui fournit des alias d'e-mail sur une variété de noms de domaine partagés, et offre en option des fonctionnalités payantes comme des alias illimités et des domaines personnalisés. -[:octicons-home-16: Page d'accueil](https://simplelogin.io/fr/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/simple-login){ .card-link title="Code source" } +[:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin a été [acquis par Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) à compter du 8 avril 2022. Si vous utilisez Proton Mail pour votre boîte mail principale, SimpleLogin est un excellent choix. Les deux produits étant désormais détenus par la même société, vous ne devez plus faire confiance qu'à une seule entité. Nous supposons également que SimpleLogin sera plus étroitement intégré aux offres de Proton à l'avenir. SimpleLogin continue de prendre en charge la redirection vers le fournisseur d'e-mail de votre choix. Securitum [a audité](https://simplelogin.io/blog/security-audit/) SimpleLogin début 2022 et tous les problèmes [ont été résolus](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin a été [acquis par Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) à compter du 8 avril 2022. Si vous utilisez Proton Mail pour votre boîte mail principale, SimpleLogin est un excellent choix. Les deux produits étant désormais détenus par la même société, vous ne devez plus faire confiance qu'à une seule entité. Nous supposons également que SimpleLogin sera plus étroitement intégré aux offres de Proton à l'avenir. SimpleLogin continue de prendre en charge la redirection vers le fournisseur d'e-mail de votre choix. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). Vous pouvez lier votre compte SimpleLogin avec votre compte Proton dans les paramètres de SimpleLogin. Si vous avez l'offre Proton Illimité, Entreprise, ou Visionnaire, vous aurez SimpleLogin Premium gratuitement. @@ -351,10 +351,10 @@ Les administrateurs système peuvent envisager de mettre en place leur propre se **Mailcow** est un serveur d'e-mail plus avancé, parfait pour ceux qui ont un peu plus d'expérience de Linux. Il possède tout ce dont vous avez besoin dans un conteneur Docker : un serveur d'e-mail avec prise en charge de DKIM, une surveillance antivirus et spam, une interface d'e-mail web et ActiveSync avec SOGo, et une administration basée sur le web avec prise en charge de l'A2F. -[:octicons-home-16: Page d'accueil](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Code source" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Les administrateurs système peuvent envisager de mettre en place leur propre se Pour une approche plus manuelle, nous avons choisi ces deux articles : -- [Configuration d'un serveur mail avec OpenSMTPD, Dovecot et Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [Comment gérer votre propre serveur d'e-mail](https://www.c0ffee.net/blog/mail-server-guide/) (août 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Critères @@ -386,7 +386,7 @@ Nous considérons ces caractéristiques comme importantes afin de fournir un ser **Minimum pour se qualifier :** - Chiffre les données du compte e-mail au repos avec un chiffrement à accès zéro. -- Capacité d'export en tant que [Mbox](https://en.wikipedia.org/wiki/Mbox) ou .eml individuel avec standard [RFC5322](https://datatracker.ietf.org/doc/rfc5322/). +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Permet aux utilisateurs d'utiliser leur propre [nom de domaine](https://en.wikipedia.org/wiki/Domain_name). Les noms de domaine personnalisés sont importants pour les utilisateurs car ils leur permettent de conserver leur indépendance du service, au cas où celui-ci tournerait mal ou serait racheté par une autre société qui ne donne pas priorité à la vie privée. - Fonctionne sur sa propre infrastructure, c'est-à-dire qu'elle ne repose pas sur des fournisseurs de services d'e-mail tiers. @@ -397,7 +397,7 @@ Nous considérons ces caractéristiques comme importantes afin de fournir un ser - Prise en charge de [WKD](https://wiki.gnupg.org/WKD) pour permettre une meilleure découverte des clés publiques OpenPGP via HTTP. Les utilisateurs de GnuPG peuvent obtenir une clé en tapant : `gpg --locate-key utilisateur_exemple@exemple.fr` - Prise en charge d'une boîte mail temporaire pour les utilisateurs externes. Cette fonction est utile lorsque vous souhaitez envoyer un e-mail chiffré, sans envoyer une copie réelle à votre destinataire. Ces e-mails ont généralement une durée de vie limitée et sont ensuite automatiquement supprimés. Ils n'obligent pas non plus le destinataire à configurer un système de chiffrement comme OpenPGP. - Disponibilité des services du fournisseur d'e-mail via un [service onion](https://en.wikipedia.org/wiki/.onion). -- Prise en charge du [sous-adressage](https://en.wikipedia.org/wiki/Email_address#Subaddressing). +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Fonctionnalité fourre-tout ou alias pour ceux qui possèdent leurs propres domaines. - Utilisation de protocoles standard d'accès aux e-mails tels que IMAP, SMTP ou [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Les protocoles d'accès standard garantissent que les clients peuvent facilement télécharger l'ensemble de leurs e-mails, s'ils souhaitent changer de fournisseur. @@ -425,13 +425,13 @@ Les serveurs d'e-mail traitent un grand nombre de données très sensibles. Nous - Protection de l'interface d'e-mail web avec une A2F, tel que TOTP. - Le chiffrement à accès zéro, qui complète le chiffrement au repos. Le fournisseur ne dispose pas des clés de déchiffrement des données qu'il détient. Cela permet d'éviter qu'un employé malhonnête ne divulgue les données auxquelles il a accès ou qu'un adversaire distant ne divulgue les données qu'il a volées en obtenant un accès non autorisé au serveur. - Prise en charge de [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions). -- Aucune erreurs ou vulnérabilités TLS lors du profilage par des outils tels que [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), ou [Qualys SSL Labs](https://www.ssllabs.com/ssltest); cela inclut les erreurs liées aux certificats et les paramètres DH faibles, tels que ceux qui ont conduit à [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - Une préférence pour les serveurs (facultatif sur TLSv1.3) pour des suites de chiffrement fortes qui prennent en charge la confidentialité persistante et le chiffrement authentifié. - Une politique valide [MTA-STS](https://tools.ietf.org/html/rfc8461) et [TLS-RPT](https://tools.ietf.org/html/rfc8460). - Des enregistrements [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) valides. - Des enregistrements [SPF](https://fr.wikipedia.org/wiki/Sender_Policy_Framework) et [DKIM](https://fr.wikipedia.org/wiki/DomainKeys_Identified_Mail) valides. - Disposer d'un enregistrement et d'une politique [DMARC](https://fr.wikipedia.org/wiki/DMARC) appropriés ou utiliser [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) pour l'authentification. Si l'authentification DMARC est utilisée, la politique doit être définie comme suit : `reject` ou `quarantine`. -- Une préférence pour une suite de serveur TLS 1.2 ou plus récente et un plan pour [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - Une soumission [SMTPS](https://en.wikipedia.org/wiki/SMTPS), en supposant que le SMTP est utilisé. - Des normes de sécurité des sites web telles que : - [HTTP Strict Transport Security](https://fr.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Les serveurs d'e-mail traitent un grand nombre de données très sensibles. Nous - Des programmes de primes aux bugs et/ou un processus coordonné de divulgation des vulnérabilités. - Des normes de sécurité des sites web telles que : - [Content Security Policy (CSP)](https://fr.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Confiance diff --git a/i18n/fr/encryption.md b/i18n/fr/encryption.md index fb45367c..62036f8d 100644 --- a/i18n/fr/encryption.md +++ b/i18n/fr/encryption.md @@ -20,17 +20,17 @@ Les options répertoriées ici sont multiplateformes et parfaites pour créer de **Cryptomator** est une solution de chiffrement conçue pour enregistrer vos fichiers de manière privée vers n'importe quel fournisseur de cloud. Il vous permet de créer des coffres-forts qui sont stockés sur un disque virtuel, dont le contenu est chiffré et synchronisé avec votre fournisseur de stockage cloud. -[:octicons-home-16: Page d'accueil](https://cryptomator.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Code source" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator utilise le chiffrement AES-256 pour chiffrer les fichiers et les nom Certaines bibliothèques cryptographiques de Cryptomator ont été [auditées](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) par Cure53. La portée des bibliothèques auditées comprend: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) et [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). L'audit ne s'est pas étendu à [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), qui est une bibliothèque utilisée par Cryptomator pour iOS. -La documentation de Cryptomator détaille sa [cible de sécurité](https://docs.cryptomator.org/en/latest/security/security-target/), son [architecture de sécurité](https://docs.cryptomator.org/en/latest/security/architecture/), et ses [meilleures pratiques](https://docs.cryptomator.org/en/latest/security/best-practices/) prévues pour une utilisation de manière plus détaillée. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (Fichier) @@ -79,17 +79,17 @@ La documentation de Cryptomator détaille sa [cible de sécurité](https://docs. **VeraCrypt** est un utilitaire gratuit et open source pour le chiffrement de fichiers/dossiers à la volée. Il peut créer un disque virtuel chiffré dans un fichier, chiffrer une partition ou l'ensemble du périphérique de stockage avec une authentification avant le démarrage. -[:octicons-home-16: Page d'accueil](https://veracrypt.fr){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Code source" } -[:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribuer } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
-Téléchargements +Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ Pour chiffrer le disque à partir duquel votre système d'exploitation démarre, ![Logo BitLocker](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** est la solution de chiffrement intégral de volume fournie avec Microsoft Windows. La principale raison pour laquelle nous le recommandons pour le chiffrement de votre disque de démarrage est son [utilisation du TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, une société d'expertise judiciaire, a écrit sur cette fonctionnalité dans [Comprendre la protection TPM de BitLocker](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** est la solution de chiffrement intégral de volume fournie avec Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/fr-fr/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker est [uniquement pris en charge](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) sur les éditions Pro, Entreprise et Éducation de Windows. Il peut être activé sur les éditions Famille à condition qu'elles remplissent les pré-requis. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. Il peut être activé sur les éditions Famille à condition qu'elles remplissent les pré-requis.
Activer BitLocker dans Windows Famille @@ -136,7 +136,7 @@ Pour activer BitLocker sur les éditions "Famille" de Windows, vous devez format powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Accédez à [Options de démarrage avancées](https://support.microsoft.com/fr-fr/windows/options-de-d%C3%A9marrage-avanc%C3%A9es-y-compris-le-mode-sans-%C3%A9chec-b90e7808-80b5-a291-d4b8-1a1af602b617). Vous devez redémarrer en appuyant sur la touche F8 avant que Windows ne démarre et aller dans l'*invite de commande* dans **Dépannage** → **Options avancées** → **Invite de commande**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). Vous devez redémarrer en appuyant sur la touche F8 avant que Windows ne démarre et aller dans l'*invite de commande* dans **Dépannage** → **Options avancées** → **Invite de commande**. 4. Connectez-vous avec votre compte administrateur et tapez ceci dans l'invite de commande pour lancer le chiffrement: ```powershell manage-bde -on c: -used @@ -183,9 +183,9 @@ Nous recommandons de stocker une clé de récupération locale dans un endroit s **LUKS** est la méthode de chiffrement de disque par défaut pour Linux. Elle peut être utilisée pour chiffrer des volumes complets, des partitions ou créer des conteneurs chiffrés. -[:octicons-home-16: Page d'accueil](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Code source" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Les outils dotés d'une interface de ligne de commande sont utiles pour intégre ![Logo Kryptor](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** est un outil gratuit et open source de chiffrement et de signature de fichiers qui utilise des algorithmes cryptographiques modernes et sécurisés. Il vise à être une meilleure version d'[age](https://github.com/FiloSottile/age) et [Minisign](https://jedisct1.github.io/minisign/) pour fournir une alternative simple et facile à GPG. +**Kryptor** est un outil gratuit et open source de chiffrement et de signature de fichiers qui utilise des algorithmes cryptographiques modernes et sécurisés. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Page d'accueil](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Code source" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
-Téléchargements +Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Les outils dotés d'une interface de ligne de commande sont utiles pour intégre **Tomb** est un outil pour LUKS en ligne de commande shell. Il prend en charge la stéganographie via des [outils tiers](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Page d'accueil](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Code source" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribuer } +[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,15 +271,15 @@ Les outils dotés d'une interface de ligne de commande sont utiles pour intégre OpenPGP est parfois nécessaire pour des tâches spécifiques telles que la signature numérique et le chiffrage des e-mails. PGP possède de nombreuses fonctionnalités et est [complexe](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) car il existe depuis longtemps. Pour des tâches telles que la signature ou le chiffrement des fichiers, nous suggérons les options ci-dessus. -Lorsque vous chiffrez avec PGP, vous avez la possibilité de configurer différentes options dans votre fichier `gpg.conf` . Nous recommandons de suivre les options standard spécifiées dans la [FAQ de l'utilisateur de GnuPG](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +Lorsque vous chiffrez avec PGP, vous avez la possibilité de configurer différentes options dans votre fichier `gpg.conf` . We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Utiliser future-defaults lors de la génération d'une clé

-Lorsque vous [générez des clés](https://www.gnupg.org/gph/en/manual/c14.html), nous vous suggérons d'utiliser la commande `future-default` car elle demandera à GnuPG d'utiliser de la cryptographie moderne telle que [Curve25519](https://fr.wikipedia.org/wiki/Curve25519) et [Ed25519](https://ed25519.cr.yp.to/) : +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash -gpg --quick-gen-key alice@exemple.fr future-default +gpg --quick-gen-key alice@example.com future-default ```
@@ -290,7 +290,7 @@ gpg --quick-gen-key alice@exemple.fr future-default ![Logo de GNU Privacy Guard](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** est une alternative sous licence GPL de la suite de logiciels cryptographiques PGP. GnuPG est conforme [RFC 4880](https://tools.ietf.org/html/rfc4880), qui est la spécification actuelle de l'IETF pour OpenPGP. Le projet GnuPG a travaillé sur une [nouvelle ébauche](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) dans le but de moderniser OpenPGP. GnuPG fait partie du projet logiciel GNU de la Free Software Foundation et a reçu un [financement](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) majeur du gouvernement allemand. +**GnuPG** est une alternative sous licence GPL de la suite de logiciels cryptographiques PGP. GnuPG est conforme [RFC 4880](https://tools.ietf.org/html/rfc4880), qui est la spécification actuelle de l'IETF pour OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG fait partie du projet logiciel GNU de la Free Software Foundation et a reçu un [financement](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) majeur du gouvernement allemand. [:octicons-home-16: Page d'accueil](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Politique de confidentialité" } @@ -369,12 +369,12 @@ Nous vous recommandons de consulter leurs [Premiers pas](https://gpgtools.tender ![Logo OpenKeychain](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** est une implémentation Android de GnuPG. Elle est généralement requise par les clients de messagerie comme [K-9 Mail](email-clients.md#k-9-mail) et [FairEmail](email-clients.md#fairemail) et d'autres applications Android pour fournir la prise en charge du chiffrement. Cure53 a réalisé un [audit de sécurité](https://www.openkeychain.org/openkeychain-3-6) d'OpenKeychain 3.6 en octobre 2015. Les détails techniques concernant l'audit et les solutions d'OpenKeychain peuvent être trouvés [ici](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** est une implémentation Android de GnuPG. Elle est généralement requise par les clients de messagerie comme [K-9 Mail](email-clients.md#k-9-mail) et [FairEmail](email-clients.md#fairemail) et d'autres applications Android pour fournir la prise en charge du chiffrement. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Les détails techniques concernant l'audit et les solutions d'OpenKeychain peuvent être trouvés [ici](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Page d'accueil](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Code source" } +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
Téléchargements diff --git a/i18n/fr/file-sharing.md b/i18n/fr/file-sharing.md index c9babbef..c6d3b154 100644 --- a/i18n/fr/file-sharing.md +++ b/i18n/fr/file-sharing.md @@ -15,7 +15,7 @@ Découvrez comment partager vos fichiers en toute confidentialité entre vos app ![Logo de Send](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** est un fork du service Firefox Send de Mozilla, qui a été abandonné, et qui vous permet d'envoyer des fichiers à d'autres personnes à l'aide d'un lien. Les fichiers sont chiffrés sur votre appareil afin qu'ils ne puissent pas être lus par le serveur, et ils peuvent également être protégés par un mot de passe. Le responsable de Send héberge une [instance publique](https://send.vis.ee/). Vous pouvez utiliser d'autres instances publiques, ou vous pouvez héberger Send vous-même. +**Send** est un fork du service Firefox Send de Mozilla, qui a été abandonné, et qui vous permet d'envoyer des fichiers à d'autres personnes à l'aide d'un lien. Les fichiers sont chiffrés sur votre appareil afin qu'ils ne puissent pas être lus par le serveur, et ils peuvent également être protégés par un mot de passe. The maintainer of Send hosts a [public instance](https://send.vis.ee). Vous pouvez utiliser d'autres instances publiques, ou vous pouvez héberger Send vous-même. [:octicons-home-16: Page d'accueil](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Instances publiques"} @@ -80,10 +80,10 @@ Nous travaillons à l'établissement de critères définis pour chaque section d **FreedomBox** est un système d'exploitation conçu pour être exécuté sur un [single-board computer (SBC)](https://en.wikipedia.org/wiki/Single-board_computer). L'objectif est de faciliter la mise en place d'applications serveur que vous pourriez vouloir auto-héberger. -[:octicons-home-16: Page d'accueil](https://freedombox.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} -[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Code source" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribuer } +[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -99,11 +99,11 @@ Nous travaillons à l'établissement de critères définis pour chaque section d **Nextcloud** est une suite de logiciels client-serveur gratuits et open-source permettant de créer vos propres services d'hébergement de fichiers sur un serveur privé que vous contrôlez. -[:octicons-home-16: Page d'accueil](https://nextcloud.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Code source" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Téléchargements @@ -134,19 +134,19 @@ Nous ne recommandons pas l'utilisation de [l'application E2EE](https://apps.next **Syncthing** est un utilitaire open-source de synchronisation continue de fichiers de pair à pair. Il est utilisé pour synchroniser des fichiers entre deux ou plusieurs appareils via le réseau local ou internet. Syncthing n'utilise pas de serveur centralisé ; il utilise le [Protocole d'Échange de Blocs](https://docs.syncthing.net/specs/bep-v1.html#bep-v1) pour transférer les données entre appareils. Toutes les données sont chiffrées à l'aide de TLS. -[:octicons-home-16: Page d'accueil](https://syncthing.net){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/syncthing){ .card-link title="Code source" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribuer } +[:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/fr/financial-services.md b/i18n/fr/financial-services.md index da8331b1..f271c8ae 100644 --- a/i18n/fr/financial-services.md +++ b/i18n/fr/financial-services.md @@ -28,9 +28,9 @@ De nombreuses banques et fournisseurs de cartes de crédit proposent une fonctio L'offre gratuite de **Privacy.com** vous permet de créer jusqu'à 12 cartes virtuelles par mois, de fixer des limites de dépenses pour ces cartes et de les arrêter instantanément. Son offre payante vous permet de créer jusqu'à 36 cartes par mois, d'obtenir 1 % de remise en argent sur vos achats et de masquer les informations relatives aux transactions à votre banque. -[:octicons-home-16: Page d'accueil](https://privacy.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com transmet par défaut à votre banque des informations sur les commer **MySudo** fournit jusqu'à 9 cartes virtuelles en fonction de l'offre que vous prenez. Leurs offres payantes comprennent en outre des fonctionnalités qui peuvent être utiles pour effectuer des achats de façon privée, telles que des numéros de téléphone et des adresses email virtuels, bien que nous recommandions généralement d'autres [fournisseurs d'alias d'email](email.md) pour une utilisation plus poussée des alias d'email. -[:octicons-home-16: Page d'accueil](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ Ces services vous permettent d'acheter des cartes-cadeaux pour une variété de **CoinCards** (disponible aux Etats-Unis et au Canada) vous permet d'acheter des cartes-cadeaux auprès d'un grand nombre de commerçants. -[:octicons-home-16: Page d'accueil](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/fr/frontends.md b/i18n/fr/frontends.md index 8a120ac0..fcafc1d9 100644 --- a/i18n/fr/frontends.md +++ b/i18n/fr/frontends.md @@ -17,9 +17,9 @@ Lorsque vous utilisez une instance gérée par quelqu'un d'autre, veillez à lir
-![Logo ProxiTok](assets/img/frontends/proxitok.svg){ align=right } +![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** est un client applicatif open source pour le site web [TikTok](https://www.tiktok.com) qui est également auto-hébergeable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ Par défaut, FreeTube bloque toutes les publicités YouTube. En outre, FreeTube [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ Par défaut, FreeTube bloque toutes les publicités YouTube. En outre, FreeTube

Avertissement

-Lorsque vous utilisez FreeTube, votre adresse IP peut encore être connue de YouTube, [Invidious](https://instances.invidious.io) ou [SponsorBlock](https://sponsor.ajay.app/) selon votre configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ Lorsque vous utilisez FreeTube, votre adresse IP peut encore être connue de You **Yattee** est un lecteur vidéo gratuit et open-source orienté vie privée pour iOS, tvOS et macOS pour [YouTube](https://youtube.com). Lorsque vous utilisez Yattee, votre liste d'abonnement est enregistrée localement sur votre appareil. -Vous devrez suivre quelques [étapes supplémentaires](https://gonzoknows.com/posts/Yattee/) avant de pouvoir utiliser Yattee pour regarder YouTube, en raison des restrictions de l'App Store. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ Vous devrez suivre quelques [étapes supplémentaires](https://gonzoknows.com/po
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ Vous devrez suivre quelques [étapes supplémentaires](https://gonzoknows.com/po

Avertissement

-Lorsque vous utilisez Yattee, votre adresse IP peut encore être connue de YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) ou [SponsorBlock](https://sponsor.ajay.app/) selon votre configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube vous permet de stocker votre liste d'abonnement et vos listes de lectu

Avertissement

-Lorsque vous utilisez LibreTube, votre adresse IP sera visible par l'instance [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) que vous avez choisie et/ou [SponsorBlock](https://sponsor.ajay.app/) en fonction de votre configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -149,17 +149,17 @@ Par défaut, LibreTube bloque toutes les publicités YouTube. En outre, Libretub
-![Logo Newpipe](assets/img/frontends/newpipe.svg){ align=right } +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** est une application Android gratuite et open-source pour [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), et [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Votre liste d'abonnement et vos listes de lecture sont enregistrées localement sur votre appareil Android. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Votre liste d'abonnement et vos listes de lecture sont enregistrées localement
-1. L'instance par défaut est [FramaTube](https://framatube.org/), mais d'autres peuvent être ajoutées via **Paramètres** → **Contenu** → **Instances PeerTube** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Avertissement

@@ -190,11 +190,11 @@ Lorsque vous utilisez NewPipe, votre adresse IP sera visible par les fournisseur There are a number of public instances, with some instances having [Tor](tor.md) onion services support. -[:octicons-home-16: Homepage ](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Instances publiques"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribuer } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -224,11 +224,11 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped nécessite JavaScript pour fonctionner et il existe un certain nombre d'instances publiques. -[:octicons-repo-16: Dépôt](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Instances Publiques"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Code Source" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribuer } +[:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } +[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute }
diff --git a/i18n/fr/index.md b/i18n/fr/index.md index a669b678..a83f00b1 100644 --- a/i18n/fr/index.md +++ b/i18n/fr/index.md @@ -62,12 +62,12 @@ Essayer de protéger toutes vos données contre tout le monde, tout le temps, es ## On a besoin de vous ! Voici comment vous pouvez vous impliquer : -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Rejoignez notre forum" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Suivez-nous sur Mastodon" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribuez à ce site web" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Aidez à traduire ce site" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Discutez avec nous sur Matrix" } -[:material-information-outline:](about/index.md){ title="En savoir plus sur nous" } -[:material-hand-coin-outline:](about/donate.md){ title="Soutenir le projet" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } Il est important pour un site web comme Privacy Guides de toujours rester à jour. Nous avons besoin que notre public garde un œil sur les mises à jour logicielles des applications répertoriées sur notre site et suive l'actualité récente des fournisseurs que nous recommandons. Internet évolue à une vitesse telle, qu'il est difficile de suivre le rythme, mais nous faisons de notre mieux. Si vous repérez une erreur, que vous pensez qu'un fournisseur ne devrait pas figurer dans la liste, remarquez l'absence d'un fournisseur qualifié, pensez qu'un plugin de navigateur n'est plus le meilleur choix ou si vous découvrez tout autre problème, veuillez nous en informer. diff --git a/i18n/fr/kb-archive.md b/i18n/fr/kb-archive.md index a5e91e87..1f9befbb 100644 --- a/i18n/fr/kb-archive.md +++ b/i18n/fr/kb-archive.md @@ -8,10 +8,10 @@ description: Certaines pages qui se trouvaient auparavant dans notre base de con Certaines pages qui se trouvaient auparavant dans notre base de connaissances peuvent désormais être consultées sur notre blog : -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Renforcement de la configuration de Signal](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - Renforcement du système](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Sandboxing des applications](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Effacement sécurisé des données](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Intégration de la suppression des métadonnées](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [Guide de configuration iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Renforcement de la configuration de Signal](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - Renforcement du système](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Sandboxing des applications](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Effacement sécurisé des données](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Intégration de la suppression des métadonnées](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [Guide de configuration iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/fr/meta/admonitions.md b/i18n/fr/meta/admonitions.md index 7df9d4fe..1a6e5d01 100644 --- a/i18n/fr/meta/admonitions.md +++ b/i18n/fr/meta/admonitions.md @@ -163,17 +163,17 @@ Ce format est utilisé pour générer des cartes de recommandation. Il manque no ```markdown title="Recommendation Card"
-![logo PhotoPrism](assets/img/photo-management/photoprism.svg){ align=right } +![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** est une plateforme auto-hébergeable pour la gestion des photos. Elle prend en charge la synchronisation et le partage d'albums ainsi qu'une variété d'autres [fonctionnalités](https://www.photoprism.app/features). Elle ne fournit pas de E2EE, donc il est préférable de l'héberger sur un serveur de confiance et que vous contrôler. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Page d'accueil](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Code source" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-github: GitHub](https://github.com/photoprism) @@ -188,12 +188,12 @@ Ce format est utilisé pour générer des cartes de recommandation. Il manque no ![logo PhotoPrism](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** est une plateforme auto-hébergée pour la gestion des photos. Elle prend en charge la synchronisation et le partage d'albums ainsi qu'une variété d'autres [fonctionnalités](https://www.photoprism.app/features). Elle n'inclut pas l'E2EE, il est donc préférable de l'héberger sur un serveur en lequel vous avez confiance et que vous contrôlez. +**PhotoPrism** est une plateforme auto-hébergée pour la gestion des photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). Elle n'inclut pas l'E2EE, il est donc préférable de l'héberger sur un serveur en lequel vous avez confiance et que vous contrôlez. -[:octicons-home-16: Page d'accueil](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Code source" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
Téléchargements @@ -212,10 +212,10 @@ Il s'agit d'un type spécial d'avertissement repliable, utilisé pour générer ```markdown title="Downloads Section"
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ Il s'agit d'un type spécial d'avertissement repliable, utilisé pour générer Téléchargements - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/fr/meta/translations.md b/i18n/fr/meta/translations.md index 884af8a6..c7c19f7d 100644 --- a/i18n/fr/meta/translations.md +++ b/i18n/fr/meta/translations.md @@ -2,9 +2,9 @@ title: Traductions --- -Crowdin dispose d'une bonne documentation, et nous vous suggérons de consulter leur guide [Getting Started](https://support.crowdin.com/crowdin-intro/) . Notre site est en grande partie rédigé en [Markdown](https://en.wikipedia.org/wiki/Markdown), il devrait donc être facile d'y contribuer. Cette page contient des conseils utiles pour traduire certaines syntaxes spécifiques que vous pouvez rencontrer sur notre site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Notre site est en grande partie rédigé en [Markdown](https://en.wikipedia.org/wiki/Markdown), il devrait donc être facile d'y contribuer. Cette page contient des conseils utiles pour traduire certaines syntaxes spécifiques que vous pouvez rencontrer sur notre site. -Veuillez rejoindre notre salle de localisation sur Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) si vous avez des questions supplémentaires, et lisez notre [article de blog d'announce](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) pour plus d'informations sur le projet. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Notez que la version anglaise du site est la version principale, ce qui signifie que les modifications y sont apportées en premier. Si vous remarquez qu'une langue est en retard par rapport à la version anglaise, n'hésitez pas à nous aider. Nous ne pouvons pas garantir l'exactitude de toutes nos traductions. Si vous avez une suggestion concernant un contenu spécifique à votre région, veuillez ouvrir une issue ou unepull request dans notre [dépôt principal](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ Les systèmes d'écriture CJK ont tendance à utiliser des variantes "pleine lar - Les liens doivent utiliser des parenthèses normales, c'est-à-dire `(` (parenthèse gauche U+0028) et `)` (parenthèse droite U+0029) et non `(` (parenthèse gauche pleine largeur U+FF08) ou `)` (parenthèse droite pleine largeur U+FF09) - Le texte cité et en retrait doit utiliser `:` (deux-points U+003A) et non `:` (deux-points pleine largeur U+FF1A) -- Les images doivent utiliser `!` (point d'exclamation U+0021) et non `!` (point d'exclamation pleine largeur U+FF01) +- Les images doivent utiliser `!` (point d'exclamation U+0021) et non `!` (point d'exclamation pleine largeur U+FF01) diff --git a/i18n/fr/meta/uploading-images.md b/i18n/fr/meta/uploading-images.md index fa2bf899..1ecef19d 100644 --- a/i18n/fr/meta/uploading-images.md +++ b/i18n/fr/meta/uploading-images.md @@ -17,7 +17,7 @@ Les logos d'entreprise ont une taille canvas de : ### PNG -Utilisez le logiciel [OptiPNG](https://sourceforge.net/projects/optipng/) pour optimiser l'image PNG : +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/fr/meta/writing-style.md b/i18n/fr/meta/writing-style.md index 949175c4..16e1ad33 100644 --- a/i18n/fr/meta/writing-style.md +++ b/i18n/fr/meta/writing-style.md @@ -4,11 +4,11 @@ title: Style d'écriture Privacy Guides est rédigé en anglais américain, et vous devez vous référer aux directives de [style APA](https://apastyle.apa.org/style-grammar-guidelines/grammar) en cas de doute. -En général, les [directives fédérales américaines en matière de langage clair](https://www.plainlanguage.gov/guidelines/) fournissent un bon aperçu de la manière d'écrire de façon claire et concise. Nous soulignons ci-dessous quelques notes importantes de ces directives. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. Nous soulignons ci-dessous quelques notes importantes de ces directives. ## Écrire pour notre public -Le [public](https://www.plainlanguage.gov/guidelines/audience/) visé par Privacy Guides est principalement constitué d'adultes moyens, utilisant la technologie. Ne simplifiez pas le contenu comme si vous vous adressiez à une classe d'école primaire, mais n'abusez pas d'une terminologie compliquée concernant des concepts que l'utilisateur moyen d'un ordinateur ne connaît pas. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Ne simplifiez pas le contenu comme si vous vous adressiez à une classe d'école primaire, mais n'abusez pas d'une terminologie compliquée concernant des concepts que l'utilisateur moyen d'un ordinateur ne connaît pas. ### N'aborder que ce que les gens veulent savoir @@ -24,7 +24,7 @@ Nous écrivons *pour* une grande variété de personnes, mais nous écrivons *à > > Lorsque vous utilisez le "vous" pour vous adresser aux utilisateurs, ceux-ci sont plus susceptibles de comprendre quelle est leur responsabilité. -Source : [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Évitez les "utilisateurs" @@ -37,7 +37,7 @@ L'organisation est clé. Le contenu doit aller de l'information la plus importan - Limitez le document à environ cinq ou six sections. Les documents longs devraient probablement être divisés en pages séparées. - Marquez les idées importantes avec **du gras** ou *de l'italique*. -Source : [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Commencez par une phrase sujet @@ -45,7 +45,7 @@ Source : [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > Nous écrivons souvent de la même manière que nous pensons, en mettant nos prémisses en premier et ensuite notre conclusion. C'est peut-être la façon naturelle de développer des pensées, mais nous nous retrouvons avec la phrase sujet à la fin du paragraphe. Déplacez-la au début et laissez les utilisateurs savoir où vous allez. N'obligez pas les lecteurs à retenir un grand nombre d'informations dans leur tête avant d'en venir au fait. -Source : [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choisissez vos mots avec soin @@ -65,7 +65,7 @@ Nous devrions essayer d'éviter les abréviations dans la mesure du possible, ma > Les mots inutiles font perdre du temps à votre public. Une bonne écriture est comme une conversation. Omettez les informations que le public n'a pas besoin de connaître. Cela peut s'avérer difficile pour un expert en la matière. Il est donc important que quelqu'un examine les informations du point de vue du public. -Source : [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Garder le texte conversationnel @@ -77,7 +77,7 @@ Source : [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > La voix active indique clairement qui est censé faire quoi. Il élimine toute ambiguïté quant aux responsabilités. Pas "Il faut le faire", mais "Vous devez le faire" -Source : [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Utilisez "doit" pour les exigences diff --git a/i18n/fr/mobile-browsers.md b/i18n/fr/mobile-browsers.md index b91128ed..ffb9e032 100644 --- a/i18n/fr/mobile-browsers.md +++ b/i18n/fr/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,23 +41,23 @@ Il s'agit des navigateurs web mobiles et des configurations que nous recommandon ## Android -Sur Android, Firefox est toujours moins sûr que les alternatives basées sur Chromium : Le moteur de Mozilla, [GeckoView](https://mozilla.github.io/geckoview/), doit encore prendre en charge [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) ou activer [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave
-![Logo Brave](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Le navigateur Brave** comprend un bloqueur de contenu intégré et des [fonctions de confidentialité](https://brave.com/privacy-features/), dont la plupart sont activées par défaut. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave est basé sur le projet de navigateur Web Chromium. Il devrait donc vous être familier et présenter un minimum de problèmes de compatibilité avec les sites Web. -[:octicons-home-16: Page d'accueil](https://brave.com/){ .md-button .md-button--primary } -[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Service onion" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Code source" } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Téléchargements @@ -77,7 +77,7 @@ Ces options se trouvent dans :material-menu: → **Paramètres** → **Brave Shi ##### Shields -Brave inclut certaines mesures contre la prise d'empreinte numérique dans sa fonction [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Nous vous suggérons de configurer ces options [de manière globale](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) sur toutes les pages que vous visitez. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Les valeurs par défaut de Brave Shields @@ -101,7 +101,7 @@ Brave vous permet de sélectionner des filtres de contenu supplémentaires dans
-1. Cette option fournit une fonctionnalité similaire aux [modes de blocage](https://github.com/gorhill/uBlock/wiki/Blocking-mode) avancés de uBlock Origin ou l'extension [NoScript](https://noscript.net/). +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Effacer les données de navigation @@ -115,13 +115,13 @@ Brave vous permet de sélectionner des filtres de contenu supplémentaires dans
-- [x] Sélectionnez **Désactiver l'UDP pas en proxy** sous [Politique de gestion des adresses IP WebRTC](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) -- [ ] Décochez **Autorisez les sites à vérifier si vous avez enregistré des méthodes de paiement** -- [ ] Décochez **Passerelle IPFS** (1) -- [x] Sélectionnez **Fermer les onglets lorsque vous quittez** -- [ ] Décochez **Autoriser l'analyse de produits respectueuse de la vie privée (P3A)** -- [ ] Décochez **Envoyer automatiquement les rapports de diagnostic** -- [ ] Décochez **Envoyer automatiquement un signal d'utilisation quotidienne à Brave** +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Allow sites to check if you have payment methods saved** +- [ ] Uncheck **IPFS Gateway** (1) +- [x] Select **Close tabs on exit** +- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** +- [ ] Uncheck **Automatically send diagnostic reports** +- [ ] Uncheck **Automatically send daily usage ping to Brave**
@@ -129,7 +129,7 @@ Brave vous permet de sélectionner des filtres de contenu supplémentaires dans #### Synchronisation Brave -La [Synchronisation Brave](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) permet à vos données de navigation (historique, signets, etc.) d'être accessibles sur tous vos appareils sans nécessiter de compte et les protège avec E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,11 +141,11 @@ Sur iOS, toute application capable de naviguer sur le web est [](https://develop ![Logo Safari](assets/img/browsers/safari.svg){ align=right } -**Safari** est le navigateur par défaut dans iOS. Il comprend des [fonctions de confidentialité](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) telles que [la protection intelligente contre le pistage](https://webkit.org/blog/7675/intelligent-tracking-prevention/), le rapport de confidentialité, des onglets de navigation privée isolés et éphémères, le relais privé iCloud, la protection des empreintes numériques en randomisant et présentant une version simplifiée de la configuration du système aux sites web afin que d'avantage d'appareils soient identiques, et la possibilité de verrouiller les onglets privés à l'aide de vos données biométriques ou de votre code PIN. Il vous permet également de séparer votre navigation selon différents profils. +**Safari** est le navigateur par défaut dans iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. Il vous permet également de séparer votre navigation selon différents profils. -[:octicons-home-16: Page d'accueil](https://www.apple.com/fr/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/fr/safari/){ .card-link title="Politique de Confidentialité" } -[:octicons-info-16:](https://support.apple.com/fr-fr/guide/safari/welcome/mac){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Le Rapport de Confidentialité est accessible via le menu Paramètres de Page. - [ ] Désactiver **Mesure Publicitaire Préservant la vie privée** -La mesure des clics publicitaires a traditionnellement utilisé une technologie de suivi qui porte atteinte à la vie privée des utilisateurs. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) est une fonctionnalité de WebKit et une proposition de norme web visant à permettre aux annonceurs de mesurer l'efficacité des campagnes web sans compromettre la confidentialité des utilisateurs. +La mesure des clics publicitaires a traditionnellement utilisé une technologie de suivi qui porte atteinte à la vie privée des utilisateurs. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. Cette fonction ne pose que peu de problèmes de confidentialité en soi, et même si vous pouvez choisir de la laisser activée, nous considérons que le fait qu'elle soit automatiquement désactivée en Navigation Privée est un indicateur pour la désactiver. @@ -201,9 +201,9 @@ Notez que la Navigation Privée n'enregistre pas les cookies et les données des ##### Synchronisation iCloud -La synchronisation de l'Historique de Safari, des Groupes d'Onglets, des Onglets iCloud et des mots de passe enregistrés est E2EE. Cependant, les signets ne le sont [pas](https://support.apple.com/fr-fr/HT202303). Apple peut les déchiffrer et y accéder conformément à sa [politique de confidentialité](https://www.apple.com/fr/legal/privacy/fr-ww/). +La synchronisation de l'Historique de Safari, des Groupes d'Onglets, des Onglets iCloud et des mots de passe enregistrés est E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -Vous pouvez activer l'E2EE pour vos signets et vos téléchargements Safari en activant la [Protection Avancée des Données](https://support.apple.com/en-us/HT212520). Accédez à votre **nom d'identifiant Apple → iCloud → Protection Avancée des Données**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Accédez à votre **nom d'identifiant Apple → iCloud → Protection Avancée des Données**. - [x] Activez **Protection Avancée des Données** @@ -225,9 +225,9 @@ AdGuard pour iOS dispose de quelques fonctions payantes, mais le blocage standar [:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Code source" }
-Téléchargements +Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/fr/multi-factor-authentication.md b/i18n/fr/multi-factor-authentication.md index 8de242ce..b269a987 100644 --- a/i18n/fr/multi-factor-authentication.md +++ b/i18n/fr/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -Les **YubiKeys** font partie des clés de sécurité les plus populaires. Certains modèles de YubiKey disposent d'un large éventail de fonctionnalités telles que : [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 et WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP et HOTP](https://developers.yubico.com/OATH). +Les **YubiKeys** font partie des clés de sécurité les plus populaires. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -L'un des avantages de la YubiKey est qu'une seule clé peut faire presque tout (YubiKey 5) ce que vous pouvez attendre d'une clé de sécurité matérielle. Nous vous encourageons à faire le [quiz](https://www.yubico.com/quiz/) avant d'acheter afin d'être sûr de faire le bon choix. +L'un des avantages de la YubiKey est qu'une seule clé peut faire presque tout (YubiKey 5) ce que vous pouvez attendre d'une clé de sécurité matérielle. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Page d'accueil](https://www.yubico.com/?lang=fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-Le [tableau de comparaison](https://www.yubico.com/store/compare/) montre les fonctionnalités de chaque YubiKeys et leurs différences. Nous vous recommandons vivement de choisir des clés de la série YubiKey 5. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. Nous vous recommandons vivement de choisir des clés de la série YubiKey 5. -Les YubiKeys peuvent être programmées à l'aide du [Gestionnaire YubiKey](https://www.yubico.com/support/download/yubikey-manager/) ou de l'[Outil de Personnalisation YubiKey](https://www.yubico.com/support/download/yubikey-personalization-tools/). Pour gérer les codes TOTP, vous pouvez utiliser le [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). Tous les clients de Yubico sont open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). Tous les clients de Yubico sont open source. Pour les modèles qui supportent HOTP et TOTP, il y a 2 emplacements dans l'interface OTP qui peuvent être utilisés pour HOTP et 32 emplacements pour stocker les secrets TOTP. Ces secrets sont stockés et chiffrés sur la clé et ne sont jamais exposés aux appareils sur lesquels elle est branchée. Une fois qu'une graine (secret partagé) est donnée à l'authentificateur Yubico, celui-ci ne donnera que les codes à six chiffres, mais jamais la graine. Ce modèle de sécurité permet de limiter ce qu'un attaquant peut faire s'il compromet l'un des appareils exécutant le Yubico Authenticator et rend la YubiKey résistante à un attaquant physique. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. Si vous souhait **Nitrokey** possède une clé de sécurité qui prend en charge [FIDO2 et WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) appelée la **Nitrokey FIDO2**. Pour la prise en charge de PGP, vous devez acheter l'une de leurs autres clés comme la **Nitrokey Start**, la **Nitrokey Pro 2** ou la **Nitrokey Storage 2**. -[:octicons-home-16: Page d'accueil](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-Le [tableau de comparaison](https://www.nitrokey.com/#comparison) montre les fonctionnalités de chaque Nitrokey et leurs différences. La **Nitrokey 3** répertoriée aura un ensemble de fonctionnalités combinées. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. La **Nitrokey 3** répertoriée aura un ensemble de fonctionnalités combinées. -Les modèles de Nitrokey peuvent être configurés à l'aide de l'[application Nitrokey](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). Pour les modèles qui supportent HOTP et TOTP, il y a 3 emplacements pour HOTP et 15 pour TOTP. Certaines Nitrokeys peuvent faire office de gestionnaire de mots de passe. Ils peuvent stocker 16 identifiants différents et les chiffrer en utilisant le même mot de passe que l'interface OpenPGP. @@ -74,7 +74,7 @@ La réinitialisation de l'interface OpenPGP sur une Nitrokey rendra également l -La Nitrokey Pro 2, la Nitrokey Storage 2 et la Nitrokey 3 à venir prennent en charge la vérification de l'intégrité du système pour les ordinateurs portables dotés du micrologiciel [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) . +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Le micrologiciel de la Nitrokey est open source, contrairement à la YubiKey. Le micrologiciel des modèles NitroKey modernes (à l'exception de la **NitroKey Pro 2**) peut être mis à jour. @@ -127,7 +127,7 @@ Nous vous recommandons vivement d'utiliser des applications TOTP mobiles plutôt Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ Nous vous recommandons vivement d'utiliser des applications TOTP mobiles plutôt [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/fr/news-aggregators.md b/i18n/fr/news-aggregators.md index 81d47143..8be73436 100644 --- a/i18n/fr/news-aggregators.md +++ b/i18n/fr/news-aggregators.md @@ -17,11 +17,11 @@ Un [agrégateur d'actualités](https://en.wikipedia.org/wiki/News_aggregator) es **Akregator** est un lecteur de flux d'actualités qui fait partie du projet [KDE](https://kde.org). Il est doté d'une fonction de recherche rapide, d'une fonctionnalité d'archivage avancée et d'un navigateur interne pour faciliter la lecture des actualités. -[:octicons-home-16: Page d'accueil](https://apps.kde.org/akregator){ .md-button .md-button--primary } -[:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Politique de confidentialité" } +[:octicons-home-16: Homepage](https://apps.kde.org/akregator){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} -[:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Code source" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribuer } +[:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Téléchargements @@ -81,11 +81,11 @@ Un [agrégateur d'actualités](https://en.wikipedia.org/wiki/News_aggregator) es **Fluent Reader** est un agrégateur d'actualités multiplateforme sécurisé qui possède des fonctionnalités de confidentialité utiles telles que la suppression des cookies à la fermeture, des [politiques de sécurité du contenu (CSP)](ghttps://fr.wikipedia.org/wiki/Content_Security_Policy) strictes et un support proxy, ce qui signifie que vous pouvez l'utiliser en passant par[Tor](tor.md). -[:octicons-home-16: Page d'accueil](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Code source" } -[:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } +[:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute }
Téléchargements @@ -121,15 +121,15 @@ Un [agrégateur d'actualités](https://en.wikipedia.org/wiki/News_aggregator) es **NetNewsWire** est un lecteur de flux gratuit et open-source pour macOS et iOS qui met l'accent sur un design et des fonctionnalités natives. Il prend en charge les formats de flux habituels, ainsi que les flux Reddit. -[:octicons-home-16: Page d'accueil](https://netnewswire.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Code source" } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
-Téléchargements +Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit prend également en charge l'abonnement via RSS. Remplacez `[SUBREDDIT]` par le subreddit auquel vous souhaitez vous abonner. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -190,10 +190,10 @@ Vous pouvez vous abonner aux chaînes YouTube sans vous connecter et sans associ

Example

-Pour s'abonner à une chaîne YouTube avec un client RSS, cherchez d'abord son [code de chaîne](https://support.google.com/youtube/answer/6180214). Le code de chaîne se trouve sur la page "A propos" de la chaîne YouTube à laquelle vous souhaitez vous abonner : **A propos** > **Partager** > **Copier l'ID de la chaîne**. Remplacez `[CHANNEL ID]` ci-dessous : +Pour s'abonner à une chaîne YouTube avec un client RSS, cherchez d'abord son [code de chaîne](https://support.google.com/youtube/answer/6180214). Le code de chaîne se trouve sur la page "A propos" de la chaîne YouTube à laquelle vous souhaitez vous abonner : **A propos** > **Partager** > **Copier l'ID de la chaîne**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ```
diff --git a/i18n/fr/notebooks.md b/i18n/fr/notebooks.md index 53b805b5..4f181944 100644 --- a/i18n/fr/notebooks.md +++ b/i18n/fr/notebooks.md @@ -34,7 +34,7 @@ Standard Notes est une application de notes simple et privée qui rend vos prise - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ Standard Notes est une application de notes simple et privée qui rend vos prise ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. Elle propose un chiffrement de bout en bout sur toutes les plateformes et une synchronisation puissante pour prendre vos notes en déplacement. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. Elle propose un chiffrement de bout en bout sur toutes les plateformes et une synchronisation puissante pour prendre vos notes en déplacement. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ Standard Notes est une application de notes simple et privée qui rend vos prise Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook autorise le chiffrement de notes locales seulement avec la fonctionnal **Joplin** est une application gratuite, open-source et complète de prise de notes et de tâches à accomplir qui peut gérer un grand nombre de notes écrites en markdown organisées en carnets et en balises. Il offre E2EE et peut se synchroniser via Nextcloud, Dropbox, et plus encore. Il permet également d'importer facilement des notes d'Evernote et des notes en texte brut. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -135,9 +135,9 @@ Cryptee offre 100 Mo de stockage gratuit, avec des options payantes si vous avez
-![Logo Org-mode](assets/img/notebooks/org-mode.svg){ align=right } +![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** est un [mode majeur](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) pour GNU Emacs. Org-mode permet de prendre des notes, de tenir à jour des listes to-do, de planifier des projets et de rédiger des documents à l'aide d'un système de texte brut rapide et efficace. La synchronisation est possible avec des outils de [synchronisation de fichiers](file-sharing.md#file-sync). +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode permet de prendre des notes, de tenir à jour des listes to-do, de planifier des projets et de rédiger des documents à l'aide d'un système de texte brut rapide et efficace. La synchronisation est possible avec des outils de [synchronisation de fichiers](file-sharing.md#file-sync). [:octicons-home-16: Page d'accueil](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/fr/os/android-overview.md b/i18n/fr/os/android-overview.md index 99151075..c2a6e01e 100644 --- a/i18n/fr/os/android-overview.md +++ b/i18n/fr/os/android-overview.md @@ -60,7 +60,7 @@ De nombreux contructeurs ont également une implémentation défectueuse du Dém Les mises à jour du micrologiciel sont essentielles au maintien de la sécurité. Sans elles, votre appareil ne peut être sécurisé. Les fabriquants ont conclu des accords de prise de en charge avec leurs partenaires pour fournir les mises à jour des composants closed-source pendant une période limitée. Celles-ci sont détaillées dans les [Bulletins de Sécurité Android](https://source.android.com/security/bulletin) mensuels. -Comme les composants du téléphone, tels que le processeur et les technologies radio, reposent sur des composants closed-source, les mises à jour doivent être fournies par leur fabricants respectifs. Par conséquent, il est important que vous achetiez un appareil qui reçoit activement des mises à jours. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) et [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) prennent en charge leurs appareils pendant 4 ans, tandis que les produits moins chers ont souvent des cycles de mises à jour plus courts. Avec l'introduction du [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google fabrique maintenant son propre SoC et fournira un minimum de 5 ans de mises à jour. Avec l'introduction de la série Pixel 8, Google a porté cette intervalle de prise en charge à 7 ans. +Comme les composants du téléphone, tels que le processeur et les technologies radio, reposent sur des composants closed-source, les mises à jour doivent être fournies par leur fabricants respectifs. Par conséquent, il est important que vous achetiez un appareil qui reçoit activement des mises à jours. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. Avec l'introduction du [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google fabrique maintenant son propre SoC et fournira un minimum de 5 ans de mises à jour. Avec l'introduction de la série Pixel 8, Google a porté cette intervalle de prise en charge à 7 ans. Les appareils qui ne sont plus pris en charge par le fabricant du SoC ne peuvent pas recevoir de mises à jour du micrologiciel de la part des fabricants ou des distributeurs. Cela signifie que les problèmes de sécurité de ces appareils ne seront pas corrigés. @@ -97,19 +97,19 @@ Android 13 : Une application peut demander une autorisation pour une fonction spécifique qu'elle possède. Par exemple, toute application permettant de scanner des codes QR nécessitera l'autorisation de l'appareil photo. Certaines applications peuvent demander plus d'autorisations qu'elles n'en ont besoin. -[Exodus](https://exodus-privacy.eu.org/fr/) peut être utile pour comparer des applications ayant des objectifs similaires. Si une application nécessite de nombreuses autorisations et comporte beaucoup de traqueurs publicitaires et d'analytiques, c'est probablement un mauvais signe. Nous vous recommandons d'examiner les différents traqueurs et de lire leur description plutôt que de vous contenter de **compter leur nombre** et de supposer que tous les éléments énumérés sont égaux. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. Si une application nécessite de nombreuses autorisations et comporte beaucoup de traqueurs publicitaires et d'analytiques, c'est probablement un mauvais signe. Nous vous recommandons d'examiner les différents traqueurs et de lire leur description plutôt que de vous contenter de **compter leur nombre** et de supposer que tous les éléments énumérés sont égaux.

Avertissement

-Si une application est principalement un service web, le suivi peut se faire du côté du serveur. [Facebook](https://reports.exodus-privacy.eu.org/fr/reports/com.facebook.katana/latest/) n'affiche "aucun traqueur" mais suit certainement les intérêts et le comportement des utilisateurs sur le site. Les applications peuvent échapper à la détection en n'utilisant pas les bibliothèques de code standard produites par l'industrie de la publicité, bien que cela soit peu probable. +Si une application est principalement un service web, le suivi peut se faire du côté du serveur. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Les applications peuvent échapper à la détection en n'utilisant pas les bibliothèques de code standard produites par l'industrie de la publicité, bien que cela soit peu probable.

Note

-Des applications respectueuses de la vie privée telles que [Bitwarden](https://reports.exodus-privacy.eu.org/fr/reports/com.x8bit.bitwarden/latest/) peuvent afficher certains traqueurs tels que [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/fr/trackers/49/). Cette bibliothèque comprend [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) qui peut fournir des [notifications push](https://fr.wikipedia.org/wiki/Server_push) dans les applications. C'est [le cas](https://fosstodon.org/@bitwarden/109636825700482007) avec Bitwarden. Cela ne signifie pas que Bitwarden utilise toutes les fonctionnalités d'analyse fournies par Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). Cette bibliothèque comprend [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) qui peut fournir des [notifications push](https://fr.wikipedia.org/wiki/Server_push) dans les applications. C'est [le cas](https://fosstodon.org/@bitwarden/109636825700482007) avec Bitwarden. Cela ne signifie pas que Bitwarden utilise toutes les fonctionnalités d'analyse fournies par Google Firebase Analytics.
@@ -145,20 +145,20 @@ Si vous utilisez un appareil doté des services Google, qu'il s'agisse de votre ### Programme de Protection Avancé -Si vous avez un compte Google, nous vous suggérons de vous inscrire au [Programme de Protection Avancée](https://landing.google.com/advancedprotection/). Il est disponible gratuitement pour toute personne possédant au moins deux clés de sécurité physiques qui prennent en charge le protocole [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online). +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). Il est disponible gratuitement pour toute personne possédant au moins deux clés de sécurité physiques qui prennent en charge le protocole [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online). Le Programme de Protection Avancée offre une surveillance accrue des menaces et permet : - Une authentification à deux facteurs plus stricte; par exemple, seul [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **doit** être utilisé et toute autre type de double autentification tels que [SMS OTP](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) et [OAuth](https://en.wikipedia.org/wiki/OAuth) sont bloqués - Seul Google et les applications tierces vérifiées peuvent accéder aux données du compte - Une analyse des e-mails entrants sur les comptes Gmail pour détecter les tentatives de [hameçonnage](https://en.wikipedia.org/wiki/Phishing#Email_phishing) -- Une plus stricte [analyse de sécurité du navigateur](https://www.google.com/chrome/privacy/whitepaper.html#malware) avec Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Un processus de récupération plus strict pour les comptes ayant perdu leurs informations d'identification - Si vous utilisez des services Google Play non sandboxés (courants sur les systèmes d'exploitation d'origine), l'Advanced Protection Program est également accompagné d'[avantages supplémentaires](https://support.google.com/accounts/answer/9764949?hl=en) tels que : + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Ne pas autoriser l'installation d'applications en dehors du Google Play Store, en dehors de la boutique d'applications du fournisseur du système d'exploitation ou via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Analyse automatique obligatoire des appareils avec [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Avertissement des applications non vérifiées ### Mise à jour du système avec Google Play @@ -169,7 +169,7 @@ Si vous avez un appareil sous Android 10 minimum qui n'est plus supporté et que ### L'Identifiant publicitaire -Tous les appareils sur lesquels les Google Play Services sont installés génèrent automatiquement un [identifiant publicitaire](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) utilisé pour la publicité ciblée. Désactivez cette fonctionnalité pour limiter les données collectées à votre sujet. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Désactivez cette fonctionnalité pour limiter les données collectées à votre sujet. Sur les distributions Android avec [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), allez dans :gear: **Paramètres** → **Applications** → **Sandboxed Google Play** → **Paramètres Google** → **Annonces**, et sélectionnez *Supprimer l'ID publicitaire*. diff --git a/i18n/fr/os/ios-overview.md b/i18n/fr/os/ios-overview.md index 9bee5d1b..b2df13d1 100644 --- a/i18n/fr/os/ios-overview.md +++ b/i18n/fr/os/ios-overview.md @@ -22,7 +22,7 @@ La seule source d'applications sur iOS est l'App Store d'Apple, dont l'accès n ### Télémétrie invasive -Apple a, par le passé, eu des problèmes pour anonymiser correctement ses données télémétriques sur iOS. [En 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), il a été constaté qu'Apple transmettait des enregistrements Siri - dont certains contenaient des informations hautement confidentielles - à ses serveurs pour qu'ils soient examinés manuellement par des contractants tiers. Bien qu'ils aient temporairement arrêté ce programme après que cette pratique ait été [largement signalée](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), le problème n'a été complètement résolu [qu'en 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple a, par le passé, eu des problèmes pour anonymiser correctement ses données télémétriques sur iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). Plus récemment, il a été constaté qu'Apple [transmettait des données analytiques même lorsque le partage des données analytiques était désactivé](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) sur iOS, et ces données [semblent](https://twitter.com/mysk_co/status/1594515229915979776) être facilement reliées à des identifiants de compte iCloud uniques, bien qu'elles soient censées être anonymes. @@ -54,7 +54,7 @@ En haut de l'application **Réglages**, vous verrez votre nom et votre photo de #### Localiser -**Localiser** est un service qui vous permet de suivre vos appareils Apple et de partager votre localisation avec vos amis et votre famille. Il vous permet également d'effacer votre appareil à distance en cas de vol, empêchant ainsi un voleur d'accéder à vos données. Vos [données de localisation Localiser sont E2EE](https://www.apple.com/legal/privacy/data/fr/find-my/) lorsque : +**Localiser** est un service qui vous permet de suivre vos appareils Apple et de partager votre localisation avec vos amis et votre famille. Il vous permet également d'effacer votre appareil à distance en cas de vol, empêchant ainsi un voleur d'accéder à vos données. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Votre position est partagée avec un membre de votre famille ou un ami, et vous utilisez tous deux iOS 15 ou une version ultérieure. - Votre appareil est hors ligne et est localisé par le réseau de Localiser. @@ -117,7 +117,7 @@ Si vous ne voulez pas que quelqu'un puisse contrôler votre téléphone avec Sir Définir un mot de passe fort pour votre téléphone est la mesure la plus importante que vous puissiez prendre pour assurer la sécurité physique de votre appareil. Vous devrez faire des compromis entre la sécurité et la commodité : un mot de passe plus long sera fastidieux à saisir à chaque fois, mais un mot de passe ou un code PIN plus court sera plus facile à deviner. Configurer Face ID ou Touch ID avec un mot de passe fort peut être un bon compromis entre convivialité et sécurité. -Sélectionnez **Activer le code d'accès** ou **Modifier le code d'accès** > **Options du code d'accès** > **Code alphanumérique personnalisé**. Veillez à créer un [mot de passe sûr](https://www.privacyguides.org/basics/passwords-overview/). +Sélectionnez **Activer le code d'accès** ou **Modifier le code d'accès** > **Options du code d'accès** > **Code alphanumérique personnalisé**. Make sure that you create a [secure password](../basics/passwords-overview.md). Si vous souhaitez utiliser Face ID ou Touch ID, vous pouvez le configurer maintenant. Votre téléphone utilisera le mot de passe que vous avez défini précédemment comme solution de secours en cas d'échec de la vérification biométrique. Les méthodes de déverrouillage biométrique existent principalement pour la commodité, même si elles empêchent les caméras de surveillance ou les personnes de vous regarder saisir votre code d'accès par-dessus votre épaule. @@ -129,7 +129,7 @@ Sur certains appareils plus anciens, vous devrez peut-être appuyer cinq fois su - [x] Sélectionnez **Activer la protection** -Après avoir activé la protection en cas de vol de l’appareil, [certaines actions](https://support.apple.com/en-us/HT212510) nécessiteront une authentification biométrique sans possibilité de recourir au mot de passe (dans le cas où un passant obtient votre code PIN à la dérobée), comme l'utilisation du remplissage des mots de passe, l'accès aux informations de paiement et la désactivation du mode perdu. Elle ajoute également un délai de sécurité pour certaines actions effectuées en dehors de votre domicile ou d'un autre "lieu familier", comme la nécessité d'un délai d'une heure pour réinitialiser votre mot de passe Apple ID ou vous déconnecter de votre Apple ID. Ce délai a pour but de vous donner le temps d'activer le mode Perdu et de sécuriser votre compte avant qu'un voleur ne puisse réinitialiser votre appareil. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. Elle ajoute également un délai de sécurité pour certaines actions effectuées en dehors de votre domicile ou d'un autre "lieu familier", comme la nécessité d'un délai d'une heure pour réinitialiser votre mot de passe Apple ID ou vous déconnecter de votre Apple ID. Ce délai a pour but de vous donner le temps d'activer le mode Perdu et de sécuriser votre compte avant qu'un voleur ne puisse réinitialiser votre appareil. **Autoriser l'accès lorsque le téléphone est verrouillé** vous offre des options pour définir ce que vous pouvez autoriser lorsque votre téléphone est verrouillé. Plus vous désactivez d'options, moins quelqu'un qui n'a pas votre mot de passe peut faire de choses, mais moins c'est pratique pour vous. Choisissez les éléments auxquels vous ne voulez pas que quelqu'un ait accès s'il met la main sur votre téléphone. @@ -187,7 +187,7 @@ Désactivez **Publicités personnalisées** si vous ne voulez pas de publicités - [x] Sélectionnez **Activer le rapport de confidentialité des apps** -Le [mode Isolement](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) est un paramètre de sécurité que vous pouvez activer pour rendre votre téléphone plus résistant aux attaques. Sachez que certaines applications et fonctionnalités [ne fonctionneront pas](https://support.apple.com/fr-fr/HT212650) comme elles le font normalement. +Le [mode Isolement](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) est un paramètre de sécurité que vous pouvez activer pour rendre votre téléphone plus résistant aux attaques. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Sélectionnez **Activer le mode Isolement** diff --git a/i18n/fr/os/linux-overview.md b/i18n/fr/os/linux-overview.md index 8f50b283..72aa458f 100644 --- a/i18n/fr/os/linux-overview.md +++ b/i18n/fr/os/linux-overview.md @@ -15,12 +15,12 @@ Notre site web utilise généralement le terme "Linux" pour décrire les distrib Linux pose quelques problèmes importants en matière de protection de la vie privée, qu'il convient de connaître. Malgré ces inconvénients, les distributions Linux de bureau restent excellentes pour la plupart des personnes qui souhaitent : - Éviter la télémétrie qui accompagne souvent les systèmes d'exploitation propriétaires -- Maintenir [la liberté des logiciels](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Utiliser des systèmes axés sur la protection de la vie privée tels que [Whonix](https://www.whonix.org) ou [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Sécurité de l'open source -Une [idée fausse très répandue](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) est que Linux et d'autres logiciels open-source sont intrinsèquement sûrs simplement parce que le code source est disponible. On s'attend à ce que la communauté effectue des vérifications régulièrement, mais ce n'est pas toujours [le cas](https://seirdy.one/posts/2022/02/02/floss-security/). +Une [idée fausse très répandue](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) est que Linux et d'autres logiciels open-source sont intrinsèquement sûrs simplement parce que le code source est disponible. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). En réalité, la sécurité d'une distribution dépend d'un certain nombre de facteurs, tels que l'activité du projet, l'expérience des développeurs, le niveau de rigueur appliqué aux révisions de code et l'attention portée à des parties spécifiques de la base de code qui peuvent rester non touchées pendant des années. @@ -30,9 +30,9 @@ En réalité, la sécurité d'une distribution dépend d'un certain nombre de fa - Le **démarrage vérifié** sur Linux n'est pas aussi robuste que les alternatives telles que le [démarrage sécurisé](https://support.apple.com/guide/security/secac71d5623/web) d'Apple ou le [démarrage vérrifié](https://source.android.com/security/verifiedboot) d'Android. Le démarrage vérifié prévient les altérations persistantes par les logiciels malveillants et les [attaques evil maid](https://en.wikipedia.org/wiki/Evil_Maid_attack), mais il est encore largement [non présent, même sur les distributions les plus avancées](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- Un **sandboxing solide** pour les applications sous Linux fait cruellement défaut, même avec des applications conteneurisées comme Flatpaks ou des solutions de sandboxing comme Firejail. Flatpak est l'utilitaire de sandboxing le plus prometteur pour Linux jusqu'à présent, mais il est encore déficient dans de nombreux domaines et permet [des défauts dangereux](https://flatkill.org/2020/) qui permettent à la plupart des applications de contourner trivialement leur sandbox. +- Un **sandboxing solide** pour les applications sous Linux fait cruellement défaut, même avec des applications conteneurisées comme Flatpaks ou des solutions de sandboxing comme Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -En outre, Linux est en retard dans la mise en œuvre de [mesures d'atténuation des exploits](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) qui sont désormais standard sur d'autres systèmes d'exploitation, tels que Arbitrary Code Guard sur Windows ou Hardened Runtime sur macOS. De plus, la plupart des programmes Linux et Linux lui-même sont codés dans des langages peu sûrs pour la mémoire. Les bogues de corruption de mémoire sont à l'origine de la [majorité des vulnérabilités](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) corrigées et affectées d'un CVE. Bien que cela soit également vrai pour Windows et macOS, ces derniers progressent rapidement dans l'adoption de langages à mémoire sécurisée, tels que Rust et Swift, respectivement, alors qu'il n'y a pas d'effort similaire pour réécrire Linux dans un langage à mémoire sécurisée tel que Rust. +En outre, Linux est en retard dans la mise en œuvre de [mesures d'atténuation des exploits](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) qui sont désormais standard sur d'autres systèmes d'exploitation, tels que Arbitrary Code Guard sur Windows ou Hardened Runtime sur macOS. De plus, la plupart des programmes Linux et Linux lui-même sont codés dans des langages peu sûrs pour la mémoire. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. Bien que cela soit également vrai pour Windows et macOS, ces derniers progressent rapidement dans l'adoption de langages à mémoire sécurisée, tels que Rust et Swift, respectivement, alors qu'il n'y a pas d'effort similaire pour réécrire Linux dans un langage à mémoire sécurisée tel que Rust. ## Choisir sa distribution @@ -42,9 +42,9 @@ Toutes les distributions Linux ne sont pas créées égales. Notre [page de reco Nous vous recommandons vivement de choisir des distributions qui restent proches des versions stables des logiciels en amont, souvent appelées distributions à publications continues. En effet, les distributions à cycle de publication gelé ne mettent souvent pas à jour les versions des paquets et prennent du retard sur les mises à jour de sécurité. -Pour les distributions gelées telles que [Debian](https://www.debian.org/security/faq#handling), les responsables de paquets sont censés rapporter les correctifs pour corriger les vulnérabilités plutôt que de faire passer le logiciel à la "prochaine version" publiée par le développeur en amont. Certains correctifs de sécurité [ne reçoivent pas](https://arxiv.org/abs/2105.14565) du tout [d'ID CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (en particulier les logiciels moins populaires) et ne sont donc pas intégrés dans la distribution avec ce modèle de correctif. Par conséquent, les corrections de sécurité mineures sont parfois reportées à la prochaine version majeure. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Certains correctifs de sécurité [ne reçoivent pas](https://arxiv.org/abs/2105.14565) du tout [d'ID CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (en particulier les logiciels moins populaires) et ne sont donc pas intégrés dans la distribution avec ce modèle de correctif. Par conséquent, les corrections de sécurité mineures sont parfois reportées à la prochaine version majeure. -Nous ne pensons pas que retenir les paquets et appliquer des correctifs provisoires soit une bonne idée, car cela s'écarte de la manière dont le développeur aurait pu vouloir que le logiciel fonctionne. [Richard Brown](https://rootco.de/aboutme/) propose une présentation à ce sujet : +Nous ne pensons pas que retenir les paquets et appliquer des correctifs provisoires soit une bonne idée, car cela s'écarte de la manière dont le développeur aurait pu vouloir que le logiciel fonctionne. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch et les distributions basées sur Arch ne sont pas recommandées pour ceux q Pour un système sécurisé, vous êtes également censé avoir une connaissance suffisante de Linux pour configurer correctement la sécurité de votre système, par exemple en adoptant un système de [contrôle d'accès obligatoire](https://en.wikipedia.org/wiki/Mandatory_access_control), en configurant des listes noires de [modules du noyau](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security), en renforçant les paramètres de démarrage, en manipulant les paramètres [sysctl](https://en.wikipedia.org/wiki/Sysctl), et en sachant de quels composants ils ont besoin, comme [Polkit](https://en.wikipedia.org/wiki/Polkit). -Toute personne utilisant le [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **doit** être à l'aise avec l'audit des PKGBUILDs qu'elle télécharge depuis ce service. Les paquets AUR sont des contenus produits par la communauté et ne font l'objet d'aucune vérification. Ils sont donc vulnérables aux attaques de la chaîne d'approvisionnement des logiciels, ce qui s'est d'ailleurs produit [dans le passé](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Toute personne utilisant le [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **doit** être à l'aise avec l'audit des PKGBUILDs qu'elle télécharge depuis ce service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). Le AUR doit toujours être utilisé avec parcimonie, et l'on trouve souvent de nombreux mauvais conseils sur diverses pages qui incitent les gens à utiliser aveuglément [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) sans avertissement suffisant. Des avertissements similaires s'appliquent à l'utilisation d'Archives de Paquets Personnels (PPAs) de tiers sur les distributions basées sur Debian ou de Projets Communautaires (COPR) sur Fedora. @@ -83,11 +83,11 @@ Si vous avez de l'expérience avec Linux et que vous souhaitez utiliser une dist En outre, nous ne recommandons particulièrement **pas** ces deux dérivés d'Arch : - **Manjaro**: Cette distribution bloque les mises à jour des paquets pendant 2 semaines pour s'assurer que leurs propres changements ne cassent pas, et non pas pour s'assurer que l'amont est stable. Lorsque des paquets AUR sont utilisés, ils sont souvent construits avec les dernières [bibliothèques](https://en.wikipedia.org/wiki/Library_(computing)) des dépôts d'Arch. -- **Garuda**: Ils utilisent [Chaotic-AUR](https://aur.chaotic.cx/) qui compile automatiquement et aveuglément les paquets de l'AUR. Il n'existe aucun processus de vérification pour s'assurer que les paquets AUR ne souffrent pas d'attaques de la chaîne d'approvisionnement. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. Il n'existe aucun processus de vérification pour s'assurer que les paquets AUR ne souffrent pas d'attaques de la chaîne d'approvisionnement. ### Le noyau Linux-libre et les distributions "libres" -Nous recommandons **de ne pas** utiliser le noyau Linux-libre, car il [supprime des mesures d'atténuation de sécurité](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) et [supprime des avertissements du noyau](https://news.ycombinator.com/item?id=29674846) concernant un microcode vulnérable. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## Recommandations générales @@ -95,7 +95,7 @@ Nous recommandons **de ne pas** utiliser le noyau Linux-libre, car il [supprime La plupart des distributions Linux ont une option dans leur installateur pour activer [LUKS](../encryption.md#linux-unified-key-setup) FDE. Si cette option n'est pas définie au moment de l'installation, vous devrez sauvegarder vos données et réinstaller, car le chiffrement est appliqué après le [partitionnement du disque](https://en.wikipedia.org/wiki/Disk_partitioning), mais avant le formatage des [systèmes de fichiers](https://en.wikipedia.org/wiki/File_system). Nous vous suggérons également d'effacer de façon sécurisée votre dispositif de stockage : -- [Effacement sécurisé des données :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Effacement sécurisé des données :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ Si vous avez besoin d'une fonctionnalité de suspension sur disque (hibernation) ### Wayland -Nous recommandons d'utiliser un environnement de bureau qui prend en charge le protocole d'affichage [Wayland](https://fr.wikipedia.org/wiki/Wayland) , car il a été développé en tenant compte de la [sécurité](https://lwn.net/Articles/589147/). Son prédécesseur ([X11](https://fr.wikipedia.org/wiki/X_Window_System)) ne prend pas en charge l'isolation de l'interface graphique, ce qui permet à n'importe quelle fenêtre [d'enregistrer, de consigner et d'injecter des données dans d'autres fenêtres](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), rendant toute tentative de sandboxing futile. Bien qu'il existe des options pour faire du X11 imbriqué comme [Xpra](https://en.wikipedia.org/wiki/Xpra) ou [Xephyr](https://en.wikipedia.org/wiki/Xephyr), elles ont souvent des conséquences négatives sur les performances, et ne sont ni pratiques à mettre en place ni préférables à Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Son prédécesseur ([X11](https://fr.wikipedia.org/wiki/X_Window_System)) ne prend pas en charge l'isolation de l'interface graphique, ce qui permet à n'importe quelle fenêtre [d'enregistrer, de consigner et d'injecter des données dans d'autres fenêtres](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), rendant toute tentative de sandboxing futile. Bien qu'il existe des options pour faire du X11 imbriqué comme [Xpra](https://en.wikipedia.org/wiki/Xpra) ou [Xephyr](https://en.wikipedia.org/wiki/Xephyr), elles ont souvent des conséquences négatives sur les performances, et ne sont ni pratiques à mettre en place ni préférables à Wayland. -Heureusement, [les compositeurs wayland](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) tels que ceux inclus dans [GNOME](https://www.gnome.org) et [KDE Plasma](https://kde.org) ont maintenant une bon prise en charge de Wayland ainsi que d'autres compositeurs qui utilisent [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (par exemple [Sway](https://swaywm.org)). Certaines distributions comme Fedora et Tumbleweed l'utilisent par défaut, et d'autres pourraient le faire à l'avenir car X11 est en [mode maintenance limitée](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). Si vous utilisez l'un de ces environnements, il vous suffit de sélectionner la session "Wayland" dans le gestionnaire d'affichage du bureau ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). Si vous utilisez l'un de ces environnements, il vous suffit de sélectionner la session "Wayland" dans le gestionnaire d'affichage du bureau ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). Nous recommandons **de ne pas** utiliser des environnements de bureau ou des gestionnaires de fenêtres qui ne prennent pas en charge Wayland, comme Cinnamon (par défaut sur Linux Mint), Pantheon (par défaut sur Elementary OS), MATE, Xfce et i3. ### Micrologiciel propriétaire (mises à jour du microcode) -Certaines distributions Linux (telles que les distributions basées sur [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)ou les distributions DIY) ne sont pas livrées avec les mises à jour propriétaires du [microcode](https://en.wikipedia.org/wiki/Microcode) qui corrigent les failles de sécurité critiques. Voici quelques exemples notables de ces vulnérabilités : [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), et d'autres [vulnérabilités matérielles](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Certaines distributions Linux (telles que les distributions basées sur [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)ou les distributions DIY) ne sont pas livrées avec les mises à jour propriétaires du [microcode](https://en.wikipedia.org/wiki/Microcode) qui corrigent les failles de sécurité critiques. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). Nous **recommandons vivement** d'installer les mises à jour du microcode, car elles contiennent d'importants correctifs de sécurité pour l'unité centrale qui ne peuvent pas être entièrement atténués par le logiciel seul. Fedora et openSUSE ont tous deux les mises à jour du microcode appliquées par défaut. @@ -131,11 +131,11 @@ En outre, certaines distributions ne téléchargent pas automatiquement les mise De nombreuses distributions Linux de bureau (Fedora, openSUSE, etc.) sont livrées avec [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) pour configurer les paramètres Ethernet et Wi-Fi. -Il est possible de [changer aléatoirement](https://fedoramagazine.org/randomize-mac-address-nm/) l'[adresse MAC](https://en.wikipedia.org/wiki/MAC_address) en utilisant NetworkManager. Cela permet de protéger un peu plus la vie privée sur les réseaux Wi-Fi, car il est plus difficile de suivre des appareils spécifiques sur le réseau auquel vous êtes connecté. Cela ne vous rend [**pas**](https://papers.mathyvanhoef.com/wisec2016.pdf) anonyme. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. Cela permet de protéger un peu plus la vie privée sur les réseaux Wi-Fi, car il est plus difficile de suivre des appareils spécifiques sur le réseau auquel vous êtes connecté. Cela ne vous rend [**pas**](https://papers.mathyvanhoef.com/wisec2016.pdf) anonyme. -Nous recommandons de changer le paramètre et mettre **aléatoire** plutôt que **stable**, comme suggéré dans l'[article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -Si vous utilisez [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), vous devrez définir [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) qui activera [RFC 7844 (Profils d'anonymat pour les clients DHCP)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). La randomisation des adresses MAC est principalement bénéfique pour les connexions Wi-Fi. Pour les connexions Ethernet, la randomisation de l'adresse MAC ne présente que peu d'avantages (voire aucun), car un administrateur de réseau peut trivialement identifier votre appareil par d'autres moyens (par exemple en inspectant le port auquel vous êtes connecté sur le commutateur du réseau). Rendre aléatoire les adresses MAC Wi-Fi dépend de la prise en charge par le micrologiciel du Wi-Fi. @@ -151,6 +151,6 @@ Il existe d'autres identifiants de système auxquels vous devez faire attention. Le projet Fedora [compte](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) le nombre de systèmes uniques qui accèdent à ses miroirs en utilisant une variable [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) au lieu d'un identifiant unique. Fedora fait cela pour déterminer la charge et fournir de meilleurs serveurs pour les mises à jour si nécessaire. -Cette [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) est actuellement désactivée par défaut. Nous recommandons d'ajouter `countme=false` à `/etc/dnf/dnf.conf` juste au cas où il serait activé dans le futur. Sur les systèmes qui utilisent `rpm-ostree` tels que Silverblue, l'option countme est désactivée en masquant le compteur [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/). +Cette [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) est actuellement désactivée par défaut. Nous recommandons d'ajouter `countme=false` à `/etc/dnf/dnf.conf` juste au cas où il serait activé dans le futur. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE utilise également un [identifiant unique](https://en.opensuse.org/openSUSE:Statistics) pour compter les systèmes, qui peut être désactivé en supprimant le fichier `/var/lib/zypp/AnonymousUniqueId`. diff --git a/i18n/fr/os/macos-overview.md b/i18n/fr/os/macos-overview.md index efdef58e..a367efa3 100644 --- a/i18n/fr/os/macos-overview.md +++ b/i18n/fr/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** est un système d'exploitation Unix développé par Apple pour leurs ordinateurs Mac. Pour améliorer la confidentialité de macOS, il est possible de désactiver la télémétrie et renforcer les paramètres existants de confidentialité et de sécurité. -Les anciens Mac à base de processeur Intel et les Hackintosh ne prennent pas en charge toutes les fonctions de sécurité offertes par macOS. Pour améliorer la sécurité des données, nous recommandons d'utiliser un Mac plus récent avec un processeur [Apple silicium](https://support.apple.com/fr-fr/HT211814). +Les anciens Mac à base de processeur Intel et les Hackintosh ne prennent pas en charge toutes les fonctions de sécurité offertes par macOS. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Remarques concernant la vie privée @@ -22,13 +22,13 @@ macOS effectue des contrôles en ligne lorsque vous ouvrez une application afin Auparavant, ces vérifications étaient effectuées via un protocole OCSP non chiffré, ce qui pouvait entraîner une fuite d'informations sur les applications que vous exécutez sur votre réseau. Apple a mis à jour son service OCSP pour utiliser le chiffrement HTTPS en 2021, et [a publié des informations](https://support.apple.com/HT202491) sur sa politique de journalisation pour ce service. Ils ont également promis d'ajouter un mécanisme permettant aux personnes de se retirer de cette vérification en ligne, mais cela n'a pas été ajouté à macOS en date de juillet 2023. -Bien que vous [puissiez](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) désactiver manuellement cette vérification assez facilement, nous vous déconseillons de le faire à moins que les vérifications de révocation effectuées par macOS ne vous compromettent gravement, car elles jouent un rôle important en empêchant l'exécution d'applications compromises. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Configuration recommandée Lorsque vous configurez votre Mac pour la première fois, vous disposez d'un compte d'administrateur, dont les privilèges sont plus élevés que ceux d'un compte d'utilisateur standard. macOS dispose d'un certain nombre de protections qui empêchent les logiciels malveillants et d'autres programmes d'abuser de vos privilèges d'administrateur, de sorte que l'utilisation de ce compte est généralement sûre. -Cependant, des exploits dans des utilitaires de protection tels que `sudo` ont été [découverts dans le passé](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). Si vous souhaitez éviter que les programmes que vous exécutez n'abusent de vos privilèges d'administrateur, vous pouvez envisager de créer un deuxième compte d'utilisateur standard, que vous utiliserez pour les opérations quotidiennes. Cela présente l'avantage supplémentaire de rendre plus évident le fait qu'une application a besoin d'un accès administrateur, parce qu'elle vous demandera à chaque fois de fournir des informations d'identification. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). Si vous souhaitez éviter que les programmes que vous exécutez n'abusent de vos privilèges d'administrateur, vous pouvez envisager de créer un deuxième compte d'utilisateur standard, que vous utiliserez pour les opérations quotidiennes. Cela présente l'avantage supplémentaire de rendre plus évident le fait qu'une application a besoin d'un accès administrateur, parce qu'elle vous demandera à chaque fois de fournir des informations d'identification. Si vous utilisez un deuxième compte, il n'est pas strictement nécessaire de vous connecter à votre compte administrateur d'origine à partir de l'écran de connexion de macOS. Lorsque vous effectuez, en tant qu'utilisateur standard, une opération nécessitant des autorisations d'administrateur, le système vous invite à vous authentifier, ce qui vous permet d'entrer une seule fois vos informations d'identification d'administrateur en tant qu'utilisateur standard. Apple fournit des [conseils](https://support.apple.com/HT203998) sur la façon de masquer votre compte administrateur si vous préférez ne voir qu'un seul compte sur votre écran de connexion. @@ -128,7 +128,7 @@ Sur les anciens ordinateurs Mac à processeur Intel, FileVault est la seule form ##### Mode Isolement -Le [mode Isolement](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) désactive certaines fonctionnalités afin d'améliorer la sécurité. Certaines applications ou fonctionnalités ne fonctionneront pas de la même manière que lorsqu'il est désactivé. Par exemple, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) et [WASM](https://developer.mozilla.org/fr/docs/WebAssembly) sont désactivés dans Safari lorsque le mode Isolement est activé. Nous vous recommandons d'activer le mode Isolement et de voir s'il a un impact significatif sur votre utilisation, car la plupart des changements qu'il apporte sont faciles à vivre. +Le [mode Isolement](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) désactive certaines fonctionnalités afin d'améliorer la sécurité. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. Nous vous recommandons d'activer le mode Isolement et de voir s'il a un impact significatif sur votre utilisation, car la plupart des changements qu'il apporte sont faciles à vivre. - [x] Cliquez sur **Activer** diff --git a/i18n/fr/os/qubes-overview.md b/i18n/fr/os/qubes-overview.md index c0571157..bb15e27f 100644 --- a/i18n/fr/os/qubes-overview.md +++ b/i18n/fr/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes est un système d'exploitation conçu pour isoler les applications au sein de *qubes* (anciennement "VMs") afin d'améliorer la sécurité. --- -[**Qubes OS**](../desktop.md#qubes-os) est un système d'exploitation open source qui utilise l'hyperviseur [Xen](https://fr.wikipedia.org/wiki/Xen) pour fournir une sécurité forte pour l'informatique de bureau par le biais de *qubes* isolés (qui sont des machines virtuelles). Vous pouvez attribuer à chaque *qube* un niveau de confiance en fonction de son objectif. Qubes OS assure la sécurité en utilisant l'isolation. Il n'autorise les actions qu'au cas par cas et est donc à l'opposé de [l'énumération de méchanceté](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) est un système d'exploitation open source qui utilise l'hyperviseur [Xen](https://fr.wikipedia.org/wiki/Xen) pour fournir une sécurité forte pour l'informatique de bureau par le biais de *qubes* isolés (qui sont des machines virtuelles). Vous pouvez attribuer à chaque *qube* un niveau de confiance en fonction de son objectif. Qubes OS assure la sécurité en utilisant l'isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## Comment fonctionne Qubes OS ? -Les qubes utilisent la [compartimentation](https://www.qubes-os.org/intro/) pour assurer la sécurité du système. Les Qubes sont créés à partir de modèles, ceux par défaut étant pour Fedora, Debian et [Whonix](../desktop.md#whonix). Qubes OS vous permet également de créer des *qubes* à usage unique [jetables](https://www.qubes-os.org/doc/how-to-use-disposables/). +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Les Qubes sont créés à partir de modèles, ceux par défaut étant pour Fedora, Debian et [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Certaines des informations présentées ici et dans la documentation du système ![Architecture de Qubes](../assets/img/qubes/qubes-trust-level-architecture.png)
Architecture de Qubes, Crédit : Intro de Qu'est-ce que Qubes OS
-Chaque qube a une [bordure colorée](https://www.qubes-os.org/screenshots/) qui peut vous aider à repérer le domaine dans lequel il s'exécute. Vous pouvez, par exemple, utiliser une couleur spécifique pour votre navigateur bancaire, tout en utilisant une couleur différente pour un navigateur général non fiable. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. Vous pouvez, par exemple, utiliser une couleur spécifique pour votre navigateur bancaire, tout en utilisant une couleur différente pour un navigateur général non fiable. ![Bordure colorée](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Bordures de fenêtres de Qubes, Crédit : Captures d'écran Qubes
@@ -33,7 +33,7 @@ Qubes OS utilise une VM Web [dom0](https://wiki.xenproject.org/wiki/Dom0) pour c ### Copier et coller du texte -Vous pouvez [copier et coller du texte](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) en utilisant `qvm-copy-to-vm` ou les instructions ci-dessous : +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Appuyez sur **Ctrl+C** pour indiquer au *qube* dans lequel vous vous trouvez que vous souhaitez copier quelque chose. 2. Appuyez sur **Ctrl+Maj+C** pour demander au *qube* de mettre ce tampon à la disposition du presse-papiers global. @@ -47,13 +47,13 @@ Pour copier et coller des fichiers et des répertoires (dossiers) d'un *qube* à
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. Ce faisant, les changements ne sont pas immédiats et peuvent être facilement annulés en cas d'accident. When you run a *qube*, it does not have a persistent filesystem. Vous pouvez créer et supprimer des fichiers, mais ces modifications sont éphémères. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. Ce faisant, les changements ne sont pas immédiats et peuvent être facilement annulés en cas d'accident. When you run a *qube*, it does not have a persistent filesystem. Vous pouvez créer et supprimer des fichiers, mais ces modifications sont éphémères.
### Interactions inter-VM -L'[environnement qrexec](https://www.qubes-os.org/doc/qrexec/) est une partie essentielle de Qubes qui permet la communication entre les domaines. Il est construit sur la bibliothèque Xen *vchan*, qui facilite [l'isolation de par le biais de politiques](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Se connecter à Tor via un VPN @@ -73,9 +73,9 @@ Vos qubes devraient être configurés de la manière suivante : ## Ressources supplémentaires -Pour de plus amples informations, nous vous encourageons à consulter les pages de documentation complètes de Qubes OS, situées sur le [site web de Qubes OS](https://www.qubes-os.org/doc/). Des copies hors ligne peuvent être téléchargées à partir du [dépôt de documentationde](https://github.com/QubesOS/qubes-doc) Qubes OS. +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Des copies hors ligne peuvent être téléchargées à partir du [dépôt de documentationde](https://github.com/QubesOS/qubes-doc) Qubes OS. -- [Sans doute le système d'exploitation le plus sûr au monde](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Comparaison entre le cloisonnement des logiciels et la séparation physique](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitionner ma vie numérique en domaines de sécurité](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Articles connexes](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/fr/passwords.md b/i18n/fr/passwords.md index d417a741..6fcbd661 100644 --- a/i18n/fr/passwords.md +++ b/i18n/fr/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Gestionnaire de mots de passe operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Gestionnaire de mots de passe operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Gestionnaire de mots de passe operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Gestionnaire de mots de passe operatingSystem: - Windows @@ -127,7 +127,7 @@ Les gestionnaires de mots de passe vous permettent de stocker et de gérer en to Les gestionnaires de mots de passe intégrés dans des logiciels tels que les navigateurs et les systèmes d'exploitation ne sont parfois pas aussi performants que les logiciels de gestion de mots de passe dédiés. L'avantage d'un gestionnaire de mots de passe intégré est une bonne intégration avec le logiciel, mais il peut souvent être très simpliste et manquer de fonctions de confidentialité et de sécurité dont disposent les offres dissociées. -Par exemple, le gestionnaire de mots de passe de Microsoft Edge ne propose pas du tout E2EE. Le gestionnaire de mots de passe de Google dispose d'un E2EE [facultatif](https://support.google.com/accounts/answer/11350823), et [celui d'Apple](https://support.apple.com/fr-fr/HT202303) propose E2EE par défaut. +Par exemple, le gestionnaire de mots de passe de Microsoft Edge ne propose pas du tout E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ Ces gestionnaires de mots de passe synchronisent vos mots de passe sur un serveu [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ Ces gestionnaires de mots de passe synchronisent vos mots de passe sur un serveu
-Bitwarden propose également [Bitwarden Send](https://bitwarden.com/products/send/), qui vous permet de partager du texte et des fichiers en toute sécurité grâce au [chiffrement de bout en bout](https://bitwarden.com/help/send-encryption). Un [mot de passe](https://bitwarden.com/help/send-privacy/#send-passwords) peut être demandé avec le lien d'envoi. Bitwarden Send dispose également d'une fonction de [suppression automatique](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). Un [mot de passe](https://bitwarden.com/help/send-privacy/#send-passwords) peut être demandé avec le lien d'envoi. Bitwarden Send dispose également d'une fonction de [suppression automatique](https://bitwarden.com/help/send-lifespan). Vous devez disposer de [l'offre Premium](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) pour pouvoir partager des fichiers. L'offre gratuite ne permet que le partage de texte. @@ -183,20 +183,20 @@ Le code côté serveur de Bitwarden est [open source](https://github.com/bitward ![Logo 1Password](assets/img/password-management/1password.svg){ align=right } -**1Password** est un gestionnaire de mots de passe qui met l'accent sur la sécurité et la facilité d'utilisation. Il vous permet de stocker des mots de passe, des cartes de crédit, des licences de logiciels et toute autre information sensible dans un coffre-fort numérique sécurisé. Votre chambre forte est hébergée sur les serveurs de 1Password pour un [tarif mensuel](https://1password.com/sign-up/). 1Password est [audité](https://support.1password.com/security-assessments/) régulièrement et fournit un support client exceptionnel. 1Password est closed source ; cependant, la sécurité du produit est documentée de manière approfondie dans leur [livre blanc sur la sécurité](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** est un gestionnaire de mots de passe qui met l'accent sur la sécurité et la facilité d'utilisation. Il vous permet de stocker des mots de passe, des cartes de crédit, des licences de logiciels et toute autre information sensible dans un coffre-fort numérique sécurisé. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password est closed source ; cependant, la sécurité du produit est documentée de manière approfondie dans leur [livre blanc sur la sécurité](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ Un avantage de 1Password sur Bitwarden est sa prise en charge de première class Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ Ces options vous permettent de gérer une base de données de mots de passe chif [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stocke ses données d'exportation sous forme de fichiers [CSV](https:/ **KeePassDX** est un gestionnaire de mots de passe léger pour Android. Il permet de modifier des données chiffrées dans un seul fichier au format KeePass et de remplir les formulaires de manière sécurisée. [Contributeur Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) permet de débloquer du contenu cosmétique et des fonctions de protocole non standard, mais surtout, il aide et encourage le développement. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stocke ses données d'exportation sous forme de fichiers [CSV](https:/ ![Logo Strongbox](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** est un gestionnaire de mots de passe natif et open-source pour iOS et macOS. Prenant en charge les formats KeePass et Password Safe, Strongbox peut être utilisé en tandem avec d'autres gestionnaires de mots de passe, comme KeePassXC, sur des plateformes autres qu'Apple. En utilisant un [modèle freemium](https://strongboxsafe.com/pricing/), Strongbox propose la plupart des fonctionnalités dans son volet gratuit, tandis que les fonctions plus pratiques [features](https://strongboxsafe.com/comparison/) - telles que l'authentification biométrique - sont verrouillées par un abonnement ou une licence perpétuelle. +**Strongbox** est un gestionnaire de mots de passe natif et open-source pour iOS et macOS. Prenant en charge les formats KeePass et Password Safe, Strongbox peut être utilisé en tandem avec d'autres gestionnaires de mots de passe, comme KeePassXC, sur des plateformes autres qu'Apple. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-En outre, une version hors ligne est proposée : [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). Cette version est dépouillée dans le but de réduire la surface d'attaque. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Cette version est dépouillée dans le but de réduire la surface d'attaque. ### Ligne de commande @@ -356,7 +356,7 @@ Ces produits sont des gestionnaires de mots de passe minimaux qui peuvent être **gopass** est un gestionnaire de mots de passe pour ligne de commande écrit en Go. Il fonctionne sur tous les principaux systèmes d'exploitation de bureau et de serveur (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ Ces produits sont des gestionnaires de mots de passe minimaux qui peuvent être
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/fr/photo-management.md b/i18n/fr/photo-management.md index b8882448..96f88559 100644 --- a/i18n/fr/photo-management.md +++ b/i18n/fr/photo-management.md @@ -14,12 +14,12 @@ La plupart des solutions cloud de gestion de photos, telles que Google Photos, F ![Logo ente](assets/img/photo-management/ente.svg#only-light){ align=right } ![Logo ente](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** est un service de sauvegarde de photos chiffré de bout en bout qui prend en charge les sauvegardes automatiques sur iOS et Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** est un service de sauvegarde de photos chiffré de bout en bout qui prend en charge les sauvegardes automatiques sur iOS et Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Page d'accueil](https://ente.io/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Politique de confidentialité" } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/ente-io){ .card-link title="Code source" } +[:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" }
Téléchargements @@ -46,17 +46,17 @@ La plupart des solutions cloud de gestion de photos, telles que Google Photos, F **Stingle** est une application de galerie et d'appareil photo avec une fonctionnalité intégrée de sauvegarde et de synchronisation chiffrée de bout en bout pour vos photos et vos vidéos. Le stockage commence à 1 Go pour les comptes gratuits sur leur cloud, ou vous pouvez héberger votre propre serveur API Stingle pour une indépendance totale. -[:octicons-home-16: Page d'accueil](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/stingle){ .card-link title="Code source" } +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Téléchargements - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,12 +69,12 @@ La plupart des solutions cloud de gestion de photos, telles que Google Photos, F ![logo PhotoPrism](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** est une plateforme auto-hébergée pour la gestion des photos. Elle prend en charge la synchronisation et le partage d'albums ainsi qu'une variété d'autres [fonctionnalités](https://www.photoprism.app/features). Elle n'inclut pas l'E2EE, il est donc préférable de l'héberger sur un serveur en lequel vous avez confiance et que vous contrôlez. +**PhotoPrism** est une plateforme auto-hébergée pour la gestion des photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). Elle n'inclut pas l'E2EE, il est donc préférable de l'héberger sur un serveur en lequel vous avez confiance et que vous contrôlez. -[:octicons-home-16: Page d'accueil](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Code source" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
Téléchargements diff --git a/i18n/fr/productivity.md b/i18n/fr/productivity.md index 3050a0e0..a8397a20 100644 --- a/i18n/fr/productivity.md +++ b/i18n/fr/productivity.md @@ -17,11 +17,11 @@ La plupart des suites bureautiques en ligne ne prennent pas en charge l'E2EE, ce **Nextcloud** est une suite de logiciels client-serveur gratuits et open-source permettant de créer vos propres services d'hébergement de fichiers sur un serveur privé que vous contrôlez. -[:octicons-home-16: Page d'accueil](https://nextcloud.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Code source" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Téléchargements @@ -52,11 +52,11 @@ Nous ne recommandons pas l'utilisation de [l'application E2EE](https://apps.next **CryptPad** est une alternative privée par conception aux outils de bureautique populaires. Tout le contenu de ce service web est chiffré de bout en bout et peut être partagé facilement avec d'autres utilisateurs. -[:octicons-home-16: Page d'accueil](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Code source" } -[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute }
@@ -99,20 +99,20 @@ Nos critères de cas idéal représentent ce que nous aimerions voir d'un projet **LibreOffice** est une suite bureautique gratuite et open-source aux fonctionnalités étendues. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Nos critères de cas idéal représentent ce que nous aimerions voir d'un projet **OnlyOffice** est une suite bureautique gratuite et open-source basée sur le cloud et dotée de nombreuses fonctionnalités, notamment l'intégration avec Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Nos critères de cas idéal représentent ce que nous aimerions voir d'un projet - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -175,10 +175,10 @@ En général, nous définissons les suites bureautiques comme des applications q **PrivateBin** est un service de collage en ligne minimaliste et open-source où le serveur n'a aucune connaissance des données collées. Les données sont chiffrées/déchiffrées dans le navigateur en utilisant AES 256 bits. Il s'agit de la version améliorée de ZeroBin. -[:octicons-home-16: Page d'accueil](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Instances publiques"} +[:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Code source" } +[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
diff --git a/i18n/fr/real-time-communication.md b/i18n/fr/real-time-communication.md index f87128c7..26d7d6d8 100644 --- a/i18n/fr/real-time-communication.md +++ b/i18n/fr/real-time-communication.md @@ -20,20 +20,20 @@ Ces messageries sont idéales pour sécuriser vos communications sensibles. ![Logo de Signal](assets/img/messengers/signal.svg){ align=right } -**Signal** est une application mobile développée par Signal Messenger LLC. L'application fournit une messagerie instantanée et des appels sécurisés avec le protocole Signal, un protocole de chiffrement extrêmement sécurisé qui prend en charge la confidentialité persistante[^1] et la sécurité post-compromission.[^2] +**Signal** est une application mobile développée par Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Page d'accueil](https://signal.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/signalapp){ .card-link title="Code source" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribuer } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal demande votre numéro de téléphone pour l'enregistrement, mais vous dev Vous pouvez également modifier le paramètre **Qui peut me retrouver grâce à mon numéro de téléphone** et mettre **Personne** si vous souhaitez empêcher les personnes qui possèdent déjà votre numéro de téléphone de trouver votre compte/nom d'utilisateur Signal. -La liste des contacts sur Signal est chiffrée à l'aide de votre code PIN Signal et le serveur n'y a pas accès. Votre profil est également chiffré et n'est partagé qu'avec les contacts avec lesquels vous discutez. Signal prend en charge les [groupes privés](https://signal.org/blog/signal-private-group-system/), qui permettent au serveur de n'avoir aucune trace des membres du groupe, des titres du groupe, des avatars du groupe ou des attributs du groupe. Signal expose un minimum de métadonnées lorsque l'option [Expéditeur Scellé](https://signal.org/blog/sealed-sender/) est activée. L'adresse de l'expéditeur est chiffrée avec le corps du message, et seule l'adresse du destinataire est visible par le serveur. Expéditeur Scellé est uniquement activé pour les personnes de votre liste de contacts, mais peut être activé pour tous les destinataires avec le risque accru de recevoir du spam. +La liste des contacts sur Signal est chiffrée à l'aide de votre code PIN Signal et le serveur n'y a pas accès. Votre profil est également chiffré et n'est partagé qu'avec les contacts avec lesquels vous discutez. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. L'adresse de l'expéditeur est chiffrée avec le corps du message, et seule l'adresse du destinataire est visible par le serveur. Expéditeur Scellé est uniquement activé pour les personnes de votre liste de contacts, mais peut être activé pour tous les destinataires avec le risque accru de recevoir du spam. -Le protocole a fait l'objet d'un [audit](https://eprint.iacr.org/2016/1013.pdf) indépendant en 2016. La spécification du protocole Signal se trouve dans leur [documentation](https://signal.org/docs/). +Le protocole a fait l'objet d'un [audit](https://eprint.iacr.org/2016/1013.pdf) indépendant en 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). Nous avons quelques conseils supplémentaires pour configurer et renforcer votre installation Signal : -[Configuration et renforcement de Signal :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Configuration et renforcement de Signal :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -75,10 +75,10 @@ Nous avons quelques conseils supplémentaires pour configurer et renforcer votre [:octicons-code-16:](https://github.com/simplex-chat){ .card-link title="Code source" }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -96,22 +96,22 @@ SimpleX Chat prend en charge les fonctionnalités de base des conversations de g
-![Logo Briar](assets/img/messengers/briar.svg){ align=right } +![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** est une messagerie instantanée chiffrée qui se [connecte](https://briarproject.org/how-it-works/) à d'autres clients par le réseau Tor. Briar peut également se connecter par Wi-Fi ou Bluetooth lorsqu'il se trouve à proximité. Le mode de maillage local de Briar peut être utile lorsque la disponibilité d’internet pose problème. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar peut également se connecter par Wi-Fi ou Bluetooth lorsqu'il se trouve à proximité. Le mode de maillage local de Briar peut être utile lorsque la disponibilité d’internet pose problème. -[:octicons-home-16: Page d'accueil](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Politique de confidentialité" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Code source" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Les options de dons sont listées en bas de la page d'accueil" } +[:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat prend en charge les fonctionnalités de base des conversations de g Pour ajouter un contact sur Briar, vous devez d'abord vous ajouter tous les deux. Vous pouvez soit échanger des liens `briar://` soit scanner le QR code d'un contact s'il se trouve à proximité. -Le logiciel client a été indépendamment [audité](https://briarproject.org/news/2017-beta-released-security-audit/) et le protocole de routage anonyme utilise le réseau Tor qui a également été audité. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar a un [cahier des charges](https://code.briarproject.org/briar/briar-spec) entièrement publié. @@ -139,26 +139,26 @@ Ces messageries instantanées ne disposent pas de la confidentialité persistant
-![Logo d'Element](assets/img/messengers/element.svg){ align=right } +![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** est le [client](https://matrix.org/ecosystem/clients/) de référence pour le protocole [Matrix](https://matrix.org/docs/guides/introduction), un [standard ouvert](https://matrix.org/docs/spec) pour la communication décentralisée sécurisée en temps réel. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Les messages et les fichiers partagés dans les salons privés (ceux qui nécessitent une invitation) sont par défaut E2EE, tout comme les appels vocaux et vidéo individuels. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" }
-Téléchargements +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Les appels vocaux et vidéo de groupe ne sont [pas](https://github.com/vector-im Le protocole Matrix lui-même [prend théoriquement en charge la confidentialité persistante](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], mais elle [n'est pas prise en charge par Element pour le moment](https://github.com/vector-im/element-web/issues/7101) car elle rompt certains aspects de l'expérience utilisateur tels que la sauvegarde des clés et l'historique des messages partagés. -Le protocole a fait l'objet d'un [audit](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) indépendant en 2016. La spécification du protocole Matrix se trouve dans leur [documentation](https://spec.matrix.org/latest/). Le [cliquet cryptographique Olm](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) utilisé par Matrix est une implémentation de l'[algorithme à double cliquet](https://signal.org/docs/specifications/doubleratchet/) de Signal. +Le protocole a fait l'objet d'un [audit](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) indépendant en 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,12 +181,12 @@ Le protocole a fait l'objet d'un [audit](https://matrix.org/blog/2016/11/21/matr **Session** est une messagerie décentralisée axée sur les communications privées, sécurisées et anonymes. Session prend en charge les messages directs, les discussions de groupe et les appels vocaux. -Session utilise le réseau décentralisé [Oxen Service Node Network](https://oxen.io/) pour stocker et acheminer les messages. Chaque message chiffré est acheminé via trois nœuds dans le Oxen Service Node Network, ce qui rend pratiquement impossible pour les nœuds de compiler des informations significatives sur ceux qui utilisent le réseau. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Chaque message chiffré est acheminé via trois nœuds dans le Oxen Service Node Network, ce qui rend pratiquement impossible pour les nœuds de compiler des informations significatives sur ceux qui utilisent le réseau. -[:octicons-home-16: Page d'accueil](https://getsession.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Politique de confidentialité" } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Code source" } +[:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" }
Téléchargements diff --git a/i18n/fr/router.md b/i18n/fr/router.md index 5b70ba42..54f445ce 100644 --- a/i18n/fr/router.md +++ b/i18n/fr/router.md @@ -35,10 +35,10 @@ Vous pouvez consulter le [tableau de matériel](https://openwrt.org/toh/start) d **OPNsense** est une plateforme de routage et de pare-feu open source basée sur FreeBSD qui intègre de nombreuses fonctionnalités avancées telles que la mise en forme du trafic, l'équilibrage de charge et des capacités VPN, avec de nombreuses autres fonctionnalités disponibles sous forme de plugins. OPNsense est généralement déployé comme pare-feu de périmètre, routeur, point d'accès sans fil, serveur DHCP, serveur DNS et point de terminaison VPN. -[:octicons-home-16: Page d'accueil](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} -[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Code source" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribuer } +[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/fr/search-engines.md b/i18n/fr/search-engines.md index 59d19444..fd2b6d4d 100644 --- a/i18n/fr/search-engines.md +++ b/i18n/fr/search-engines.md @@ -10,7 +10,7 @@ Utilisez un moteur de recherche qui ne construit pas un profil publicitaire en f Les recommandations formulées ici sont fondées sur les mérites de la politique de confidentialité de chaque service. Il n'y a **aucune garantie** que ces politiques de confidentialité soient respectées. -Envisagez d'utiliser un [VPN](vpn.md) ou [Tor](https://www.torproject.org/) si votre modèle de menace nécessite de cacher votre adresse IP du fournisseur de recherche. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,9 +24,9 @@ Brave Search comprend des fonctionnalités uniques telles que Discussions, qui m Nous vous recommandons de désactiver [Mesures d'utilisation anonymes](https://search.brave.com/help/usage-metrics) car ells sont activées par défaut et peuvent être désactivées dans les paramètres. -[:octicons-home-16: Page d'accueil](https://search.brave.com/){ .md-button .md-button--primary } -[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Service onion" } -[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Politique de confidentialité" } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation}
@@ -41,14 +41,14 @@ Brave Search est basé aux États-Unis. Leur [politique de confidentialité](htt ![Logo DuckDuckGo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** est l'un des moteurs de recherche privés les plus populaires. Parmi les fonctionnalités de recherche notables de DuckDuckGo figurent les [bangs](https://duckduckgo.com/bang) et de nombreuses [réponses instantanées](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). Le moteur de recherche s'appuie sur une API commerciale de Bing pour fournir la plupart des résultats, mais il utilise également de nombreuses [autres sources](https://help.duckduckgo.com/results/sources/) pour les réponses instantanées et d'autres résultats non primaires. +**DuckDuckGo** est l'un des moteurs de recherche privés les plus populaires. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo est le moteur de recherche par défaut du navigateur Tor et l'une des rares options disponibles sur le navigateur Safari d'Apple. -[:octicons-home-16: Page d'accueil](https://duckduckgo.com){ .md-button .md-button--primary } -[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Service onion" } -[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo est le moteur de recherche par défaut du navigateur Tor et l'une des DuckDuckGo est basé aux États-Unis. Leur [politique de confidentialité](https://duckduckgo.com/privacy) indique qu'ils **font** enregistrer vos recherches à des fins d'amélioration des produits, mais pas votre adresse IP ou toute autre information d'identification personnelle. -DuckDuckGo propose deux [autres versions](https://help.duckduckgo.com/features/non-javascript/) de son moteur de recherche, toutes deux ne nécessitant pas de JavaScript. Ces versions manquent toutefois de fonctionnalités. Ces versions peuvent également être utilisées conjointement avec leur [adresse oignon Tor](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) en ajoutant [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) ou [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) pour la version respective. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. Ces versions manquent toutefois de fonctionnalités. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -66,9 +66,9 @@ DuckDuckGo propose deux [autres versions](https://help.duckduckgo.com/features/n **SearXNG** est un métamoteur de recherche open-source, auto-hébergeable, qui agrège les résultats d'autres moteurs de recherche sans stocker lui-même d'informations. C'est un fork activement maintenu de [SearX](https://github.com/searx/searx). -[:octicons-home-16: Page d'accueil](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Instances publiques"} -[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Code source" } +[:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} +[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -84,14 +84,14 @@ Lorsque vous utilisez une instance SearXNG, assurez-vous d'aller lire sa politiq
-![logo Startpage](assets/img/search-engines/startpage.svg#only-light){ align=right } -![logo Startpage](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } +![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } +![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** est un moteur de recherche privé connu pour retourner les résultats de recherche de [Google et Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-entre-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-). L'une des caractéristiques uniques de Startpage est la [Vue anonyme](https://www.startpage.com/en/anonymous-view/), qui s'efforce de normaliser l'activité des utilisateurs afin de rendre plus difficile leur identification. Cette fonction peut être utile pour masquer [quelques](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) propriétés du réseau et du navigateur. Contrairement à ce que son nom suggère, il ne faut pas compter sur cette fonction pour assurer l'anonymat. Si vous recherchez l'anonymat, utilisez plutôt le [Navigateur Tor](tor.md#tor-browser). +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Contrairement à ce que son nom suggère, il ne faut pas compter sur cette fonction pour assurer l'anonymat. Si vous recherchez l'anonymat, utilisez plutôt le [Navigateur Tor](tor.md#tor-browser). -[:octicons-home-16: Page d'accueil](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Politique de confidentialité" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage limite régulièrement l'accès au service à certaines adresses IP, c -Startpage est basée aux Pays-Bas. Selon leur [politique de confidentialité](https://www.startpage.com/en/privacy-policy/), ils enregistrent des détails tels que : le système d'exploitation, le type de navigateur et la langue. Ils n'enregistrent pas votre adresse IP, vos requêtes de recherche ou d'autres informations à caractère personnel. +Startpage est basée aux Pays-Bas. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. Ils n'enregistrent pas votre adresse IP, vos requêtes de recherche ou d'autres informations à caractère personnel. -L'actionnaire majoritaire de Startpage est System1 qui est une société de technologie publicitaire. Nous ne pensons pas que ce soit un problème car ils ont une [politique de confidentialité](https://system1.com/terms/privacy-policy)distincte. L'équipe de Privacy Guides a contacté Startpage [en 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) pour dissiper toute inquiétude quant à l'investissement considérable de System1 dans ce service. Nous avons été satisfaits des réponses que nous avons reçues. +L'actionnaire majoritaire de Startpage est System1 qui est une société de technologie publicitaire. Nous ne pensons pas que ce soit un problème car ils ont une [politique de confidentialité](https://system1.com/terms/privacy-policy)distincte. The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. Nous avons été satisfaits des réponses que nous avons reçues. ## Critères diff --git a/i18n/fr/tools.md b/i18n/fr/tools.md index 11635e0c..f7603e86 100644 --- a/i18n/fr/tools.md +++ b/i18n/fr/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides est le site web le plus transparent et le plus fiabl Si vous cherchez une solution spécifique à un problème, voici pour diverses catégories les outils matériels et logiciels que nous vous recommandons. Les outils de protection de la vie privée que nous recommandons sont principalement choisis pour leurs fonctionnalités de sécurité, avec une attention particulière pour les outils décentralisés et open source. Ils sont adaptés à divers modèles menaces, que vous cherchiez à vous protéger contre les programmes de surveillance de masse mondiaux et à éviter les grandes entreprises du numérique, voire à mitiger les attaques. Toutefois, vous seul êtes en mesure de déterminer ce qui répondra le mieux à vos besoins. -Si vous souhaitez obtenir de l'aide pour trouver quels sont les outils de protection de la vie privée et les alternatives les plus adaptés à vos besoins, lancez une discussion sur notre [forum](https://discuss.privacyguides.net/) ou sur notre communauté [Matrix](https://matrix.to/#/#privacyguides:matrix.org) ! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! Pour avoir plus de détails sur chaque projet, pour savoir pourquoi ils ont été choisis, ou pour connaître d'autres conseils ou astuces que nous préconisons, cliquez sur le lien « En savoir plus » dans chaque section, ou cliquez sur la recommandation pour accéder à la section correspondante de cette page. @@ -89,7 +89,7 @@ Pour avoir plus de détails sur chaque projet, pour savoir pourquoi ils ont ét #### Fournisseurs de DNS -Nous [recommandons](dns.md#recommended-providers) un certain nombre de serveurs DNS chiffrés en fonction de divers critères, parmi lesquels [Mullvad](https://mullvad.net/fr/help/dns-over-https-and-dns-over-tls) et [Quad9](https://quad9.net/). Nous vous recommandons de lire nos pages sur les DNS avant de choisir un fournisseur. Dans de nombreux cas, l'utilisation d'un autre fournisseur de DNS n'est pas recommandée. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. Nous vous recommandons de lire nos pages sur les DNS avant de choisir un fournisseur. Dans de nombreux cas, l'utilisation d'un autre fournisseur de DNS n'est pas recommandée. [En savoir plus :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/fr/tor.md b/i18n/fr/tor.md index 5eb55727..9930ef24 100644 --- a/i18n/fr/tor.md +++ b/i18n/fr/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Navigateur Tor image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://fr.m.wikipedia.org/wiki/Tor_(r%C3%A9seau) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: Le réseau **Tor** est un groupe de serveurs gérés par des bénévoles qui vous permet de vous connecter gratuitement et d'améliorer votre confidentialité et votre sécurité sur Internet. Les particuliers et les organisations peuvent également partager des informations sur le réseau Tor avec des "services cachés .onion" sans compromettre leur vie privée. Parce que le trafic Tor est difficile à bloquer et à tracer, Tor est un outil efficace pour contourner la censure. -[:octicons-home-16:](https://www.torproject.org){ .card-link title="Page d'accueil" } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Service onion" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Code source" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribuer } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor fonctionne en acheminant votre trafic Internet via ces serveurs gérés par des volontaires, au lieu d'établir une connexion directe avec le site que vous essayez de visiter. Cela permet de masquer la provenance du trafic, et aucun serveur sur le chemin de la connexion n'est en mesure de voir le chemin complet de la provenance et de la destination du trafic, ce qui signifie que même les serveurs que vous utilisez pour vous connecter ne peuvent pas briser votre anonymat. @@ -60,20 +60,20 @@ Si un anonymat plus complet est primordial dans votre situation, vous devriez ** Le **Navigateur Tor** est le choix idéal si vous avez besoin d'anonymat, car il vous donne accès au réseau et aux ponts Tor, et il inclut des paramètres par défaut et des extensions qui sont automatiquement configurées par les niveaux de sécurité par défaut : *Normal*, *Plus sûr* et *Le plus sûr*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ Vous ne devriez **jamais** installer des extensions supplémentaires sur le Navi -Le Navigateur Tor est conçu pour empêcher la prise d'empreintes numérique, ou l'identification en fonction de la configuration de votre navigateur. Par conséquent, il est impératif de ne **pas** modifier le navigateur au-delà des [niveaux de sécurité](https://tb-manual.torproject.org/fr/security-settings/) par défaut. +Le Navigateur Tor est conçu pour empêcher la prise d'empreintes numérique, ou l'identification en fonction de la configuration de votre navigateur. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). Outre installer le Navigateur Tor sur votre ordinateur, il existe également des systèmes d'exploitation conçus spécifiquement pour se connecter au réseau Tor tels que [Whonix](desktop.md#whonix) sur [Qubes OS](desktop.md#qubes-os), qui offrent une sécurité et des protections encore plus importantes que le Navigateur Tor standard. @@ -98,7 +98,7 @@ Outre installer le Navigateur Tor sur votre ordinateur, il existe également des **Orbot** est un VPN Tor gratuit pour smartphones qui achemine le trafic de n'importe quelle application sur votre appareil à travers le réseau Tor. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ Outre installer le Navigateur Tor sur votre ordinateur, il existe également des Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -132,9 +132,9 @@ Toutes les versions sont signées en utilisant la même signature, elles devraie
-![logo Navigateur Onion](assets/img/self-contained-networks/onion_browser.svg){ align=right } +![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -Le **Navigateur Onion** est un navigateur open-source qui vous permet de naviguer anonymement sur le web via le réseau Tor sur les appareils iOS et qui est soutenu par le [Projet Tor](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ Le **Navigateur Onion** est un navigateur open-source qui vous permet de navigue Les personnes censurées peuvent utiliser les proxys Snowflake pour se connecter au réseau Tor. Snowflake est un excellent moyen de contribuer au réseau même si vous n'avez pas le savoir-faire technique pour gérer un relais ou un pont Tor. -[:octicons-home-16: Page d'accueil](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Code source" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribuer } +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
@@ -181,4 +181,4 @@ Snowflake n'améliore en rien votre vie privée et n'est pas utilisé pour se co Faire fonctionner un proxy Snowflake est peu risqué, encore moins que de faire fonctionner un relais ou un pont Tor qui ne sont déjà pas des entreprises particulièrement risquées. Toutefois, il achemine le trafic par le biais de votre réseau, ce qui peut avoir un impact à certains égards, surtout si votre réseau a une bande passante limitée. Assurez-vous de comprendre [le fonctionnement de Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) avant de décider de faire tourner un proxy. -[^1]: Le paramètre `IsolateDestAddr` est discuté sur la [liste de diffusion Tor](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) et [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), où les deux projets suggèrent que ce n'est généralement pas une bonne approche pour la plupart des gens. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/fr/vpn.md b/i18n/fr/vpn.md index bbc358dd..3b13a7ee 100644 --- a/i18n/fr/vpn.md +++ b/i18n/fr/vpn.md @@ -25,7 +25,7 @@ Si vous recherchez l'**anonymat**, vous devriez utiliser le Navigateur Tor. Si vous souhaitez plus de **sécurité**, vous devez toujours vous assurer que vous vous connectez aux sites web en utilisant HTTPS. Un VPN ne se substitue pas à de bonnes pratiques de sécurité. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Les fournisseurs que nous recommandons utilisent le chiffrement, acceptent le Mo **Proton VPN** est un concurrent de poids dans l'espace VPN, et il est en service depuis 2016. Proton AG est basé en Suisse et propose une offre gratuite limitée, ainsi qu'une option premium plus complète. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ Nous pensons également qu'il est préférable pour la sécurité des clés priv #### :material-check:{ .pg-green } Audit indépendant -Depuis janvier 2020, Proton VPN a fait l'objet d'un audit indépendant réalisé par SEC Consult. SEC Consult a trouvé quelques vulnérabilités à risque moyen et faible dans les applications Windows, Android et iOS de Proton VPN, qui ont toutes été "correctement corrigées" par Proton VPN avant la publication des rapports. Aucun des problèmes identifiés n'aurait permis à un attaquant d'accéder à distance à votre appareil ou à votre trafic. Vous pouvez consulter les rapports individuels pour chaque plateforme sur [protonvpn.com](https://protonvpn.com/blog/open-source/). En avril 2022, Proton VPN a fait l'objet d'un [autre audit](https://protonvpn.com/blog/no-logs-audit/) et le rapport a été [produit par Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). Une [lettre d'attestation](https://proton.me/blog/security-audit-all-proton-apps) a été fournie pour les applications de Proton VPN le 9 novembre 2021 par [Securitum](https://research.securitum.com). +Depuis janvier 2020, Proton VPN a fait l'objet d'un audit indépendant réalisé par SEC Consult. SEC Consult a trouvé quelques vulnérabilités à risque moyen et faible dans les applications Windows, Android et iOS de Proton VPN, qui ont toutes été "correctement corrigées" par Proton VPN avant la publication des rapports. Aucun des problèmes identifiés n'aurait permis à un attaquant d'accéder à distance à votre appareil ou à votre trafic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). Une [lettre d'attestation](https://proton.me/blog/security-audit-all-proton-apps) a été fournie pour les applications de Proton VPN le 9 novembre 2021 par [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Clients open source @@ -84,31 +84,31 @@ Proton VPN, en plus d'accepter les cartes de crédit/débit, PayPal, et [le Bitc #### :material-check:{ .pg-green } Prise en charge de WireGuard -Proton VPN prend principalement en charge le protocole WireGuard®. [WireGuard](https://www.wireguard.com) est un protocole plus récent qui utilise une [cryptographie](https://www.wireguard.com/protocol/) de pointe. De plus, WireGuard vise à être plus simple et plus performant. +Proton VPN prend principalement en charge le protocole WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). De plus, WireGuard vise à être plus simple et plus performant. -Proton VPN [recommande](https://protonvpn.com/blog/wireguard/) l'utilisation de WireGuard avec leur service. Sur les applications Windows, macOS, iOS, Android, ChromeOS et Android TV de Proton VPN, WireGuard est le protocole par défaut ; cependant, la [prise en charge](https://protonvpn.com/support/how-to-change-vpn-protocols/) du protocole n'est pas présente dans leur application Linux. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Redirection de port -Proton VPN ne prend actuellement en charge que la [redirection de port](https://protonvpn.com/support/port-forwarding/) éphémère via NAT-PMP, avec des durées de location de 60 secondes. L'application Windows offre une option facile d'accès, tandis que sur les autres systèmes d'exploitation, vous devrez exécuter votre propre [client NAT-PMP](https://protonvpn.com/support/port-forwarding-manual-setup/). Les applications de torrent prennent souvent en charge NAT-PMP nativement. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Les applications de torrent prennent souvent en charge NAT-PMP nativement. #### :material-information-outline:{ .pg-orange } Contournement de la censure -Proton VPN a son protocole [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) qui *peut* aider dans les situations où les protocoles VPN comme OpenVPN ou Wireguard sont bloqués par diverses techniques rudimentaires. Stealth encapsule le tunnel VPN dans une session TLS afin de donner l'impression d'un trafic internet plus générique. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsule le tunnel VPN dans une session TLS afin de donner l'impression d'un trafic internet plus générique. Malheureusement, il ne fonctionne pas très bien dans les pays où sont déployés des filtres sophistiqués qui analysent l'ensemble du trafic sortant pour tenter de découvrir les tunnels chiffrés. Stealth n'est également pas encore disponible sur [Windows](https://github.com/ProtonVPN/win-app/issues/64) ou Linux. #### :material-check:{ .pg-green } Clients mobiles -En plus de fournir des fichiers de configuration OpenVPN standard, Proton VPN a des clients mobiles pour l'[App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), le [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), et [GitHub](https://github.com/ProtonVPN/android-app/releases) permettant des connexions faciles à leurs serveurs. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Fonctionnalités supplémentaires -Les clients VPN de Proton prennent en charge l'authentification à deux facteurs sur toutes les plateformes, sauf Linux pour le moment. Proton VPN possède ses propres serveurs et centres de données en Suisse, en Islande et en Suède. Ils proposent le blocage des contenus et des domaines de logiciels malveillants connus avec leur service DNS. En outre, Proton VPN propose également des serveurs "Tor" vous permettant de vous connecter facilement aux sites onion, mais nous recommandons fortement d'utiliser [le navigateur officiel Tor](https://www.torproject.org/) à cette fin. +Les clients VPN de Proton prennent en charge l'authentification à deux facteurs sur toutes les plateformes, sauf Linux pour le moment. Proton VPN possède ses propres serveurs et centres de données en Suisse, en Islande et en Suède. Ils proposent le blocage des contenus et des domaines de logiciels malveillants connus avec leur service DNS. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } La fonction d'arrêt d'urgence ne fonctionne pas sur les Macs à processeur Intel -Des pannes du système [peuvent se produire](https://protonvpn.com/support/macos-t2-chip-kill-switch/) sur les Mac basés sur Intel lors de l'utilisation de l'arrêt d'urgence du VPN. Si vous avez besoin de cette fonction, et que vous utilisez un Mac avec un chipset Intel, vous devriez envisager d'utiliser un autre service VPN. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. Si vous avez besoin de cette fonction, et que vous utilisez un Mac avec un chipset Intel, vous devriez envisager d'utiliser un autre service VPN. ### IVPN @@ -118,9 +118,9 @@ Des pannes du système [peuvent se produire](https://protonvpn.com/support/macos **IVPN** est un autre fournisseur de VPN haut de gamme, et il est en activité depuis 2009. IVPN est basé à Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ Des pannes du système [peuvent se produire](https://protonvpn.com/support/macos - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ Des pannes du système [peuvent se produire](https://protonvpn.com/support/macos #### :material-check:{ .pg-green } 37 pays -IVPN a des [serveurs dans 37 pays](https://www.ivpn.net/server-locations).(1) Choisir un fournisseur VPN avec un serveur le plus proche de vous réduira la latence du trafic réseau que vous envoyez. Cela est dû à un itinéraire plus court (moins de sauts) vers la destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Cela est dû à un itinéraire plus court (moins de sauts) vers la destination. { .annotate } 1. En date du : 2023-12-21 @@ -148,11 +148,11 @@ Nous pensons également qu'il est préférable pour la sécurité des clés priv #### :material-check:{ .pg-green } Audit indépendant -IVPN a fait l'objet d'un [audit de non-journalisation par Cure53](https://cure53.de/audit-report_ivpn.pdf) qui a conclu à la validité de l'affirmation d'IVPN concernant l'absence d'enregistrement. IVPN a également terminé un [rapport complet de test d'intrusion par Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) en janvier 2020. IVPN a également indiqué qu'elle prévoyait à l'avenir de mettre à disposition les [rapports annuels](https://www.ivpn.net/blog/independent-security-audit-concluded). Une nouvelle étude a été réalisée [en avril 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) et a été mise à disposition par Cure53 sur [leur site web](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN a fait l'objet d'un [audit de non-journalisation par Cure53](https://cure53.de/audit-report_ivpn.pdf) qui a conclu à la validité de l'affirmation d'IVPN concernant l'absence d'enregistrement. IVPN a également terminé un [rapport complet de test d'intrusion par Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) en janvier 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Clients open source -Depuis février 2020 [les applications IVPN sont désormais open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Le code source peut être obtenu auprès de leur [organisation GitHub](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Le code source peut être obtenu auprès de leur [organisation GitHub](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepte l'argent liquide et le Monero @@ -160,25 +160,25 @@ En plus d'accepter les cartes de crédit/débit et PayPal, IVPN accepte le Bitco #### :material-check:{ .pg-green } Prise en charge de WireGuard -IVPN prend en charge le protocole WireGuard®. [WireGuard](https://www.wireguard.com) est un protocole plus récent qui utilise une [cryptographie](https://www.wireguard.com/protocol/) de pointe. De plus, WireGuard vise à être plus simple et plus performant. +IVPN prend en charge le protocole WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). De plus, WireGuard vise à être plus simple et plus performant. -IVPN [recommande](https://www.ivpn.net/wireguard/) l'utilisation de WireGuard avec leur service et, en tant que tel, le protocole est par défaut sur toutes les applications d'IVPN. IVPN propose également un générateur de configuration WireGuard à utiliser avec les [applications](https://www.wireguard.com/install/) officielles WireGuard. +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Redirection de port -IVPN prenait auparavant en charge la redirection de port, mais a supprimé cette option en [juin 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). L'absence de cette fonctionnalité pourrait avoir un impact négatif sur certaines applications, en particulier les applications pair-à-pair telles que les clients torrent. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). L'absence de cette fonctionnalité pourrait avoir un impact négatif sur certaines applications, en particulier les applications pair-à-pair telles que les clients torrent. #### :material-check:{ .pg-green } Contournement de la censure -IVPN dispose de modes d'obscurcissement utilisant le projet [v2ray](https://www.v2ray.com/en/index.html) qui aide dans les situations où les protocoles VPN comme OpenVPN ou Wireguard sont bloqués. Actuellement, cette fonctionnalité n'est disponible que sur bureau et [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). Elle dispose de deux modes d'utilisation de [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) via des connexions QUIC ou TCP. QUIC est un protocole moderne avec un meilleur contrôle de la congestion et peut donc être plus rapide avec une latence réduite. Le mode TCP fait apparaître vos données comme du trafic HTTP normal. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). Elle dispose de deux modes d'utilisation de [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) via des connexions QUIC ou TCP. QUIC est un protocole moderne avec un meilleur contrôle de la congestion et peut donc être plus rapide avec une latence réduite. Le mode TCP fait apparaître vos données comme du trafic HTTP normal. #### :material-check:{ .pg-green } Clients mobiles -En plus de fournir des fichiers de configuration OpenVPN standard, IVPN a des clients mobiles pour l'[App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), le [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), et [GitHub](https://github.com/ivpn/android-app/releases) permettant des connexions faciles à leurs serveurs. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Fonctionnalités supplémentaires -Les clients IVPN prennent en charge l'authentification à deux facteurs (les clients de Mullvad ne le font pas). IVPN propose également la fonctionnalité "[AntiTracker](https://www.ivpn.net/antitracker)", qui bloque les réseaux publicitaires et les traqueurs au niveau du réseau. +Les clients IVPN prennent en charge l'authentification à deux facteurs (les clients de Mullvad ne le font pas). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ Les clients IVPN prennent en charge l'authentification à deux facteurs (les cli [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ Les clients IVPN prennent en charge l'authentification à deux facteurs (les cli #### :material-check:{ .pg-green } 40 pays -Mullvad a des [serveurs dans 40 pays](https://mullvad.net/servers/).(1) Choisir un fournisseur VPN avec un serveur le plus proche de vous réduira la latence du trafic réseau que vous envoyez. Cela est dû à un itinéraire plus court (moins de sauts) vers la destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Cela est dû à un itinéraire plus court (moins de sauts) vers la destination. { .annotate } 1. En date du : 2023-12-21 @@ -223,11 +223,11 @@ Les clients VPN de Mullvad ont été audités par Cure53 et Assured AB dans un r > Cure53 et Assured AB sont satisfaits des résultats de l'audit et le logiciel laisse une impression générale positive. Grâce au dévouement de l'équipe interne du complexe du VPN Mullvad, les testeurs n'ont aucun doute sur le fait que le projet est sur la bonne voie du point de vue de la sécurité. -En 2020, un deuxième audit [a été annoncé](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) et le [rapport d'audit final](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) a été publié sur le site web de Cure53 : +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > Les résultats de ce projet de mai-juin 2020 ciblant le complexe de Mullvad sont assez positifs. [...] L'écosystème applicatif utilisé par Mullvad laisse une impression solide et structurée. La structure globale de l'application permet de déployer facilement des correctifs et corrections de manière structurée. Plus que tout, les résultats repérés par Cure53 montrent l'importance d'un audit et d'une réévaluation constante des vecteurs de fuite actuels, afin de toujours garantir la confidentialité des utilisateurs finaux. Ceci étant dit, Mullvad fait un excellent travail en protégeant l'utilisateur final contre les fuites courantes de DCP et les risques liés à la confidentialité. -En 2021, un audit des infrastructures [a été annoncé](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) et le [rapport d'audit final](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) a été publié sur le site web de Cure53. Un autre rapport a été commandé [en juin 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) et est disponible sur le [site web d'Assured](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Clients open source @@ -239,17 +239,17 @@ Mullvad, en plus d'accepter les cartes de crédit/débit et PayPal, accepte le B #### :material-check:{ .pg-green } Prise en charge de WireGuard -Mullvad prend en charge le protocole WireGuard®. [WireGuard](https://www.wireguard.com) est un protocole plus récent qui utilise une [cryptographie](https://www.wireguard.com/protocol/) de pointe. De plus, WireGuard vise à être plus simple et plus performant. +Mullvad prend en charge le protocole WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). De plus, WireGuard vise à être plus simple et plus performant. -Mullvad [recommande](https://mullvad.net/en/help/why-wireguard/) l'utilisation de WireGuard avec leur service. C'est le protocole par défaut ou le seul sur les applications Android, iOS, macOS et Linux de Mullvad, mais sur Windows, vous devez [activer manuellement](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad propose également un générateur de configuration WireGuard à utiliser avec les [applications](https://www.wireguard.com/install/) officielles WireGuard. +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } Prise en charge de l'IPv6 -Mullvad vous permet d'accéder aux [services hébergés sur IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), contrairement à d'autres fournisseurs qui bloquent les connexions IPv6. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Redirection de port -Mullvad prenait auparavant en charge la redirection de port, mais a supprimé cette option en [mai 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). L'absence de cette fonctionnalité pourrait avoir un impact négatif sur certaines applications, en particulier les applications pair-à-pair telles que les clients torrent. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). L'absence de cette fonctionnalité pourrait avoir un impact négatif sur certaines applications, en particulier les applications pair-à-pair telles que les clients torrent. #### :material-check:{ .pg-green } Contournement de la censure @@ -257,11 +257,11 @@ Mullvad dispose d'un mode d'obscurcissement utilisant [Shadowsocks avec v2ray](h #### :material-check:{ .pg-green } Clients mobiles -Mullvad a publié des clients [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) et [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn), tous deux avec une interface simple à utiliser plutôt que nécessiter de votre part une configuration manuelle de votre connexion WireGuard. Le client Android est également disponible sur [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. Le client Android est également disponible sur [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Fonctionnalités supplémentaires -Mullvad est très transparent quant aux nœuds qu'il possède [ou qu'il loue](https://mullvad.net/en/servers/). Ils utilisent [ShadowSocks](https://shadowsocks.org/) dans leur configuration ShadowSocks + OpenVPN, ce qui les rend plus résistants aux pare-feux avec de l'[inspection profonde de paquets](https://fr.wikipedia.org/wiki/Deep_packet_inspection) qui tentent de bloquer les VPNs. Il semblerait que [la Chine utilise une méthode différente pour bloquer les serveurs ShadowSocks](https://github.com/net4people/bbs/issues/22). Le site web de Mullvad est également accessible via Tor à l'adresse suivante [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Il semblerait que [la Chine utilise une méthode différente pour bloquer les serveurs ShadowSocks](https://github.com/net4people/bbs/issues/22). Le site web de Mullvad est également accessible via Tor à l'adresse suivante [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Critères diff --git a/i18n/he/CODE_OF_CONDUCT.md b/i18n/he/CODE_OF_CONDUCT.md index c46361aa..b0af1640 100644 --- a/i18n/he/CODE_OF_CONDUCT.md +++ b/i18n/he/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **התנהג בצורה חיובית ובונה** diff --git a/i18n/he/about/index.md b/i18n/he/about/index.md index 96e0ad0a..6d47a141 100644 --- a/i18n/he/about/index.md +++ b/i18n/he/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** הוא אתר בעל מוטיבציה חברתית המספק [מידע](/kb) להגנה על אבטחת הנתונים ופרטיותך. המשימה שלך היא ליידע את הציבור על הערך של פרטיות דיגיטלית, ויוזמות ממשלתיות גלובליות שמטרתן לנטר את הפעילות המקוונת שלך. אנחנו קולקטיב ללא מטרות רווח המופעל כולו על ידי [חברי צוות](https://discuss.privacyguides.net/g/team) מתנדבים ותורמים. האתר שלנו נקי מפרסומות ואינו מזוהה עם אף אחד מהספקים הרשומים. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=דף הבית } -[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="קוד מקור" } -[:octicons-heart-16:](donate.md){ .card-link title=לתרומה } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } +[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } +[:octicons-heart-16:](donate.md){ .card-link title=Contribute } > כדי למצוא אפליקציות [אלטרנטיביות ממוקדות פרטיות], בדוק אתרים כמו Good Reports ו-**Privacy Guides**, המפרטים אפליקציות ממוקדות פרטיות במגוון קטגוריות, כולל ספקי אימייל (בדרך כלל בתוכניות בתשלום) שאינן מנוהלות על ידי הגדולים חברות טכנולוגיה. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > אם אתה מחפש VPN חדש, אתה יכול ללכת לקוד ההנחה של כמעט כל פודקאסט. אם אתה מחפש VPN **טוב**, אתה צריך עזרה מקצועית. אותו דבר לגבי לקוחות אימייל, דפדפנים, מערכות הפעלה ומנהלי סיסמאות. איך אתה יודע איזו מבין אלה היא האפשרות הטובה והידידותית ביותר לפרטיות? בשביל זה יש **Privacy Guides**, פלטפורמה שבה מספר מתנדבים מחפשים מדי יום ביומו את הכלים הידידותיים לפרטיות הטובים ביותר לשימוש באינטרנט. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [תורגם מהולנדית] -מוצג גם ב: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), ו- [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## היסטוריה @@ -41,7 +41,7 @@ schema: בשנת 2022, השלמנו את המעבר של מסגרת האתר הראשית שלנו מ-Jekyll ל-MkDocs, באמצעות תוכנת התיעוד `mkdocs-material`. השינוי הזה הפך את תרומות הקוד הפתוח לאתר שלנו לקלות משמעותית עבור זרים, מכיוון שבמקום צורך לדעת תחביר מסובך כדי לכתוב פוסטים בצורה יעילה, התרומה קלה כעת כמו כתיבת מסמך Markdown סטנדרטי. -בנוסף השקנו את פורום הדיון החדש שלנו בכתובת [discuss.privacyguides.net](https://discuss.privacyguides.net/) כפלטפורמה קהילתית לחלוק רעיונות ולשאול שאלות על המשימה שלנו. זה מגדיל את הקהילה הקיימת שלנו ב-Matrix, והחליף את פלטפורמת הדיונים הקודמת של GitHub שלנו, מה שמפחית את ההסתמכות שלנו על פלטפורמות דיון קנייניות. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. זה מגדיל את הקהילה הקיימת שלנו ב-Matrix, והחליף את פלטפורמת הדיונים הקודמת של GitHub שלנו, מה שמפחית את ההסתמכות שלנו על פלטפורמות דיון קנייניות. עד כה בשנת 2023 השקנו תרגומים בינלאומיים של האתר שלנו ב[צרפתית](/fr/), [עברית](/he/), וגם [הולנדית](/nl/), שפות נוספות בדרך, התאפשרה על ידי צוות התרגום המצוין שלנו ב-[Crowdin](https://crowdin.com/project/privacyguides). אנו מתכננים להמשיך ולקדם את משימתנו של הסברה וחינוך, למצוא דרכים להדגיש בצורה ברורה יותר את הסכנות של חוסר מודעות לפרטיות בעידן הדיגיטלי המודרני ואת השכיחות והנזקים של פרצות אבטחה בכל תעשיית הטכנולוגיה. diff --git a/i18n/he/about/notices.md b/i18n/he/about/notices.md index 667d0d9b..82bd4a60 100644 --- a/i18n/he/about/notices.md +++ b/i18n/he/about/notices.md @@ -29,7 +29,7 @@ Privacy Guides בנוסף אינם מתחייבים כי אתר זה יהיה ז משמעות הדבר היא שאתה יכול להשתמש בתוכן הניתן לקריאה על ידי אדם במאגר זה עבור הפרויקט שלך, לפי התנאים המפורטים בטקסט של Creative Commons Attribution-NoDerivatives 4.0 International Public License. אתה רשאי לעשות זאת בכל דרך סבירה, אך לא בכל דרך שמציעה שPrivacy Guides מאשרים אותך או את השימוש שלך. **אינך רשאי** להשתמש במיתוג Privacy Guides בפרויקט שלך ללא אישור מפורש מפרויקט זה. סימני המסחר של המותג של מדריכי הפרטיות כוללים את סימן המילה "Privacy Guides" ואת לוגו המגן. -אנו מאמינים שסמלי הלוגו ותמונות אחרות ב`נכסים` המתקבלים מספקי צד שלישי הם נחלת הכלל או ב**שימוש הוגן**. על קצה המזלג, [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) החוקית יכולה להשתמש בתמונות המוגנות בזכויות יוצרים על מנת לזהות את הנושא לצורך הערות הציבור. עם זאת, ייתכן שסמלים אלה ותמונות אחרות עדיין יהיו כפופות לחוקי סימנים מסחריים בתחומי שיפוט אחד או יותר. לפני השימוש בתוכן זה, אנא ודא שהוא משמש לזיהוי הישות או הארגון המחזיקים בסימן המסחרי וכי יש לך את הזכות להשתמש בו לפי החוקים החלים בנסיבות השימוש המיועד שלך. *בעת העתקת תוכן מאתר זה, אתה האחראי הבלעדי לוודא שאינך מפר סימן מסחרי או זכויות יוצרים של מישהו אחר.* +אנו מאמינים שסמלי הלוגו ותמונות אחרות ב`נכסים` המתקבלים מספקי צד שלישי הם נחלת הכלל או ב**שימוש הוגן**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. עם זאת, ייתכן שסמלים אלה ותמונות אחרות עדיין יהיו כפופות לחוקי סימנים מסחריים בתחומי שיפוט אחד או יותר. לפני השימוש בתוכן זה, אנא ודא שהוא משמש לזיהוי הישות או הארגון המחזיקים בסימן המסחרי וכי יש לך את הזכות להשתמש בו לפי החוקים החלים בנסיבות השימוש המיועד שלך. *בעת העתקת תוכן מאתר זה, אתה האחראי הבלעדי לוודא שאינך מפר סימן מסחרי או זכויות יוצרים של מישהו אחר.* כאשר אתה תורם לאתר שלנו אתה עושה זאת תחת הרישיונות הנ"ל, ואתה מעניק ל-Privacy Guides רישיון תמידי, כלל עולמי, לא בלעדי, ניתן להעברה, ללא תמלוגים, בלתי חוזר עם הזכות לתת רישיון משנה לזכויות כאלה באמצעות שכבות מרובות של בעלי רישיונות משנה., לשכפל, לשנות, להציג, לבצע ולהפיץ את התרומה שלך כחלק מהפרויקט שלנו. @@ -47,4 +47,4 @@ Privacy Guides בנוסף אינם מתחייבים כי אתר זה יהיה ז --- -*חלקים מההודעה הזו עצמה אומצו מ [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) ב- GitHub. משאב זה והדף עצמו משוחררים תחת [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*חלקים מההודעה הזו עצמה אומצו מ [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) ב- GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/he/about/privacytools.md b/i18n/he/about/privacytools.md index a63dfb96..d0225556 100644 --- a/i18n/he/about/privacytools.md +++ b/i18n/he/about/privacytools.md @@ -14,13 +14,13 @@ title: "שאלות נפוצות PrivacyTools" PrivacyTools נוצרה בשנת 2015 על ידי "BurungHantu", שרצתה ליצור משאב מידע על פרטיות - כלים מועילים בעקבות גילויי סנודן. האתר צמח לפרויקט קוד פתוח משגשג עם [תורמים רבים](https://github.com/privacytools/privacytools.io/graphs/contributors), חלקם קיבלו בסופו של דבר אחריות ארגונית שונה, כגון הפעלת שירותים מקוונים כמו מטריקס ומסטודון, ניהול ובדיקה של שינויים באתר ב- GitHub, מציאת נותני חסות לפרויקט, כתיבת פוסטים בבלוגים והפעלת פלטפורמות הסברה למדיה חברתית כמו טוויטר וכו '. -החל משנת 2019, BurungHantu התרחק יותר ויותר מהפיתוח הפעיל של האתר והקהילות, והחל לעכב תשלומים שהוא היה אחראי עליהם הקשורים לשרתים שהפעלנו. כדי להימנע מכך שמנהל המערכת שלנו ישלם את עלויות השרת מכיסו הפרטי, שינינו את שיטות התרומה המפורטות באתר מחשבונות PayPal והקריפטו האישיים של BurungHantu לדף OpenCollective חדש ב- [אוקטובר 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). היו לכך יתרונות נוספים של הפיכת הכספים שלנו לשקופים לחלוטין, ערך שאנו מאמינים בו מאוד, ופטורים ממס בארצות הברית, מכיוון שהם הוחזקו על ידי הקרן הקולקטיבית הפתוחה 501(c)3. שינוי זה הוסכם פה אחד על ידי הקבוצה ועבר ללא עוררין. +החל משנת 2019, BurungHantu התרחק יותר ויותר מהפיתוח הפעיל של האתר והקהילות, והחל לעכב תשלומים שהוא היה אחראי עליהם הקשורים לשרתים שהפעלנו. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). היו לכך יתרונות נוספים של הפיכת הכספים שלנו לשקופים לחלוטין, ערך שאנו מאמינים בו מאוד, ופטורים ממס בארצות הברית, מכיוון שהם הוחזקו על ידי הקרן הקולקטיבית הפתוחה 501(c)3. שינוי זה הוסכם פה אחד על ידי הקבוצה ועבר ללא עוררין. ## למה המשכנו הלאה בשנת 2020, היעדרותו של BurungHantu גדלה הרבה יותר מורגשת. בשלב מסוים, נדרשנו לשנות את שרתי השמות של הדומיין לשרתי השמות הנשלטים על ידי מנהל המערכת שלנו כדי להימנע משיבושים עתידיים, ושינוי זה הושלם רק חודש לאחר הבקשה הראשונית. הוא היה נעלם מחדרי הצ'אט הציבורי והצ'אט של הצוות הפרטי במטריקס במשך חודשים בכל פעם, מדי פעם צץ כדי לתת משוב קטן או להבטיח להיות פעיל יותר לפני שייעלם שוב. -באוקטובר 2020, מנהל מערכת PrivacyTools (Jonah) [עזב](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) הפרויקט בגלל קשיים אלה, והעביר את השליטה לתורם ותיק אחר. Jonah הפעיל כמעט כל שירות של PrivacyTools ושימש *דה פקטו* כמוביל פרויקט לפיתוח אתרים בהיעדרו של BurungHantu, ולכן עזיבתו הייתה שינוי משמעותי בארגון. בזמנו, בגלל השינויים הארגוניים המשמעותיים הללו, הבטיח BurungHantu לצוות הנותר שהוא יחזור לקחת פיקוד על הפרויקט בהמשך. ==צוות PrivacyTools פנה באמצעות מספר שיטות תקשורת במהלך החודשים הבאים, אך לא קיבל כל תגובה.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah הפעיל כמעט כל שירות של PrivacyTools ושימש *דה פקטו* כמוביל פרויקט לפיתוח אתרים בהיעדרו של BurungHantu, ולכן עזיבתו הייתה שינוי משמעותי בארגון. בזמנו, בגלל השינויים הארגוניים המשמעותיים הללו, הבטיח BurungHantu לצוות הנותר שהוא יחזור לקחת פיקוד על הפרויקט בהמשך. ==צוות PrivacyTools פנה באמצעות מספר שיטות תקשורת במהלך החודשים הבאים, אך לא קיבל כל תגובה.== ## הסתמכות על שם דומיין @@ -34,25 +34,25 @@ PrivacyTools נוצרה בשנת 2015 על ידי "BurungHantu", שרצתה לי ## קריאה לקהילה לפעולה -בסוף יולי 2021, אנחנו [הודענו](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) לקהילת PrivacyTools של הכוונה שלנו לבחור שם חדש ולהמשיך את הפרויקט על דומיין חדש, להיות [נבחר](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) ב-2 אוגוסט 2022. בסופו של דבר, "מדריכי פרטיות" נבחר,`privacyguides.org` כאשר הדומיין כבר היה בבעלות יונה(Jonah) לפרויקט צדדי משנת 2020 שלא פותח. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. בסופו של דבר, "מדריכי פרטיות" נבחר,`privacyguides.org` כאשר הדומיין כבר היה בבעלות יונה(Jonah) לפרויקט צדדי משנת 2020 שלא פותח. ## שליטה ב - r/privacytoolsIO -במקביל לבעיות המתמשכות באתר האינטרנט של privacytools.io, צוות המודים r/privacytoolsIO התמודד עם אתגרים בניהול הסאב רדיט (subreddit). הסאב - רדיט תמיד הופעל באופן עצמאי מפיתוח האתר, אך BurungHantu היה גם המנחה הראשי של הסאב - רדיט, והוא היה המנחה היחיד שקיבל הרשאות "שליטה מלאה ". u/trai_dep היה המנחה הפעיל היחיד באותה תקופה, and [פורסם](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) בקשה למנהלי Reddit ב-28 ביוני 2021, בבקשה לקבל את תפקיד המנחה הראשי והרשאות שליטה מלאה, על מנת לבצע את השינויים הדרושים ב- Subreddit. +במקביל לבעיות המתמשכות באתר האינטרנט של privacytools.io, צוות המודים r/privacytoolsIO התמודד עם אתגרים בניהול הסאב רדיט (subreddit). הסאב - רדיט תמיד הופעל באופן עצמאי מפיתוח האתר, אך BurungHantu היה גם המנחה הראשי של הסאב - רדיט, והוא היה המנחה היחיד שקיבל הרשאות "שליטה מלאה ". u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit דורש כי subreddits יהיו מנחים פעילים. אם המנחה הראשי אינו פעיל במשך תקופה ארוכה (כגון שנה) ניתן למנות מחדש את מנחה הראשי בתור. כדי שבקשה זו תיענה, בורונגהאנטו (BurungHantu) היה חייב להיעדר לחלוטין מכל פעילות Reddit למשך תקופה ארוכה, דבר שעלה בקנה אחד עם התנהגותו בפלטפורמות אחרות. > אם הוסרת בתור מנחה מ - subreddit באמצעות בקשה ל Reddit, זה בגלל שחוסר התגובה שלך וחוסר הפעילות שלך הכשירו את ה - subreddit להעברת r/redditrequest. > -> r/redditrequest היא הדרך של Reddit לוודא שלקהילות יש מנחים פעילים והיא חלק מ [הקוד התנהגות של מנחה](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## תחילת המעבר -ב -14 בספטמבר 2021, הכרזנו [:](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) על תחילת ההגירה שלנו לדומיין חדש זה: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] מצאנו צורך לבצע את ההחלפה מוקדם מאשר מאוחר כדי להבטיח שאנשים יגלו על המעבר הזה בהקדם האפשרי. זה נותן לנו מספיק זמן כדי להעביר את שם הדומיין, שכרגע מפנה ל - www.privacyguides.org, ובתקווה נותן לכולם מספיק זמן להבחין בשינוי, לעדכן סימניות ואתרים וכו '. -השינוי [כרוך:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - מפנה את www.privacytools.io אל [www.privacyguides.org](https://www.privacyguides.org). - אחסון קוד המקור בארכיון ב- GitHub כדי לשמר את העבודה הקודמת שלנו ואת מעקב הבעיות שלנו, שבו המשכנו להשתמש במשך חודשים של פיתוח עתידי של אתר זה. @@ -63,11 +63,11 @@ Reddit דורש כי subreddits יהיו מנחים פעילים. אם המנח ## בעקבות האירועים -בערך שבוע לאחר המעבר, BurungHantu חזר לאינטרנט בפעם הראשונה מזה כמעט שנה, אולם אף אחד בצוות שלנו לא היה מוכן לחזור ל- PrivacyTools בגלל חוסר האמינות ההיסטורי שלו. במקום להתנצל על היעדרותו הממושכת, הוא מיד יצא להתקפה ומיצב את המעבר למדריכי פרטיות כהתקפה נגדו ונגד הפרויקט שלו. לאחר מכן הוא[ מחק ](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) רבים מהפוסטים הללו כאשר צוין על ידי הקהילה כי הוא נעדר ונטש את הפרויקט. +בערך שבוע לאחר המעבר, BurungHantu חזר לאינטרנט בפעם הראשונה מזה כמעט שנה, אולם אף אחד בצוות שלנו לא היה מוכן לחזור ל- PrivacyTools בגלל חוסר האמינות ההיסטורי שלו. במקום להתנצל על היעדרותו הממושכת, הוא מיד יצא להתקפה ומיצב את המעבר למדריכי פרטיות כהתקפה נגדו ונגד הפרויקט שלו. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. בשלב זה, BurungHantu טען שהוא רוצה להמשיך לעבוד על privacytools.io בכוחות עצמו וביקש שנסיר את ההפניה מ- www.privacytools.io ל-[www.privacyguides.org](https://www.privacyguides.org). אנו מחויבים ומבקשים ממנו לשמור על תת - הדומיינים של Matrix, Mastodon ו - Peer YouTube פעילים כדי שנוכל להפעיל כשירות ציבורי לקהילה שלנו למשך מספר חודשים לפחות, כדי לאפשר למשתמשים בפלטפורמות אלה לעבור בקלות לחשבונות אחרים. בשל האופי הפדרלי של השירותים שסיפקנו, הם היו קשורים לשמות דומיין ספציפיים, דבר שהקשה מאוד על ההעברה (ובמקרים מסוימים בלתי אפשרי). -לצערנו, מכיוון שהשליטה ב - r/privacytoolsIO subreddit לא הוחזרה לבורונגהאנטו על פי דרישתו (מידע נוסף בהמשך), סאב-דומיינים אלה נותקו [](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) בתחילת אוקטובר, ובכך הסתיימו כל אפשרויות ההעברה למשתמשים שעדיין משתמשים בשירותים אלה. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. בעקבות זאת, BurungHantu עשה האשמות שווא על Jonah כדי לגנוב תרומות מהפרויקט. לBurungHantu הייתה יותר משנה מאז האירוע לכאורה, אך הוא מעולם לא הודיע על כך לאיש עד לאחר העברת מדריכי הפרטיות. בורונגהאנטו התבקש שוב ושוב להוכיח ולהגיב על הסיבה לשתיקתו על ידי הקבוצה [והקהילה](https://twitter.com/TommyTran732/status/1526153536962281474), ולא עשה זאת. @@ -77,11 +77,11 @@ BurungHantu גם עשה פוסט טוויטר בטענה כי "עורך דין" נכון ל -25 בספטמבר 2022, אנו רואים שהתוכניות הכוללות של BurungHantu מתגשמות ב - privacytools.io, וזו בדיוק הסיבה שהחלטנו ליצור את הדף המסביר את זה היום. האתר שהוא מפעיל נראה כגרסה מותאמת SEO של האתר שממליצה על כלים בתמורה לפיצוי כספי. לאחרונה, IVPN ו - Mullvad, שני ספקי VPN כמעט - באופן אוניברסלי [המומלצים](../vpn.md) על ידי קהילת הפרטיות וראוי לציון על עמדתם נגד תוכניות שותפים הוסרו מ PrivacyTools. במקומם? NordVPN, ‏ Surfshark, ‏ Express_end} ו - hide.me; תאגידי VPN ענקיים עם פלטפורמות ונהלים עסקיים לא אמינים, הידועים לשמצה בזכות השיווק האגרסיבי שלהם ותוכניות השותפים שלהם. -==**PrivacyTools הפך בדיוק לסוג האתר [שהזהרנו מפניו](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) בבלוג PrivacyTools ב-2019 blog in 2019.**== ניסינו לשמור על מרחק מ-PrivacyTools מאז המעבר, אבל ההטרדה המתמשכת שלהם כלפי הפרויקט שלנו ועכשיו הניצול האבסורדי שלהם את האמינות שהמותג שלהם זכה לה במשך 6 שנים של תרומות קוד פתוח מטריד אותנו מאוד. אלה מאיתנו שנלחמים למען הפרטיות לא נלחמים אחד נגד השני, ולא מקבלים את עצתנו מהמציע הגבוה ביותר. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. אלה מאיתנו שנלחמים למען הפרטיות לא נלחמים אחד נגד השני, ולא מקבלים את עצתנו מהמציע הגבוה ביותר. ## r/privacytoolsIO עכשיו -לאחר השקת [r/privacyGuides](https://www.reddit.com/r/privacyguides), זה לא היה מעשי עבור u/trai_dep להמשיך ולנהל את שתי subreddits, ועם הקהילה על לוח המעבר, r/privacytoolsIO [יצר](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) הגבלה על הסאב ופוסט ב -1 בנובמבר, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] הצמיחה של הסאב הזה הייתה תוצאה של מאמץ רב, לאורך מספר שנים, על ידי צוות privacyGuides.org. ועל ידי כל אחד מכם. > @@ -89,7 +89,7 @@ BurungHantu גם עשה פוסט טוויטר בטענה כי "עורך דין" Subreddits אינם שייכים לאף אחד, והם במיוחד לא שייכים לבעלי מותג. הם שייכים לקהילות שלהם, והקהילה ומנהליה החליטו לתמוך במעבר ל - r/PrivacyGuides. -בחודשים שחלפו מאז, BurungHantu איים והתחנן להחזרת שליטה subreddit לחשבונו ב [הפרה](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) של כללי Reddit: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > נקמה מכל מנחה בנוגע לבקשות הסרה אסורה. @@ -107,12 +107,12 @@ Subreddits אינם שייכים לאף אחד, והם במיוחד לא שיי נושא זה נדון בהרחבה בקהילותינו במקומות שונים, ונראה כי רוב האנשים הקוראים דף זה כבר מכירים את האירועים שהובילו למעבר למדריכי הפרטיות. חלק מהפוסטים הקודמים שלנו בעניין עשויים לכלול פרטים נוספים שהשמטנו כאן לקיצור. הקישורים למטה למען ההשלמה. -- [28 ביוני 2021 בקשה לשליטה ב - r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [27 ביולי 2021 הודעה על כוונותינו לעבור לבלוג PrivacyTools, נכתב על ידי הצוות](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [13 בספטמבר 2021 הודעה על תחילת המעבר שלנו למדריכי פרטיות ב - r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [28 ביוני 2021 בקשה לשליטה ב - r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [27 ביולי 2021 הודעה על כוונותינו לעבור לבלוג PrivacyTools, נכתב על ידי הצוות](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [13 בספטמבר 2021 הודעה על תחילת המעבר שלנו למדריכי פרטיות ב - r/privacytoolsIO](https://reddit.com/pnql46) - [17 בספטמבר 2021 הכרזה על OpenCollective מאת Jona](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [30 בספטמבר 2021 שרשור טוויטר המפרט את רוב האירועים המתוארים כעת בדף זה](https://twitter.com/privacy_guides/status/1443633412800225280) -- [1 באוקטובר 2021 פוסט מאת u/dng99 שציין כשל בתת - דומיין](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [2 באפריל 2022 תגובה מאת u/dng99 לפוסט ההאשמות של PrivacyTools](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [1 באוקטובר 2021 פוסט מאת u/dng99 שציין כשל בתת - דומיין](https://reddit.com/comments/pymthv/comment/hexwrps) +- [2 באפריל 2022 תגובה מאת u/dng99 לפוסט ההאשמות של PrivacyTools](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [16 במאי 2022 מענה @TommyTran732 בטוויטר](https://twitter.com/TommyTran732/status/1526153497984618496) - [ספטמבר 3, 2022 פוסט על הפורום של Techlore על ידי @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/he/advanced/communication-network-types.md b/i18n/he/advanced/communication-network-types.md index a1f62c45..82f060cd 100644 --- a/i18n/he/advanced/communication-network-types.md +++ b/i18n/he/advanced/communication-network-types.md @@ -28,7 +28,7 @@ description: סקירה כללית של מספר ארכיטקטורות רשת - יכול לכלול <[שליטה או גישה מוגבלת](https://drewdevault.com/2018/08/08/Signal.html). זה יכול לכלול דברים כמו: - [אסור לחבר לקוחות צד שלישי](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) לרשת הריכוזית שעשויה לספק התאמה אישית גדולה יותר או חוויה טובה יותר. לרוב מוגדר בתנאים והגבלות של שימוש. - תיעוד לקוי או ללא תיעוד עבור מפתחי צד שלישי. -- [הבעלות](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), מדיניות הפרטיות והתפעול של השירות יכול להשתנות בקלות כאשר ישות יחידה שולטת בו, ועלולה לסכן את השירות מאוחר יותר. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - אירוח עצמי דורש מאמץ וידע כיצד להקים שירות. ## רשתות פדרציה @@ -60,7 +60,7 @@ description: סקירה כללית של מספר ארכיטקטורות רשת מסנג'רים P2P מתחברים ל[רשת מבוזרת](https://en.wikipedia.org/wiki/Distributed_networking) של צמתים כדי להעביר הודעה לנמען ללא שרת של צד שלישי. -לקוחות (עמיתים) מוצאים זה את זה בדרך כלל באמצעות [רשת מחשוב מבוזרת](https://en.wikipedia.org/wiki/Distributed_computing). דוגמאות לכך כוללות [טבלאות Hash מפוזרות](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), המשמשות את [טורנטים](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) ו[IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) למשל. גישה נוספת היא רשתות מבוססות קרבה, שבהן נוצר חיבור באמצעות WiFi או Bluetooth (לדוגמה, Briar או פרוטוקול הרשת החברתית [Scuttlebutt](https://www.scuttlebutt.nz)). +לקוחות (עמיתים) מוצאים זה את זה בדרך כלל באמצעות [רשת מחשוב מבוזרת](https://en.wikipedia.org/wiki/Distributed_computing). דוגמאות לכך כוללות [טבלאות Hash מפוזרות](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), המשמשות את [טורנטים](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) ו[IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) למשל. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). לאחר שעמית מצא מסלול ליצירת קשר באמצעות כל אחת מהשיטות הללו, נוצר קשר ישיר ביניהן. למרות שהודעות מוצפנות בדרך כלל, צופה עדיין יכול להסיק את המיקום והזהות של השולח והנמען. diff --git a/i18n/he/advanced/dns-overview.md b/i18n/he/advanced/dns-overview.md index d89ae68e..87efac09 100644 --- a/i18n/he/advanced/dns-overview.md +++ b/i18n/he/advanced/dns-overview.md @@ -18,7 +18,7 @@ DNS קיים מאז [הימים הראשונים](https://en.wikipedia.org/wiki/ ### DNS לא מוצפן -1. שימוש ב-[`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (חלק מ-[>פרויקט Wireshark](https://en.wikipedia.org/wiki/Wireshark)) אנו יכולים לנטר ולתעד את זרימת מנות האינטרנט. פקודה זו מתעדת מנות העומדות בכללים שצוינו: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. פקודה זו מתעדת מנות העומדות בכללים שצוינו: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ DNS קיים מאז [הימים הראשונים](https://en.wikipedia.org/wiki/ nslookup privacyguides.org 8.8.8.8 ``` -3. לאחר מכן, אנו רוצים [לנתח](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) את התוצאות: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ DNS מוצפן יכול להתייחס לאחד ממספר פרוטוקולים, ### DNS על TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) היא שיטה נוספת להצפנת תקשורת DNS שהיא מוגדרת ב-[RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). התמיכה יושמה לראשונה ב-Android 9, iOS 14 וב-Linux ב-[systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) בגרסה 237. ההעדפה בתעשייה התרחקה מ-DoT ל-DoH בשנים האחרונות, מכיוון ש-DoT הוא [פרוטוקול מורכב](https://dnscrypt.info/faq/) ובעל תאימות משתנה ל-RFC על פני המימושים הקיימים. Dot פועלת גם על פורט ייעודי 853 שניתן לחסום בקלות על ידי חומות אש מגבילות. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) היא שיטה נוספת להצפנת תקשורת DNS שהיא מוגדרת ב-[RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. Dot פועלת גם על פורט ייעודי 853 שניתן לחסום בקלות על ידי חומות אש מגבילות. ### DNS דרך HTTPS (DoH) @@ -106,7 +106,7 @@ DNS מוצפן יכול להתייחס לאחד ממספר פרוטוקולים, wireshark -r /tmp/dns_doh.pcap ``` -אנו יכולים לראות את [הקמת החיבור](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) ואת [לחיצת יד TLS](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) המתרחשת עם כל חיבור מוצפן. כאשר מסתכלים על חבילות "האפליקציה" שלאחר מכן, אף אחת מהן לא מכילה את הדומיין שביקשנו או את כתובת ה-IP שהוחזרה. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. כאשר מסתכלים על חבילות "האפליקציה" שלאחר מכן, אף אחת מהן לא מכילה את הדומיין שביקשנו או את כתובת ה-IP שהוחזרה. ## מדוע **אסור** לי להשתמש ב-DNS מוצפן? @@ -158,9 +158,9 @@ DNS מוצפן יכול להתייחס לאחד ממספר פרוטוקולים, tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -משמעות הדבר היא שגם אם אנו משתמשים בשרתי "DNS מוצפן", הדומיין ככל הנראה ייחשף דרך SNI. פרוטוקול [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) מביא איתו את [לקוח מוצפן Hello](https://blog.cloudflare.com/encrypted-client-hello/), המונע דליפה מסוג זה. +משמעות הדבר היא שגם אם אנו משתמשים בשרתי "DNS מוצפן", הדומיין ככל הנראה ייחשף דרך SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -ממשלות, ובפרט סין [](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) ורוסיה [](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), כבר החלו לחסום את סין [](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) או הביעו רצון לעשות זאת. לאחרונה רוסיה [החלה לחסום אתרים](https://github.com/net4people/bbs/issues/108) המשתמשים בתקן זה [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) סטנדרטי. הסיבה לכך היא ש [QUIC](https://en.wikipedia.org/wiki/QUIC) פרוטוקול המהווה חלק מ HTTP/3 דורש שגם `ClientHello` יהיה מוצפן. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. לאחרונה רוסיה [החלה לחסום אתרים](https://github.com/net4people/bbs/issues/108) המשתמשים בתקן זה [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) סטנדרטי. הסיבה לכך היא ש [QUIC](https://en.wikipedia.org/wiki/QUIC) פרוטוקול המהווה חלק מ HTTP/3 דורש שגם `ClientHello` יהיה מוצפן. ### פרוטוקול סטטוס תעודה מקוון (OCSP) @@ -289,7 +289,7 @@ graph TB DNSSEC מיישמת מדיניות חתימה דיגיטלית היררכית בכל שכבות ה-DNS. לדוגמה, במקרה של חיפוש `privacyguides.org`, שרת DNS שורש יחתום על מפתח עבור שרת השמות `.org` ו-`.org` nameserver יחתום על מפתח עבור שרת השמות הסמכותי של `privacyguides.org`. -מותאם מ[סקירה כללית של תוספי אבטחת DNS (DNSSEC)](https://cloud.google.com/dns/docs/dnssec) על ידי Google ו-DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) מאת Cloudflare, שניהם ברישיון תחת [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## מהו מזעור QName? diff --git a/i18n/he/advanced/payments.md b/i18n/he/advanced/payments.md index 7fb67fa4..7c90e2f3 100644 --- a/i18n/he/advanced/payments.md +++ b/i18n/he/advanced/payments.md @@ -9,7 +9,7 @@ icon: material/hand-coin במשך מאות שנים, **מזומן** תפקד כצורת התשלום הפרטית העיקרית. למזומן יש מאפייני פרטיות מצוינים ברוב המקרים, הוא מקובל ברוב המדינות ו**ניתן לשינוי**, כלומר אינו ייחודי וניתן להחלפה לחלוטין. -חוקי התשלום במזומן משתנים בהתאם למדינה. בארצות הברית, נדרש גילוי מיוחד עבור תשלומים במזומן מעל $10,000 ל-IRS ב[טופס 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). העסק המקבל נדרש לזהות את שמו, כתובתו, עיסוקו, תאריך הלידה ומספר תעודת הזהות/אמצעי זיהוי אחרים של מקבל התשלום (עם כמה חריגים). גבולות נמוכים יותר ללא תעודת זהות כגון $3,000 או פחות קיימות עבור החלפות והעברת כסף. מזומן מכיל גם מספרים סידוריים. כמעט אף פעם לא עוקבים אחר אלה על ידי סוחרים, אבל הם יכולים לשמש את רשויות אכיפת החוק בחקירות ממוקדות. +חוקי התשלום במזומן משתנים בהתאם למדינה. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). העסק המקבל נדרש לזהות את שמו, כתובתו, עיסוקו, תאריך הלידה ומספר תעודת הזהות/אמצעי זיהוי אחרים של מקבל התשלום (עם כמה חריגים). גבולות נמוכים יותר ללא תעודת זהות כגון $3,000 או פחות קיימות עבור החלפות והעברת כסף. מזומן מכיל גם מספרים סידוריים. כמעט אף פעם לא עוקבים אחר אלה על ידי סוחרים, אבל הם יכולים לשמש את רשויות אכיפת החוק בחקירות ממוקדות. למרות זאת, זו בדרך כלל האפשרות הטובה ביותר. @@ -60,7 +60,7 @@ icon: material/hand-coin - [מטבעות קריפטוגרפיים מומלצים :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -מטבעות פרטיות היו נתונים לבדיקה גוברת של סוכנויות ממשלתיות. בשנת 2020, [ IRS פרסם פרס של $625,000 ](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) עבור כלים שיכולים לשבור את פרטיות העסקאות של Bitcoin Lightning Network ו/או של Monero. בסופו של דבר [הם שילמו לשתי חברות](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis ו-Integra Fec) סך של 1.25 מיליון דולר עבור כלים שמתיימרים לעשות זאת (לא ידוע לאיזו רשת מטבעות קריפטוגרפיים מכוונים הכלים הללו). בשל הסודיות סביב כלים כמו אלה, ==אף אחת מהשיטות הללו למעקב אחר מטבעות קריפטוגרפיים לא אושרה באופן עצמאי.== עם זאת, סביר מאוד להניח שקיימים כלים המסייעים לחקירות ממוקדות של עסקאות מטבעות פרטיות, ושמטבעות פרטיות מצליחים רק בסיכול מעקב המוני. +מטבעות פרטיות היו נתונים לבדיקה גוברת של סוכנויות ממשלתיות. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. בסופו של דבר [הם שילמו לשתי חברות](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis ו-Integra Fec) סך של 1.25 מיליון דולר עבור כלים שמתיימרים לעשות זאת (לא ידוע לאיזו רשת מטבעות קריפטוגרפיים מכוונים הכלים הללו). בשל הסודיות סביב כלים כמו אלה, ==אף אחת מהשיטות הללו למעקב אחר מטבעות קריפטוגרפיים לא אושרה באופן עצמאי.== עם זאת, סביר מאוד להניח שקיימים כלים המסייעים לחקירות ממוקדות של עסקאות מטבעות פרטיות, ושמטבעות פרטיות מצליחים רק בסיכול מעקב המוני. ### מטבעות אחרים (ביטקוין, את'ריום וכו') @@ -76,7 +76,7 @@ icon: material/hand-coin ### רכישה -רכישת [מטבעות קריפטוגרפיים](../cryptocurrency.md) כמו Monero באופן פרטי יכולה להיות קשה. שוקי P2P כמו [LocalMonero](https://localmonero.co/), פלטפורמה המאפשרת עסקאות בין אנשים, הן אפשרות אחת שניתן להשתמש בה. אם השימוש בבורסה הדורשת KYC מהווה סיכון מקובל עבורך כל עוד לא ניתן לאתר עסקאות עוקבות, אפשרות הרבה יותר קלה היא לרכוש Monero בבורסה כמו [Kraken](https://kraken.com/), או רכשו ביטקוין/לייטקוין מבורסת KYC אשר לאחר מכן ניתן להחליף למונרו. לאחר מכן, אתה יכול למשוך את ה-Monero שנרכש לארנק הלא משמורן שלך כדי להשתמש בו באופן פרטי מנקודה זו ואילך. +רכישת [מטבעות קריפטוגרפיים](../cryptocurrency.md) כמו Monero באופן פרטי יכולה להיות קשה. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. לאחר מכן, אתה יכול למשוך את ה-Monero שנרכש לארנק הלא משמורן שלך כדי להשתמש בו באופן פרטי מנקודה זו ואילך. אם אתם הולכים בדרך זו, דאגו לרכוש את Monero בזמנים שונים ובסכומים שונים מהמקום שבו תוציאו אותו. אם אתה רוכש 5,000$ של Monero בבורסה ותבצע רכישה של 5,000$ במונרו שעה לאחר מכן, פעולות אלו עשויות להיות מתואם על ידי צופה מבחוץ, ללא קשר לנתיב שהמונרו עבר. רכישות מדהימות ורכישת כמויות גדולות יותר של Monero מראש כדי לבזבז מאוחר יותר על מספר עסקאות קטנות יותר יכולות למנוע את המלכודת הזו. diff --git a/i18n/he/advanced/tor-overview.md b/i18n/he/advanced/tor-overview.md index 7d115d8d..39cbec21 100644 --- a/i18n/he/advanced/tor-overview.md +++ b/i18n/he/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (יוטיוב) - [Tor שירותי בצל - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (יוטיוב) -[^1]: הממסר הראשון במעגל שלך נקרא "שומר כניסה" או "שומר". זהו ממסר מהיר ויציב שנשאר הראשון במעגל שלך למשך 2-3 חודשים על מנת להגן מפני התקפה ידועה לשבירת אנונימיות. שאר המעגל שלך משתנה עם כל אתר חדש שאתה מבקר בו, וכולם ביחד מספקים ממסרים אלה את הגנת הפרטיות המלאה של Tor. לקבלת מידע נוסף על אופן הפעולה של ממסרי מגן, עיין במאמר זה [בלוג פוסט](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) וגם [דף](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) על שומרי כניסה. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: הממסר הראשון במעגל שלך נקרא "שומר כניסה" או "שומר". זהו ממסר מהיר ויציב שנשאר הראשון במעגל שלך למשך 2-3 חודשים על מנת להגן מפני התקפה ידועה לשבירת אנונימיות. שאר המעגל שלך משתנה עם כל אתר חדש שאתה מבקר בו, וכולם ביחד מספקים ממסרים אלה את הגנת הפרטיות המלאה של Tor. לקבלת מידע נוסף על אופן הפעולה של ממסרי מגן, עיין במאמר זה [בלוג פוסט](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) וגם [דף](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) על שומרי כניסה. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: דגל ממסר: (אי)-הסמכה מיוחדת של ממסרים עבור עמדות מעגל (לדוגמה, "שומר", "יציאה", "יציאה-גרועה"), מאפייני מעגל (לדוגמה, "מהיר", "יציב"), או תפקידים (לדוגמה, "רשות", "HSDir"), כפי שהוקצו על ידי רשויות המדריכים ומוגדרים יותר במפרט פרוטוקול הספרייה. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/he/android.md b/i18n/he/android.md index 83836ea7..921aa027 100644 --- a/i18n/he/android.md +++ b/i18n/he/android.md @@ -83,9 +83,9 @@ schema: **פרויקט הקוד הפתוח של אנדרואיד** היא מערכת הפעלה ניידת בקוד פתוח בהובלת גוגל, המניעה את רוב המכשירים הניידים בעולם. רוב הטלפונים הנמכרים עם אנדרואיד שונו כך שיכללו אינטגרציות פולשניות ואפליקציות כגון שירותי Google Play, כך שתוכל לשפר משמעותית את הפרטיות שלך במכשיר הנייד שלך על ידי החלפת התקנת ברירת המחדל של הטלפון שלך בגרסת אנדרואיד ללא תכונות פולשניות אלו. -[:octicons-home-16:](https://source.android.com/){ .card-link title=דף הבית } -[:octicons-info-16:](https://source.android.com/docs){ .card-link title=תיעוד} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="קוד מקור" } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } +[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } אלו הן מערכות ההפעלה, המכשירים והאפליקציות של אנדרואיד שאנו ממליצים על מנת למקסם את האבטחה והפרטיות של המכשיר הנייד שלך. למידע נוסף על אנדרואיד: @@ -113,27 +113,27 @@ schema: GrapheneOS מספקת [הקשחת אבטחה](https://en.wikipedia.org/wiki/Hardening_(computing)) ושיפורי פרטיות נוספים. יש לו [מקצה זיכרון מוקשה](https://github.com/GrapheneOS/hardened_malloc), הרשאות רשת וחיישנים ועוד [תכונות אבטחה](https://grapheneos.org/features) שונות. GrapheneOS מגיעה גם עם עדכוני קושחה מלאים ו-builds חתומים, כך שאתחול מאומת נתמך באופן מלא. -[:octicons-home-16: דף הבית](https://grapheneos.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=תיעוד} -[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=תרומה } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } -GrapheneOS תומך ב-[Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), המריץ את [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) בארגז חול מלא כמו כל אפליקציה רגילה אחרת. משמעות הדבר היא שאתה יכול לנצל את רוב שירותי Google Play, כגון [הודעות דחיפה](https://firebase.google.com/docs/cloud-messaging/), תוך מתן שליטה מלאה על ההרשאות והגישה שלהם, ותוך כדי הכללתן ב[פרופיל עבודה](os/android-overview.md#work-profile) או [פרופיל משתמש](os/android-overview.md#user-profiles) ספציפי לבחירתך. +GrapheneOS תומך ב-[Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), המריץ את [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) בארגז חול מלא כמו כל אפליקציה רגילה אחרת. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. טלפונים של Google Pixel הם המכשירים היחידים שעומדים כרגע ב[דרישות אבטחת החומרה](https://grapheneos.org/faq#device-support) של GrapheneOS. -[מדוע אנו ממליצים על GrapheneOS על פני CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[מדוע אנו ממליצים על GrapheneOS על פני CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS
-![לוגו של DivestOS](assets/img/android/divestos.svg){ align=right } +![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** הוא נגזרת חלקית של [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. יש לו builds חתומים, מה שמאפשר לקבל [אתחול מאומת](https://source.android.com/security/verifiedboot) בחלק מהמכשירים שאינם Pixel. [:octicons-home-16: דף הבית](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d
-ל - DivestOS יש פגיעות ליבה ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [שמתוקן](https://gitlab.com/divested-mobile/cve_checker) אוטומטית, פחות בועות קנייניות, וקובץ [מארחים](https://divested.dev/index.php?page=dnsbl) מותאם. ה-WebView המוקשה שלו, [Mulch](https://gitlab.com/divested-mobile/mulch), מאפשר [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) עבור כל הארכיטקטורות ו[חלוקת מצבי רשת](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), ומקבל עדכונים מחוץ לפס. DivestOS כוללת גם תיקוני ליבה מ-GrapheneOS ומאפשרת את כל תכונות האבטחה הזמינות של הליבה באמצעות [הקשחת defconfig](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). כל הליבות החדשות יותר מגרסה 3.4 כוללים עמוד מלא [חיטוי](https://lwn.net/Articles/334747/) ולכל ~22 הליבות המחוברים יש Clang [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) מופעל. +ל - DivestOS יש פגיעות ליבה ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [שמתוקן](https://gitlab.com/divested-mobile/cve_checker) אוטומטית, פחות בועות קנייניות, וקובץ [מארחים](https://divested.dev/index.php?page=dnsbl) מותאם. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS כוללת גם תיקוני ליבה מ-GrapheneOS ומאפשרת את כל תכונות האבטחה הזמינות של הליבה באמצעות [הקשחת defconfig](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS מיישמת כמה תיקוני הקשחת מערכת שפותחו במקור עבור GrapheneOS. DivestOS 16.0 ומעלה מיישמת את החלפת הרשאות [`אינטרנט`](https://developer.android.com/training/basics/network-ops/connecting) וחיישנים של GrapheneOS, [מקצית זיכרון מוקשחת](https://github.com/GrapheneOS/hardened_malloc), [השרצת מנהלים](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [קונסטיפיקציה](https://en.wikipedia.org/wiki/Const_(computer_programming)) של [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) ותיקוני התקשות [ביונית](https://en.wikipedia.org/wiki/Bionic_(software)) חלקית. תכונות 17.1 ומעלה של GrapheneOS לכל רשת [אפשרות אקראיות מלאה של ](https://en.wikipedia.org/wiki/MAC_address#Randomization)MAC, בקרת [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) ואתחול אוטומטי/Wi-Fi/Bluetooth [אפשרויות פסק זמן](https://grapheneos.org/features). +DivestOS מיישמת כמה תיקוני הקשחת מערכת שפותחו במקור עבור GrapheneOS. DivestOS 16.0 ומעלה מיישמת את החלפת הרשאות [`אינטרנט`](https://developer.android.com/training/basics/network-ops/connecting) וחיישנים של GrapheneOS, [מקצית זיכרון מוקשחת](https://github.com/GrapheneOS/hardened_malloc), [השרצת מנהלים](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [קונסטיפיקציה](https://en.wikipedia.org/wiki/Const_(computer_programming)) של [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) ותיקוני התקשות [ביונית](https://en.wikipedia.org/wiki/Bionic_(software)) חלקית. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS משתמשת ב-F-Droid כחנות האפליקציות המוגדרת כברירת מחדל. בדרך כלל אנו [ממליצים להימנע מ-F-Droid](#f-droid), אך אין לעשות זאת ב-DivestOS; המפתחים מעדכנים את האפליקציות שלהם באמצעות מאגרי F-Droid משלהם ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). אנו ממליצים להשבית את אפליקציית F-Droid הרשמית ולהשתמש ב- [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **עם מאגרי DivestOS מופעלים** כדי לשמור על רכיבים אלה מעודכנים. לגבי אפליקציות אחרות, השיטות המומלצות שלנו להשגתן עדיין חלות. +DivestOS משתמשת ב-F-Droid כחנות האפליקציות המוגדרת כברירת מחדל. בדרך כלל אנו [ממליצים להימנע מ-F-Droid](#f-droid), אך אין לעשות זאת ב-DivestOS; המפתחים מעדכנים את האפליקציות שלהם באמצעות מאגרי F-Droid משלהם ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. לגבי אפליקציות אחרות, השיטות המומלצות שלנו להשגתן עדיין חלות.

Warning

@@ -166,13 +166,13 @@ DivestOS משתמשת ב-F-Droid כחנות האפליקציות המוגדרת הימנע מרכישת טלפונים ממפעילי רשתות סלולריות. לאלה יש לרוב **מאתחול נעול** ואינם תומכים ב[פתיחת נעילה של OEM](https://source.android.com/devices/bootloader/locking_unlocking). גרסאות טלפון אלה ימנעו ממך להתקין כל סוג של הפצת אנדרואיד חלופית. -היה מאוד **זהיר** בקניית טלפונים יד שנייה משוק אונליין. בדוק תמיד את המוניטין של המוכר. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). קיים גם סיכון שכרוך בהיותך קשור לפעילות של הבעלים הקודם. +היה מאוד **זהיר** בקניית טלפונים יד שנייה משוק אונליין. בדוק תמיד את המוניטין של המוכר. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). קיים גם סיכון שכרוך בהיותך קשור לפעילות של הבעלים הקודם. עוד כמה טיפים לגבי מכשירי אנדרואיד ותאימות מערכות הפעלה: - אל תקנו מכשירים שהגיעו או קרובים לסוף החיים שלהם, עדכוני קושחה נוספים חייבים להיות מסופקים על ידי היצרן. - אל תקנו טלפונים טעונים מראש של LineageOS או /e/ OS או כל טלפון אנדרואיד ללא תמיכה מתאימה של [אתחול מאומת](https://source.android.com/security/verifiedboot) ועדכוני קושחה. גם למכשירים האלה אין דרך לבדוק אם התעסקו בהם. -- בקיצור, אם לא מופיעה כאן הפצת מכשיר או אנדרואיד, כנראה שיש סיבה טובה. עיין ב[פורום](https://discuss.privacyguides.net/) שלנו כדי למצוא פרטים! +- בקיצור, אם לא מופיעה כאן הפצת מכשיר או אנדרואיד, כנראה שיש סיבה טובה. Check out our [forum](https://discuss.privacyguides.net) to find details! ### גוגל פיקסל @@ -194,7 +194,7 @@ DivestOS משתמשת ב-F-Droid כחנות האפליקציות המוגדרת טלפונים של Google Pixel משתמשים במערכת הפעלה TEE בשם Trusty שהיא [קוד פתוח](https://source.android.com/security/trusty#whyTrusty), בניגוד לטלפונים רבים אחרים. -ההתקנה של GrapheneOS בטלפון Pixel קלה עם [מתקין האינטרנט שלהם](https://grapheneos.org/install/web). אם אתה לא מרגיש בנוח לעשות את זה בעצמך ומוכן להוציא קצת כסף נוסף, בדוק את ה-[NitroPhone](https://shop.nitrokey.com/shop) מכיוון שהם נטענים מראש עם GrapheneOS של חברת [Nitrokey](https://www.nitrokey.com/about) המכובדת. +ההתקנה של GrapheneOS בטלפון Pixel קלה עם [מתקין האינטרנט שלהם](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. עוד כמה טיפים לרכישת Google Pixel: @@ -218,16 +218,16 @@ DivestOS משתמשת ב-F-Droid כחנות האפליקציות המוגדרת Shelter תומך בחסימת פרופילים חוצי חיפוש אנשי קשר ושיתוף קבצים בין פרופילים באמצעות מנהל הקבצים המוגדר כברירת מחדל ([DocumentsUI](https://source.android.com/devices/architecture/modular-system/documentsui)). -[:octicons-repo-16: מאגר](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } -[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=לתרומה } +[:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } +[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter מומלץ מעל [Insular](https://secure-system.gitlab.io/Insular/) ו-[Island](https://github.com/oasisfeng/island) מכיוון שהוא תומך ב[חסימת חיפוש אנשי קשר](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). כשאתה משתמש ב-Shelter, אתה נותן אמון מלא במפתח שלו, שכן Shelter פועל כ[מנהל מכשיר](https://developer.android.com/guide/topics/admin/device-admin) כדי ליצור את פרופיל העבודה, וכן יש לו גישה נרחבת לנתונים המאוחסנים בפרופיל העבודה. @@ -322,11 +322,11 @@ Shelter מומלץ מעל [Insular](https://secure-system.gitlab.io/Insular/) ו
-Obtainium מאפשר לך להוריד קבצי התקנת APK ממגוון רחב של מקורות, וזה תלוי בך לוודא שהמקורות והאפליקציות האלה לגיטימיים. לדוגמה, השימוש ב-Obtainium כדי להתקין את Signal מ[דף הנחיתה של סיגנל APK](https://signal.org/android/apk/) אמור להיות בסדר, אבל התקנה ממאגרי APK של צד שלישי כמו Aptoide או APKPure עלולים להוות סיכונים נוספים. הסיכון של התקנת *עדכון* זדוני נמוך יותר, מכיוון שאנדרואיד עצמו מוודא שכל עדכוני האפליקציה חתומים על ידי אותו מפתח כמו האפליקציה הקיימת בטלפון שלך לפני התקנתם. +Obtainium מאפשר לך להוריד קבצי התקנת APK ממגוון רחב של מקורות, וזה תלוי בך לוודא שהמקורות והאפליקציות האלה לגיטימיים. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. הסיכון של התקנת *עדכון* זדוני נמוך יותר, מכיוון שאנדרואיד עצמו מוודא שכל עדכוני האפליקציה חתומים על ידי אותו מפתח כמו האפליקציה הקיימת בטלפון שלך לפני התקנתם. ### GrapheneOS App Store -חנות האפליקציות של GrapheneOS זמינה ב-[GitHub](https://github.com/GrapheneOS/Apps/releases). הוא תומך באנדרואיד 12 ומעלה ומסוגל לעדכן את עצמו. לחנות האפליקציות יש יישומים עצמאיים שנבנו על ידי פרויקט GrapheneOS כגון [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), ו- [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). אם אתם מחפשים אפליקציות אלו, אנו ממליצים בחום להשיג אותן מחנות האפליקציות של GrapheneOS במקום מחנות Play, שכן האפליקציות בחנות שלהן חתומות על ידי חתימת הפרויקט של ה-GrapheneOS שלגוגל אין גישה אליה. +חנות האפליקציות של GrapheneOS זמינה ב-[GitHub](https://github.com/GrapheneOS/Apps/releases). הוא תומך באנדרואיד 12 ומעלה ומסוגל לעדכן את עצמו. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). אם אתם מחפשים אפליקציות אלו, אנו ממליצים בחום להשיג אותן מחנות האפליקציות של GrapheneOS במקום מחנות Play, שכן האפליקציות בחנות שלהן חתומות על ידי חתימת הפרויקט של ה-GrapheneOS שלגוגל אין גישה אליה. ### Aurora Store @@ -338,7 +338,7 @@ Obtainium מאפשר לך להוריד קבצי התקנת APK ממגוון רח **Aurora Store** היא לקוח של חנות Google Play שאינה דורשת חשבון Google, שירותי Google Play או microG כדי להוריד אפליקציות. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ For apps that are released on platforms like GitHub and GitLab, you may be able אם אתה מוריד קבצי APK להתקנה ידנית, אתה יכול לאמת את החתימה שלהם עם הכלי [`apksigner`](https://developer.android.com/studio/command-line/apksigner), שהוא חלק מ[כלי הבנייה](https://developer.android.com/studio/releases/build-tools) של אנדרואיד. -1. התקן [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. הורד את [כלי שורת הפקודה של אנדרואיד סטודיו](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ For apps that are released on platforms like GitHub and GitLab, you may be able ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. לאחר מכן ניתן להשוות את ה-hashes המתקבלים עם מקור אחר. מפתחים מסוימים כגון Signal [מראים את טביעות האצבע](https://signal.org/android/apk/) באתר האינטרנט שלהם. +5. לאחר מכן ניתן להשוות את ה-hashes המתקבלים עם מקור אחר. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ For apps that are released on platforms like GitHub and GitLab, you may be able ![לוגו F-Droid](assets/img/android/f-droid.svg){ align=right width=120px } -==אנו ממליצים רק על F-Droid כדרך להשיג אפליקציות שלא ניתן להשיג באמצעים שלמעלה.== F-Droid מומלצת לעתים קרובות כחלופה ל-Google Play, במיוחד בקהילת הפרטיות. האפשרות להוסיף מאגרי צד שלישי ולא להיות מוגבלים לגן המוקף חומה של גוגל הובילה לפופולריות שלו. ל-F-Droid יש בנוסף [בנייה הניתנת לשחזור](https://f-droid.org/en/docs/Reproducible_Builds/) עבור יישומים מסוימים והוא מוקדש לתוכנות חינמיות וקוד פתוח. עם זאת, ישנם כמה חסרונות הקשורים לאבטחה באופן שבו F-Droid בונה, חותם ומספק חבילות: +==אנו ממליצים רק על F-Droid כדרך להשיג אפליקציות שלא ניתן להשיג באמצעים שלמעלה.== F-Droid מומלצת לעתים קרובות כחלופה ל-Google Play, במיוחד בקהילת הפרטיות. האפשרות להוסיף מאגרי צד שלישי ולא להיות מוגבלים לגן המוקף חומה של גוגל הובילה לפופולריות שלו. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. עם זאת, ישנם כמה חסרונות הקשורים לאבטחה באופן שבו F-Droid בונה, חותם ומספק חבילות: בשל תהליך בניית האפליקציות שלהם, אפליקציות במאגר ה-F-Droid הרשמי מפגרות לעתים קרובות בפיגור לגבי עדכונים. מנהלי F-Droid גם עושים שימוש חוזר במזהי חבילה בזמן חתימת אפליקציות עם המפתחות שלהם, וזה לא אידיאלי מכיוון שהוא נותן אמון אולטימטיבי לצוות F-Droid. בנוסף, הדרישות להכללת אפליקציה במאגר ה-F-Droid הרשמי הן פחות מחמירות מחנויות אפליקציות אחרות כמו Google Play, כלומר F-Droid נוטה לארח הרבה יותר אפליקציות ישנות יותר, לא מתוחזקות או לא יותר לעמוד ב[תקני אבטחה מודרניים](https://developer.android.com/google/play/requirements/target-sdk). -מאגרי צד שלישי פופולריים אחרים עבור F-Droid כגון [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) מקלים על חלק מהחששות הללו. מאגר IzzyOnDroid מושך רכיבים ישירות מ-GitHub והוא הדבר הטוב הבא למאגרים של המפתחים עצמם. עם זאת, זה לא משהו שאנחנו יכולים להמליץ עליו באופן מלא, מכיוון שאפליקציות בדרך כלל [מוסרות](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) מהמאגר הזה אם הם יתווספו מאוחר יותר למאגר F-Droid הראשי. למרות שזה הגיוני (מכיוון שהמטרה של המאגר המסוים הזה היא לארח אפליקציות לפני שהן מתקבלות למאגר ה-F-Droid הראשי), זה יכול להשאיר אותך עם אפליקציות מותקנות שכבר לא מקבלים עדכונים. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. מאגר IzzyOnDroid מושך רכיבים ישירות מ-GitHub והוא הדבר הטוב הבא למאגרים של המפתחים עצמם. עם זאת, זה לא משהו שאנחנו יכולים להמליץ עליו באופן מלא, מכיוון שאפליקציות בדרך כלל [מוסרות](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) מהמאגר הזה אם הם יתווספו מאוחר יותר למאגר F-Droid הראשי. למרות שזה הגיוני (מכיוון שהמטרה של המאגר המסוים הזה היא לארח אפליקציות לפני שהן מתקבלות למאגר ה-F-Droid הראשי), זה יכול להשאיר אותך עם אפליקציות מותקנות שכבר לא מקבלים עדכונים. -עם זאת, [F-Droid](https://f-droid.org/en/packages/) ו-[IzzyOnDroid](https://apt.izzysoft.de/fdroid/) הם ביתם של אינספור אפליקציות, כך שהם יכולים להוות כלי שימושי לחיפוש ולגלות אפליקציות קוד פתוח שתוכל להוריד באמצעים אחרים כגון Play Store, Aurora Store, או על ידי קבלת ה-APK ישירות מהמפתח. כדאי להשתמש במיטב שיקול הדעת כשאתה מחפש אפליקציות חדשות בשיטה זו, ולעקוב אחר התדירות שבה האפליקציה מתעדכנת. אפליקציות מיושנות עשויות להסתמך על ספריות שאינן נתמכות, בין היתר, מהוות סיכון אבטחה פוטנציאלי. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. כדאי להשתמש במיטב שיקול הדעת כשאתה מחפש אפליקציות חדשות בשיטה זו, ולעקוב אחר התדירות שבה האפליקציה מתעדכנת. אפליקציות מיושנות עשויות להסתמך על ספריות שאינן נתמכות, בין היתר, מהוות סיכון אבטחה פוטנציאלי.

F-Droid Basic

-במקרים נדירים מסוימים, מפתח אפליקציה יפיץ אותה רק באמצעות F-Droid ([Gadgetbridge](https://gadgetbridge.org/) היא דוגמה אחת לכך). אם אתה באמת צריך אפליקציה כזו, אנו ממליצים להשתמש בלקוח החדש יותר [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) במקום ב-F-Droid המקורי אפליקציה כדי להשיג אותו. F-Droid Basic יכול לבצע עדכונים ללא השגחה ללא הרחבה או שורש מורשים, ויש לו מערך תכונות מופחת (הגבלת משטח ההתקפה). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic יכול לבצע עדכונים ללא השגחה ללא הרחבה או שורש מורשים, ויש לו מערך תכונות מופחת (הגבלת משטח ההתקפה).
diff --git a/i18n/he/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/he/assets/img/how-tor-works/tor-encryption-dark.svg index 625cb3e2..0f1e0716 100644 --- a/i18n/he/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/he/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - המכשיר - - שלך - - - - שליחת נתונים לאתר - - - - - קבלת נתונים מאתר אינטרנט - - - - - המכשיר - - שלך - - - - כניסה - - - - - אמצע - - - - - יציאה - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - כניסה - - - - - אמצע - - - - - יציאה - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/he/assets/img/how-tor-works/tor-encryption.svg b/i18n/he/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/he/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/he/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/he/assets/img/how-tor-works/tor-path-dark.svg b/i18n/he/assets/img/how-tor-works/tor-path-dark.svg index 1b697846..24ac7b02 100644 --- a/i18n/he/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/he/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - המכשיר - שלך + + + + המכשיר + שלך - - - כניסה - - - - - אמצע - - - - - יציאה - - - - - PrivacyGuides.org - - - - - - - - + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/he/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/he/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index 03bd5104..ce51beee 100644 --- a/i18n/he/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/he/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - שלך - - - מכשיר - - - - - - שומר - - - ממסר - - - ממסר - - - - - חבוי...בצל - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - מפגש - - - ממסר - - - - - כניסה - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/he/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/he/assets/img/how-tor-works/tor-path-hidden-service.svg index fd6e98d3..8d008447 100644 --- a/i18n/he/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/he/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - שלך - - - מכשיר - - - - - - שומר - - - ממסר - - - ממסר - - - - - חבוי...בצל - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - מפגש - - - ממסר - - - - - כניסה - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/he/assets/img/how-tor-works/tor-path.svg b/i18n/he/assets/img/how-tor-works/tor-path.svg index 22ef319c..d0561cd9 100644 --- a/i18n/he/assets/img/how-tor-works/tor-path.svg +++ b/i18n/he/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + @@ -24,22 +24,22 @@ - המכשיר - שלך + המכשיר + שלך - כניסה + כניסה - אמצע + אמצע - יציאה + יציאה diff --git a/i18n/he/basics/account-deletion.md b/i18n/he/basics/account-deletion.md index 1c7bbf27..b4e5523c 100644 --- a/i18n/he/basics/account-deletion.md +++ b/i18n/he/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: קל לצבור מספר רב של חשבונות אינטרנט, הנה כמה טיפים כיצד לגזום את האוסף שלך. --- -עם הזמן, זה יכול להיות קל לצבור מספר חשבונות מקוונים, שרבים מהם אולי כבר לא תשתמשו בהם. מחיקת חשבונות שאינם בשימוש היא צעד חשוב בהחזרת הפרטיות שלך, מכיוון שחשבונות רדומים חשופים לפרצות מידע. פרצת נתונים היא כאשר אבטחת השירות נפגעת ומידע מוגן נצפה, מועבר או נגנב על ידי שחקנים לא מורשים. פרצות מידע הן למרבה הצער כולן [נפוצות מדי](https://haveibeenpwned.com/PwnedWebsites) בימינו, ולכן תרגול היגיינה דיגיטלית טובה היא הדרך הטובה ביותר למזער את ההשפעה שיש להן על חייך. המטרה של מדריך זה היא אם כן לעזור לנווט אותך בתהליך המעיק של מחיקת חשבון, שלעתים קרובות מקשה על ידי [עיצוב מטעה](https://www.deceptive.design/), למען השיפור של הנוכחות המקוונת שלך. +עם הזמן, זה יכול להיות קל לצבור מספר חשבונות מקוונים, שרבים מהם אולי כבר לא תשתמשו בהם. מחיקת חשבונות שאינם בשימוש היא צעד חשוב בהחזרת הפרטיות שלך, מכיוון שחשבונות רדומים חשופים לפרצות מידע. פרצת נתונים היא כאשר אבטחת השירות נפגעת ומידע מוגן נצפה, מועבר או נגנב על ידי שחקנים לא מורשים. פרצות מידע הן למרבה הצער כולן [נפוצות מדי](https://haveibeenpwned.com/PwnedWebsites) בימינו, ולכן תרגול היגיינה דיגיטלית טובה היא הדרך הטובה ביותר למזער את ההשפעה שיש להן על חייך. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## איתור חשבונות ישנים ### מנהל הסיסמאות -אם יש לך מנהל סיסמאות שבו השתמשת במשך כל חייך הדיגיטליים, החלק הזה יהיה קל מאוד. לעתים קרובות, הם כוללים פונקציונליות מובנית לזיהוי אם פרטי הכניסה שלך נחשפו בפריצת נתונים - כגון דוח [פריצת הנתונים של Bitwarden](https://bitwarden.com/blog/have-you-been-pwned/). +אם יש לך מנהל סיסמאות שבו השתמשת במשך כל חייך הדיגיטליים, החלק הזה יהיה קל מאוד. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![מאפיין הדוח 'פריצת נתונים' של Bitwarden](../assets/img/account-deletion/exposed_passwords.png)
-גם אם לא השתמשת במנהל סיסמאות במפורש בעבר, יש סיכוי שהשתמשת במנהל הסיסמאות בדפדפן או בטלפון שלך מבלי לשים לב. לדוגמה: [מנהל הסיסמאות של Firefox](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [מנהל הסיסמאות של גוגל](https://passwords.google.com/intro) ו - [מנהל סיסמאות של Edge](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +גם אם לא השתמשת במנהל סיסמאות במפורש בעבר, יש סיכוי שהשתמשת במנהל הסיסמאות בדפדפן או בטלפון שלך מבלי לשים לב. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). פלטפורמות שולחניות כוללות לעתים קרובות מנהל סיסמאות שעשוי לעזור לך לשחזר סיסמאות ששכחת מהן: -- מנהל אישורי Windows -- macOS [סיסמאות](https://support.apple.com/en-us/HT211145) -- iOS [סיסמאות](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, שאליו ניתן לגשת דרך [Seahorse](https://wiki.gnome.org/Apps/Seahorse) או [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### אימייל @@ -39,7 +39,7 @@ description: קל לצבור מספר רב של חשבונות אינטרנט, ### GDPR (תושבי EEA בלבד) -לתושבי האזור הכלכלי האירופי יש זכויות נוספות בנוגע למחיקת נתונים המפורטים בסעיף [17](https://www.gdpr.org/regulation/article-17.html) של ה - GDPR. אם זה רלוונטי עבורך, קרא את מדיניות הפרטיות של כל שירות נתון כדי למצוא מידע על מימוש הזכות שלך למחיקה. קריאת מדיניות הפרטיות יכולה להיות חשובה, שכן חלק מהשירותים כוללים אפשרות "מחק חשבון" המשביתה רק את החשבון שלך ולמחיקת אמיתית עליך לנקוט פעולה נוספת. לפעמים מחיקה בפועל עשויה לכלול מילוי סקרים, שליחת אימייל לקצין הגנת המידע של השירות או אפילו הוכחת מקום מגוריך ב - EEA. אם אתם מתכננים ללכת בדרך זו,** אל תעשו ** שישכתב את המידע על חשבון שיש - הזהות שלך כתושב EEA עשוי להיות נדרש. שים לב כי המיקום של השירות אינו משנה; GDPR חל על כל מי שמשרת משתמשים באירופה. אם השירות אינו מכבד את זכותך למחיקה, באפשרותך ליצור קשר עם הלאום שלך [לרשות להגנת נתונים ](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) אתה יכול להיות זכאי לפיצוי כספי. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. אם זה רלוונטי עבורך, קרא את מדיניות הפרטיות של כל שירות נתון כדי למצוא מידע על מימוש הזכות שלך למחיקה. קריאת מדיניות הפרטיות יכולה להיות חשובה, שכן חלק מהשירותים כוללים אפשרות "מחק חשבון" המשביתה רק את החשבון שלך ולמחיקת אמיתית עליך לנקוט פעולה נוספת. לפעמים מחיקה בפועל עשויה לכלול מילוי סקרים, שליחת אימייל לקצין הגנת המידע של השירות או אפילו הוכחת מקום מגוריך ב - EEA. אם אתם מתכננים ללכת בדרך זו,** אל תעשו ** שישכתב את המידע על חשבון שיש - הזהות שלך כתושב EEA עשוי להיות נדרש. שים לב כי המיקום של השירות אינו משנה; GDPR חל על כל מי שמשרת משתמשים באירופה. אם השירות אינו מכבד את זכותך למחיקה, באפשרותך ליצור קשר עם הלאום שלך [לרשות להגנת נתונים ](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) אתה יכול להיות זכאי לפיצוי כספי. ### עריכת פרטי החשבון הקיים @@ -59,4 +59,4 @@ description: קל לצבור מספר רב של חשבונות אינטרנט, ## הימנעות מחשבונות חדשים -כפי שאומר הפתגם הישן, "גרם של מניעה שווה קילו של תרופה." בכל פעם שאתה מתפתה להירשם לחשבון חדש, שאל את עצמך, "האם אני באמת צריך את זה? האם אני יכול להשיג את מה שאני צריך בלי חשבון?" לעתים קרובות זה יכול להיות הרבה יותר קשה למחוק חשבון מאשר ליצור אחד. וגם לאחר מחיקה או שינוי של המידע בחשבונך, עשויה להיות גרסה שמור של צד שלישי - כמו [ארכיון האינטרנט](https://archive.org/). הימנע מהפיתוי כאשר אתה מסוגל - העצמי העתידי שלך יודה לך! +כפי שאומר הפתגם הישן, "גרם של מניעה שווה קילו של תרופה." בכל פעם שאתה מתפתה להירשם לחשבון חדש, שאל את עצמך, "האם אני באמת צריך את זה? האם אני יכול להשיג את מה שאני צריך בלי חשבון?" לעתים קרובות זה יכול להיות הרבה יותר קשה למחוק חשבון מאשר ליצור אחד. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). הימנע מהפיתוי כאשר אתה מסוגל - העצמי העתידי שלך יודה לך! diff --git a/i18n/he/basics/common-misconceptions.md b/i18n/he/basics/common-misconceptions.md index e2dd1bff..bac5ffdb 100644 --- a/i18n/he/basics/common-misconceptions.md +++ b/i18n/he/basics/common-misconceptions.md @@ -88,7 +88,7 @@ We don't suggest using a VPN or Tor for any of these things, as your identity is 2. **זהות לא ידועה** - זהות לא ידועה יכולה להיות שם בדוי יציב שאתה משתמש בו באופן קבוע. זה לא אנונימי כי זה לא משתנה. אם אתה חלק מקהילה מקוונת, ייתכן שתרצה לשמור על דמות שאחרים מכירים. שם בדוי זה אינו אנונימי מכיוון שאם מנוטרים מספיק זמן - פרטים על הבעלים יכולים לחשוף מידע נוסף, כגון האופן שבו הם כותבים, הידע הכללי שלהם לגבי נושאים מעניינים וכו'. -ייתכן שתרצו להשתמש ב - VPN כדי להסתיר את כתובת ה - IP שלכם. קשה יותר להסוות עסקאות פיננסיות: תוכל לשקול להשתמש במטבעות קריפטוגרפיים אנונימיים, כגון [Monero](https://www.getmonero.org/). שימוש בהעברת אלטקוין עשוי גם לעזור להסוות את מקור המטבע שלך. בדרך כלל, ההחלפות דורשות את השלמת KYC (הכר את הלקוח שלך) לפני שהן יאפשרו לך להחליף מטבע פיאט לכל סוג של מטבע קריפטוגרפי. גם אפשרויות מפגש מקומיות עשויות להוות פתרון; עם זאת, אלה לעתים קרובות יותר יקרים ולפעמים גם דורשים KYC. +ייתכן שתרצו להשתמש ב - VPN כדי להסתיר את כתובת ה - IP שלכם. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). שימוש בהעברת אלטקוין עשוי גם לעזור להסוות את מקור המטבע שלך. בדרך כלל, ההחלפות דורשות את השלמת KYC (הכר את הלקוח שלך) לפני שהן יאפשרו לך להחליף מטבע פיאט לכל סוג של מטבע קריפטוגרפי. גם אפשרויות מפגש מקומיות עשויות להוות פתרון; עם זאת, אלה לעתים קרובות יותר יקרים ולפעמים גם דורשים KYC. 3. **זהות אנונימית** - גם עם ניסיון, זהויות אנונימיות קשות לשמירה לאורך תקופות זמן ארוכות. הן צריכות להיות זהויות קצרות טווח וקצרות מועד המסובבות באופן קבוע. diff --git a/i18n/he/basics/common-threats.md b/i18n/he/basics/common-threats.md index 06a41afa..10678309 100644 --- a/i18n/he/basics/common-threats.md +++ b/i18n/he/basics/common-threats.md @@ -55,7 +55,7 @@ description: מודל האיום שלך הוא אישי עבורך, אך אלו -אם אתה מודאג מ**התקפות פיזיות**, עליך להשתמש במערכת הפעלה עם יישום אתחול מאומת מאובטח, כגון Android, iOS, macOS או [Windows (עם TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). עליך גם לוודא שהכונן שלך מוצפן ושמערכת ההפעלה משתמשת ב-TPM או ב-Secure [מובלע](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) או [אלמנט](https://developers.google.com/android/security/android-ready-se) כדי להגביל ניסיונות להזין את ביטוי הסיסמה להצפנה. עליך להימנע משיתוף המחשב שלך עם אנשים שאינך סומך עליהם, מכיוון שרוב מערכות ההפעלה שולחניות אינן מצפינות נתונים בנפרד לכל משתמש. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). עליך גם לוודא שהכונן שלך מוצפן ושמערכת ההפעלה משתמשת ב-TPM או ב-Secure [מובלע](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) או [אלמנט](https://developers.google.com/android/security/android-ready-se) כדי להגביל ניסיונות להזין את ביטוי הסיסמה להצפנה. עליך להימנע משיתוף המחשב שלך עם אנשים שאינך סומך עליהם, מכיוון שרוב מערכות ההפעלה שולחניות אינן מצפינות נתונים בנפרד לכל משתמש. ## פרטיות מספקי שירות @@ -89,16 +89,16 @@ description: מודל האיום שלך הוא אישי עבורך, אך אלו

Atlas of Surveillance

-אם אתה רוצה ללמוד עוד על שיטות מעקב וכיצד הן מיושמות בעיר שלך, תוכל גם להסתכל על [אטלס המעקב](https://atlasofsurveillance.org/) של [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
ממשלות לעתים קרובות מצדיקות תוכניות מעקב המוניות כאמצעים הכרחיים למאבק בטרור ולמניעת פשע. עם זאת, תוך הפרת זכויות אדם, הוא משמש לרוב כדי למקד באופן לא פרופורציונלי קבוצות מיעוט ומתנגדים פוליטיים, בין היתר.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

אל מול [חשיפותיו של אדוארד סנודן לגבי תוכניות ממשלתיות כגון [PRISM](https://en.wikipedia.org/wiki/PRISM) ו-[Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], פקידי מודיעין גם הודו כי ה-NSA במשך שנים אספה בחשאי תיעוד על כמעט כל שיחות טלפון של כל אמריקאי - מי מתקשר למי, מתי השיחות הללו מבוצעות וכמה זמן הן נמשכות. מידע מסוג זה, כאשר הוא נצבר על ידי ה-NSA יום אחר יום, יכול לחשוף פרטים רגישים להפליא על חייהם והאסוציאציות של אנשים, כגון האם הם התקשרו לכומר, מטפל בהפלות, ליועצת להתמכרות או למוקד התאבדות. @@ -144,7 +144,7 @@ In France you can take a look at the [Technopolice website](https://technopolice צנזורה מקוונת יכולה להתבצע (בדרגות שונות) על ידי שחקנים כולל ממשלות טוטליטריות, מנהלי רשתות וספקי שירותים. מאמצים אלה לשלוט בתקשורת ולהגביל את הגישה למידע תמיד יהיו בלתי עולים בקנה אחד עם זכות האדם לחופש הביטוי.[^5] -צנזורה על פלטפורמות ארגוניות נפוצה יותר ויותר, שכן פלטפורמות כמו טוויטר ופייסבוק נכנעות לדרישת הציבור, לחצי השוק וללחצים של סוכנויות ממשלתיות. לחצים ממשלתיים יכולים להיות בקשות סמויות לעסקים, כמו [הבית הלבן המבקש הסרה](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) של סרטון יוטיוב פרובוקטיבי, או גלויים, כמו למשל שממשלת סין דורשת מחברות לדבוק במשטר קפדני של צנזורה. +צנזורה על פלטפורמות ארגוניות נפוצה יותר ויותר, שכן פלטפורמות כמו טוויטר ופייסבוק נכנעות לדרישת הציבור, לחצי השוק וללחצים של סוכנויות ממשלתיות. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. אנשים המודאגים מהאיום של צנזורה יכולים להשתמש בטכנולוגיות כמו [Tor](../advanced/tor-overview.md) כדי לעקוף אותו, ולתמוך בפלטפורמות תקשורת עמידות לצנזורה כמו [Matrix](../real-time-communication.md#element), שאין לה סמכות חשבון מרכזית יכול לסגור חשבונות באופן שרירותי. @@ -162,5 +162,5 @@ In France you can take a look at the [Technopolice website](https://technopolice [^1]: ויקיפדיה: [*מעקבים המונים*](https://en.wikipedia.org/wiki/Mass_surveillance) ו[*מעקבים*](https://en.wikipedia.org/wiki/Surveillance). [^2]: מועצת הפיקוח על הפרטיות וחירויות האזרח של ארצות הברית: [*דיווח על תוכנית רישומי הטלפון שנערכה לפי סעיף 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: ויקיפדיה: [*מעקב קפיטליזם*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. אתה צריך גם להשתמש בטכניקות הפחתה אחרות. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. אתה צריך גם להשתמש בטכניקות הפחתה אחרות. [^5]: האומות המאוחדות: [*הכרזה אוניברסלית על זכויות אדם*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/he/basics/email-security.md b/i18n/he/basics/email-security.md index d96e967c..0da4ff06 100644 --- a/i18n/he/basics/email-security.md +++ b/i18n/he/basics/email-security.md @@ -13,7 +13,7 @@ description: אימייל הוא מטבעו לא מאובטח במובנים ר הדרך הסטנדרטית להוסיף E2EE למיילים בין ספקי אימייל שונים היא באמצעות OpenPGP. ישנם יישומים שונים של תקן OpenPGP, הנפוצים ביותר הם [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) ו- [OpenPGP.js](https://openpgpjs.org). -קיים תקן נוסף שפופולרי בקרב עסקים בשם [S/MIME](https://en.wikipedia.org/wiki/S/MIME), עם זאת, הוא דורש אישור שהונפקו מ[>רשות האישורים](https://en.wikipedia.org/wiki/Certificate_authority) (לא כולן מנפיקות אישורי S/MIME). יש לו תמיכה ב [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) ו [Outlook for Web או Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +קיים תקן נוסף שפופולרי בקרב עסקים בשם [S/MIME](https://en.wikipedia.org/wiki/S/MIME), עם זאת, הוא דורש אישור שהונפקו מ[>רשות האישורים](https://en.wikipedia.org/wiki/Certificate_authority) (לא כולן מנפיקות אישורי S/MIME). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). גם אם אתה משתמש ב - OpenPGP, הוא אינו תומך בסודיות [קדימה](https://en.wikipedia.org/wiki/Forward_secrecy), כלומר אם המפתח הפרטי שלך או של הנמען ייגנב אי פעם, כל ההודעות הקודמות שהוצפנו איתו ייחשפו. זו הסיבה שאנו ממליצים על [מסנג'רים מיידיים](../real-time-communication.md) אשר מיישמים סודיות קדימה על פני דואר אלקטרוני עבור הודעות פנים אל פנים במידת האפשר. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ If you use a shared domain from a provider which doesn't support WKD, like @gmai ### כיצד אוכל להגן על המפתחות הפרטיים שלי? -כרטיס חכם (כגון [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) עובד על ידי קבלת הודעת אימייל מוצפנת ממכשיר (טלפון, טאבלט, מחשב וכו') המריץ לקוח אימייל/מייל אינטרנט. לאחר מכן, ההודעה מפוענחת על ידי הכרטיס החכם והתוכן המפוענח נשלח חזרה למכשיר. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. לאחר מכן, ההודעה מפוענחת על ידי הכרטיס החכם והתוכן המפוענח נשלח חזרה למכשיר. זה יתרון שהפענוח יתרחש בכרטיס החכם כדי למנוע חשיפת המפתח הפרטי שלך למכשיר שנפגע. diff --git a/i18n/he/basics/multi-factor-authentication.md b/i18n/he/basics/multi-factor-authentication.md index 9a714094..3419f1bb 100644 --- a/i18n/he/basics/multi-factor-authentication.md +++ b/i18n/he/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP היא אחת הצורות הנפוצות ביותר של MFA. כאשר א לאחר מכן, הקוד המוגבל בזמן נגזר מהסוד המשותף ומהזמן הנוכחי. מאחר שהקוד תקף לזמן קצר בלבד, ללא גישה לסוד המשותף, היריב אינו יכול ליצור קודים חדשים. -אם יש לך מפתח אבטחת חומרה עם תמיכה ב-TOTP (כגון YubiKey עם [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), אנו ממליצים לאחסן את "הסודות המשותפים" שלך בחומרה. חומרה כגון YubiKey פותחה מתוך כוונה להקשות על החילוץ וההעתקה של "הסוד המשותף". YubiKey גם לא מחובר לאינטרנט, בניגוד לטלפון עם אפליקציית TOTP. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. חומרה כגון YubiKey פותחה מתוך כוונה להקשות על החילוץ וההעתקה של "הסוד המשותף". YubiKey גם לא מחובר לאינטרנט, בניגוד לטלפון עם אפליקציית TOTP. שלא כמו [WebAuthn](#fido-fast-identity-online), TOTP אינו מציע הגנה מפני [דיוג](https://en.wikipedia.org/wiki/Phishing) או שימוש חוזר בהתקפות. אם יריב משיג ממך קוד חוקי, הוא רשאי להשתמש בו כמה פעמים שירצה עד שתוקפו יפוג (בדרך כלל 60 שניות). @@ -122,13 +122,13 @@ WebAuthn היא הצורה המאובטחת והפרטית ביותר של אי ### ווינדוס -לYubico יש ספק [אישורים ייעודי](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) שמוסיף אימות Challenge-Response עבור זרימת הכניסה לשם משתמש + סיסמה עבור חשבונות Windows מקומיים. אם יש לך YubiKey עם תמיכה באימות Challenge-Response, עיין במדריך התצורה של [Yubico Login for Windows](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), שיאפשר לך להגדיר MFA במחשב Windows שלך. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS ל - macOS יש [תמיכה מקומית](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) לאימות עם כרטיסים חכמים (PIV). אם יש לך כרטיס חכם או מפתח אבטחה חומרה התומך בממשק PIV כגון YubiKey, אנו ממליצים לך לעקוב אחר התיעוד של ספק הכרטיס החכם/חומרה שלך ולהגדיר אימות גורם שני עבור מחשב macOS שלך. -לYubico יש מדריך [שימוש ב-YubiKey שלך ככרטיס חכם ב-macOS](https://support.yubico.com/hc/en-us/articles/360016649059) שיכול לעזור לך להגדיר את YubiKey ב-macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. לאחר הגדרת הכרטיס החכם/מפתח האבטחה שלך, אנו ממליצים להפעיל את הפקודה הזו בטרמינל: @@ -147,22 +147,22 @@ sudo defaults write /Library/Preferences/com.apple.loginwindow DisableFDEAutoLog
-מודול `pam_u2f` ב-Linux יכול לספק אימות דו-גורמי לכניסה לרוב ההפצות הפופולריות של לינוקס. אם יש לך מפתח אבטחת חומרה התומך ב-U2F, תוכל להגדיר אימות MFA עבור הכניסה שלך. ליוביקו יש מדריך [מדריך התחברות ל-Ubuntu Linux - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) שאמור לעבוד על כל הפצה. הפקודות של מנהל החבילות - כגון `apt-get` - ושמות החבילות עשויים להיות שונים. מדריך זה **אינו** חל על מערכת ההפעלה Qubes. +מודול `pam_u2f` ב-Linux יכול לספק אימות דו-גורמי לכניסה לרוב ההפצות הפופולריות של לינוקס. אם יש לך מפתח אבטחת חומרה התומך ב-U2F, תוכל להגדיר אימות MFA עבור הכניסה שלך. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. הפקודות של מנהל החבילות - כגון `apt-get` - ושמות החבילות עשויים להיות שונים. מדריך זה **אינו** חל על מערכת ההפעלה Qubes. ### Qubes OS -ל-Qubes OS יש תמיכה באימות Challenge-Response עם YubiKeys. אם יש לך YubiKey עם תמיכה באימות Challenge-Response, עיין ב[תיעוד של YubiKey](https://www.qubes-os.org/doc/yubikey/) של Qubes OS. רוצה להגדיר MFA ב-Qubes OS. +ל-Qubes OS יש תמיכה באימות Challenge-Response עם YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### מפתחות אבטחה של חומרה -ניתן להגדיר SSH MFA באמצעות מספר שיטות אימות שונות הפופולריות במפתחות אבטחה של חומרה. אנו ממליצים לך לעיין ב[תיעוד](https://developers.yubico.com/SSH/) של Yubico כיצד להגדיר זאת. +ניתן להגדיר SSH MFA באמצעות מספר שיטות אימות שונות הפופולריות במפתחות אבטחה של חומרה. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### סיסמה חד פעמית מבוססת זמן (TOTP) -ניתן גם להגדיר SSH MFA באמצעות TOTP. DigitalO Ocean סיפק מדריך [כיצד להגדיר אימות רב - גורמי עבור SSH ב - Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). רוב הדברים צריכים להיות זהים ללא קשר להפצה, אולם פקודות מנהל החבילות - כגון `apt-get` - ושמות החבילות עשויים להיות שונים. +ניתן גם להגדיר SSH MFA באמצעות TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). רוב הדברים צריכים להיות זהים ללא קשר להפצה, אולם פקודות מנהל החבילות - כגון `apt-get` - ושמות החבילות עשויים להיות שונים. ### KeePass (ו-KeePassXC) -ניתן לאבטח מסדי נתונים של KeePass ו-KeePassXC באמצעות Challenge-Response או HOTP כאימות גורם שני. Yubico סיפקה מסמך עבור KeePass [שימוש ב-YubiKey עם KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) ויש גם אחד באתר [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa). +ניתן לאבטח מסדי נתונים של KeePass ו-KeePassXC באמצעות Challenge-Response או HOTP כאימות גורם שני. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/he/basics/passwords-overview.md b/i18n/he/basics/passwords-overview.md index 38d7970e..ba568667 100644 --- a/i18n/he/basics/passwords-overview.md +++ b/i18n/he/basics/passwords-overview.md @@ -54,13 +54,13 @@ description: These are some tips and tricks on how to create the strongest passw

Note

-הוראות אלה מניחות שאתה משתמש ב[רשימת המילים הגדולה של EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) כדי ליצור את ביטוי הסיסמה, שדורש חמש הטלות קוביות לכל מילה. רשימות מילים אחרות עשויות לדרוש יותר או פחות גלגולים למילה, ועשויות לדרוש כמות שונה של מילים כדי להשיג את אותה אנטרופיה. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. רשימות מילים אחרות עשויות לדרוש יותר או פחות גלגולים למילה, ועשויות לדרוש כמות שונה של מילים כדי להשיג את אותה אנטרופיה.
1. לזרוק קובייה בעלת שש צדדים חמש פעמים, לרשום את המספר לאחר כל גלגול. -2. כדוגמה, נניח שזרקת `2-5-2-6-6`. חפש ב [רשימת המילים הגדולה של ה-EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) את המילה המתאימה ל-`25266`. +2. כדוגמה, נניח שזרקת `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. אתה תמצא את המילה `להצפין`. כתוב את המילה הזו. @@ -75,20 +75,20 @@ description: These are some tips and tricks on how to create the strongest passw אם אין לך גישה או תעדיף לא להשתמש בקוביות אמיתיות, תוכל להשתמש במחולל הסיסמאות המובנה של מנהל הסיסמאות שלך, שכן לרובם יש אפשרות ליצור ביטויי סיסמה של תוכנת קוביות בנוסף לסיסמאות הרגילות. -אנו ממליצים להשתמש ב[רשימת המילים הגדולה של EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) כדי ליצור את ביטויי הסיסמה של תוכנת הקוביות שלך, מכיוון שהיא מציעה את אותה אבטחה בדיוק כמו הרשימה המקורית, תוך שהיא מכילה מילים שקל יותר לשנן. יש גם [רשימות מילים אחרות בשפות שונות](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), אם אינך רוצה שביטוי הסיסמה שלך יהיה באנגלית. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. יש גם [רשימות מילים אחרות בשפות שונות](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), אם אינך רוצה שביטוי הסיסמה שלך יהיה באנגלית.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. מדד אחד לקביעת עוצמתו של משפט סיסמא של קוביות הוא כמה אנטרופיה יש לו. האנטרופיה למילה בביטוי סיסמה של תוכנת קוביות מחושבת כnd the overall entropy of the passphrase is calculated as -$\text{log}_2(\text{WordsInList})$והאנטרופיה הכוללת של ביטוי הסיסמה מחושבת כ - $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. לכן, כל מילה ברשימה הנ"ל מביאה ל-~12.9 סיביות של אנטרופיה ($\text{log}_2(7776)$), ולביטוי סיסמה של שבע מילים שנגזר ממנו יש ~90.47 סיביות של אנטרופיה($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. כדי לחשב את כמות ביטויי הסיסמה האפשריים, כל שעלינו לעשות הוא $\text{WordsInList}^\text{WordsInPhrase}$, או במקרה שלנו, $ 7776^7 $. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. כדי לחשב את כמות ביטויי הסיסמה האפשריים, כל שעלינו לעשות הוא $\text{WordsInList}^\text{WordsInPhrase}$, או במקרה שלנו, $ 7776^7 $. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. בממוצע, צריך לנסות 50% מכל השילובים האפשריים כדי לנחש את הביטוי שלך. עם זאת בחשבון, גם אם היריב שלך מסוגל ל-1,000,000,000,000 ניחושים בשנייה, עדיין ייקח לו ~27,255,689 שנים לנחש את משפט הסיסמה שלך. זה המצב גם אם הדברים הבאים נכונים: diff --git a/i18n/he/basics/vpn-overview.md b/i18n/he/basics/vpn-overview.md index 54993cfa..918a5e1b 100644 --- a/i18n/he/basics/vpn-overview.md +++ b/i18n/he/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. כדי לפצות על כך, ספקי VPN בדרך כלל ינתבו את כל החבילות שאינן TCP דרך שרת ה-VPN שלהם (הקפיצה הראשונה שלך). זה המקרה עם [ProtonVPN](https://protonvpn.com/support/tor-vpn/). בנוסף, בעת שימוש בהגדרת Tor over VPN זו, אין לך שליטה על תכונות Tor חשובות אחרות כגון [כתובת יעד מבודדת](https://www.whonix.org/wiki/Stream_Isolation) (באמצעות מעגל Tor שונה עבור כל דומיין שאתה מבקר בו). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. כדי לפצות על כך, ספקי VPN בדרך כלל ינתבו את כל החבילות שאינן TCP דרך שרת ה-VPN שלהם (הקפיצה הראשונה שלך). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## מידע שקשור ל VPN -- [הבעיה עם אתרי סקירת VPN ואתרי פרטיות](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [חקירת אפליקציית VPN בחינם](https://www.top10vpn.com/free-vpn-app-investigation/) -- [בעלי VPN מוסתרים חשפו: 101 מוצרי VPN המנוהלים על ידי 23 חברות בלבד](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [החברה הסינית הזו עומדת בסתר מאחורי 24 אפליקציות פופולריות שמחפשות הרשאות מסוכנות](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - נרטיב מאוד מעורער](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) מאת Dennis Schubert +- [הבעיה עם אתרי סקירת VPN ואתרי פרטיות](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [חקירת אפליקציית VPN בחינם](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [בעלי VPN מוסתרים חשפו: 101 מוצרי VPN המנוהלים על ידי 23 חברות בלבד](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [החברה הסינית הזו עומדת בסתר מאחורי 24 אפליקציות פופולריות שמחפשות הרשאות מסוכנות](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/he/basics/why-privacy-matters.md b/i18n/he/basics/why-privacy-matters.md index 48fb6973..66b894d3 100644 --- a/i18n/he/basics/why-privacy-matters.md +++ b/i18n/he/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ icon: 'material/shield-account' ## מקורות -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) מאת ניל ריצ'רדס -- [The New Oil: מדוע פרטיות & עניין אבטחה](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: מדוע פרטיות & עניין אבטחה](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/he/calendar.md b/i18n/he/calendar.md index 0a9d76c2..5123e276 100644 --- a/i18n/he/calendar.md +++ b/i18n/he/calendar.md @@ -13,7 +13,7 @@ cover: calendar.webp ![Tuta לוגו](assets/img/calendar/tuta.svg){ align=right } -**Tuta** מציעה לוח שנה בחינם ומוצפן על פני הפלטפורמות הנתמכות שלהם. התכונות כוללות: E2EE אוטומטי של כל הנתונים, תכונות שיתוף, פונקציונליות ייבוא/ייצוא, אימות רב-גורמי ו-[עוד](https://tuta.com/calendar-app-comparison/). +**Tuta** מציעה לוח שנה בחינם ומוצפן על פני הפלטפורמות הנתמכות שלהם. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). מספר לוחות שנה ופונקציונליות שיתוף מורחבת מוגבלים למנויים בתשלום. @@ -21,18 +21,18 @@ cover: calendar.webp [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ cover: calendar.webp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/he/cloud.md b/i18n/he/cloud.md index 8d344f46..c4ff521c 100644 --- a/i18n/he/cloud.md +++ b/i18n/he/cloud.md @@ -56,15 +56,15 @@ Nextcloud is [still a recommended tool](productivity.md) for self-hosting a file ** Tresorit ** הוא ספק אחסון ענן מוצפן שוויצרי-הונגרי שנוסד בשנת 2011. Tresorit נמצאת בבעלות ה-Swiss Post, שירות הדואר הלאומי של שוויץ. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Nextcloud is [still a recommended tool](productivity.md) for self-hosting a file Tresorit קיבלה מספר ביקורות אבטחה עצמאיות: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] הענות[הסמכה](https://www.certipedia.com/quality_marks/9108644476) על ידי TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): בדיקת חדירה על ידי Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - סקירה זו העריכה את האבטחה של לקוח האינטרנט של Tresorit, אפליקציית אנדרואיד, אפליקציית ווינדוס והתשתית הקשורה אליו. - Computest גילתה שתי נקודות תורפה שנפתרו. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): בדיקת חדירה על ידי Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - סקירה זו ניתחה את קוד המקור המלא של Tresorit ואימתה שהיישום תואם את המושגים המתוארים ב[דף הלבן](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf) של Tresorit. - ארנסט & יאנג בדק בנוסף את האינטרנט, הנייד והמחשב שולחני: "תוצאות הבדיקה לא מצאו חריגה מתביעות סודיות הנתונים של Tresorit." -הם גם קיבלו את תווית האמון הדיגיטלי, הסמכה מ[היוזמה הדיגיטלית השוויצרית](https://www.swiss-digital-initiative.org/digital-trust-label/) המחייבת העברת 35[ קריטריונים](https://digitaltrust-label.swiss/criteria/) הקשורים לאבטחה, פרטיות ואמינות. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## קריטריונים diff --git a/i18n/he/cryptocurrency.md b/i18n/he/cryptocurrency.md index 4239441a..7bb47c78 100644 --- a/i18n/he/cryptocurrency.md +++ b/i18n/he/cryptocurrency.md @@ -24,10 +24,10 @@ cover: cryptocurrency.webp **Monero** משתמש בבלוקצ'יין עם טכנולוגיות משפרות פרטיות המטשטשות עסקאות כדי להשיג אנונימיות. כל עסקת Monero מסתירה את סכום העסקה, כתובות שליחה וקבלה, ומקור הכספים ללא שום חישוקים לדלג דרכם, מה שהופך אותה לבחירה אידיאלית עבור טירוני מטבעות קריפטוגרפיים. -[:octicons-home-16: דף הבית](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=תיעוד} -[:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=לתרומה } +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ cover: cryptocurrency.webp לפרטיות מיטבית, הקפד להשתמש בארנק לא משמורן שבו מפתח התצוגה נשאר במכשיר. המשמעות היא שרק לך תהיה את היכולת להוציא את הכספים שלך ולראות עסקאות נכנסות ויוצאות. אם אתה משתמש בארנק משמורן, הספק יכול לראות **כל מה** שאתה עושה; אם אתה משתמש בארנק "קל משקל" שבו הספק שומר על מפתח התצוגה הפרטי שלך, הספק יכול לראות כמעט כל מה שאתה עושה. כמה ארנקים שאינם משמורנים כוללים: - [Official Monero client](https://getmonero.org/downloads) (שולחני) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet תומך במספר מטבעות קריפטוגרפיים. גרסת Monero בלבד של Cake Wallet זמינה בכתובת [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (שולחני) -- [Monerujo](https://www.monerujo.io/) (אנדרואיד) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet תומך במספר מטבעות קריפטוגרפיים. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) לפרטיות מקסימלית (אפילו עם ארנק לא משמורן), עליך להפעיל צומת Monero משלך. שימוש בצומת של אדם אחר יחשוף בפניו מידע מסוים, כגון כתובת ה-IP שממנה אתה מתחבר אליו, חותמות הזמן שאתה מסנכרן את הארנק שלך והעסקאות שאתה שולח מהארנק שלך (אם כי אין פרטים נוספים על עסקאות אלו). לחלופין, אתה יכול להתחבר לצומת Monero של מישהו אחר באמצעות Tor או i2p. -באוגוסט 2021, CipherTrace [הכריזה](https://ciphertrace.com/enhanced-monero-tracing/) על יכולות מעקב משופרות של Monero עבור סוכנויות ממשלתיות. פרסומים פומביים מראים כי רשת אכיפת הפשעים הפיננסיים של משרד האוצר האמריקאי העניקה [רישיון](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) ל-"Monero Module" של CipherTrace בסוף 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. פרסומים פומביים מראים כי רשת אכיפת הפשעים הפיננסיים של משרד האוצר האמריקאי העניקה [רישיון](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) ל-"Monero Module" של CipherTrace בסוף 2022. -פרטיות גרף העסקאות של Monero מוגבלת על ידי חתימות הטבעות הקטנות יחסית שלה, במיוחד נגד התקפות ממוקדות. תכונות הפרטיות של Monero גם [הוטלו בספק](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) על ידי כמה חוקרי אבטחה, ומספר נקודות תורפה חמורות נמצאו ותוקנו בעבר, כך שהטענות שהועלו על ידי ארגונים כמו CipherTrace אינן באות בחשבון. אמנם אין זה סביר שכלי מעקב המוני Monero קיימים כפי שהם קיימים עבור ביטקוין ואחרים, אך בטוח שכלי מעקב מסייעים בחקירות ממוקדות. +פרטיות גרף העסקאות של Monero מוגבלת על ידי חתימות הטבעות הקטנות יחסית שלה, במיוחד נגד התקפות ממוקדות. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. אמנם אין זה סביר שכלי מעקב המוני Monero קיימים כפי שהם קיימים עבור ביטקוין ואחרים, אך בטוח שכלי מעקב מסייעים בחקירות ממוקדות. בסופו של דבר, Monero היא המתמודדת החזקה ביותר על מטבע קריפטוגרפי ידידותי לפרטיות, אך טענות הפרטיות שלה **לא** הוכחו באופן סופי כך או כך. נדרשים יותר זמן ומחקר כדי להעריך אם Monero עמיד מספיק בפני התקפות כדי לספק תמיד פרטיות נאותה. diff --git a/i18n/he/data-redaction.md b/i18n/he/data-redaction.md index 2ebc6b10..6492bfe8 100644 --- a/i18n/he/data-redaction.md +++ b/i18n/he/data-redaction.md @@ -88,12 +88,12 @@ cover: data-redaction.webp **Metapho** הוא צופה פשוט ונקי עבור מטא נתונים של תמונות כגון תאריך, שם קובץ, גודל, מודל מצלמה, מהירות צמצם ומיקום. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ cover: data-redaction.webp ** PrivacyBlur** היא אפליקציה חינמית שיכולה לטשטש חלקים רגישים של תמונות לפני שהיא משתפת אותם באינטרנט. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ cover: data-redaction.webp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106)
diff --git a/i18n/he/desktop-browsers.md b/i18n/he/desktop-browsers.md index 1d93fd16..85094f86 100644 --- a/i18n/he/desktop-browsers.md +++ b/i18n/he/desktop-browsers.md @@ -70,8 +70,8 @@ schema: **Mullvad Browser** הוא גרסה של [דפדפן Tor](tor.md#tor-browser) עם שילובי רשת Tor שהוסרו, שמטרתה לספק את טכנולוגיות הדפדפן נגד טביעת אצבע של Tor Browser למשתמשי VPN. הוא פותח על ידי Tor Project ומופץ על ידי [Mullvad](vpn.md#mullvad), ו**לא** דורש שימוש ב-VPN של Mullvad. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ schema: -בדומה ל[דפדפן תור](tor.md), Mullvad Browser נועד למנוע טביעת אצבע על ידי הפיכת טביעת האצבע של הדפדפן שלך לזהות לכל שאר משתמשי Mullvad Browser, והוא כולל הגדרות ברירת מחדל והרחבות המוגדרות אוטומטית לפי רמות האבטחה המוגדרות כברירת מחדל: *Standard*, *Safer* ו- *Safest*. לכן, הכרחי שלא תשנה את הדפדפן כלל בחוץ תוך התאמת [רמות האבטחה](https://tb-manual.torproject.org/security-settings/) המוגדרות כברירת מחדל. שינויים אחרים יהפכו את טביעת האצבע שלך לייחודית, ויביסו את מטרת השימוש בדפדפן זה. אם אתה רוצה להגדיר את הדפדפן שלך בצורה כבדה יותר וטביעת אצבע אינה מדאיגה אותך, אנו ממליצים במקום זאת על [Firefox](#firefox). +בדומה ל[דפדפן תור](tor.md), Mullvad Browser נועד למנוע טביעת אצבע על ידי הפיכת טביעת האצבע של הדפדפן שלך לזהות לכל שאר משתמשי Mullvad Browser, והוא כולל הגדרות ברירת מחדל והרחבות המוגדרות אוטומטית לפי רמות האבטחה המוגדרות כברירת מחדל: *Standard*, *Safer* ו- *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). שינויים אחרים יהפכו את טביעת האצבע שלך לייחודית, ויביסו את מטרת השימוש בדפדפן זה. אם אתה רוצה להגדיר את הדפדפן שלך בצורה כבדה יותר וטביעת אצבע אינה מדאיגה אותך, אנו ממליצים במקום זאת על [Firefox](#firefox). ### נגד טביעת אצבע @@ -116,17 +116,17 @@ Mullvad Browser מגיע עם DuckDuckGo מוגדר כ[מנוע החיפוש](se **Firefox** מספק הגדרות פרטיות חזקות כגון [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), שיכול לעזור לחסום שונים [סוגי מעקב](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser מגיע עם DuckDuckGo מוגדר כ[מנוע החיפוש](se

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug ##### Firefox Suggest (ארה"ב בלבד) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) היא תכונה הדומה להצעות חיפוש שזמינה רק בארה"ב. אנו ממליצים להשבית אותו מאותה סיבה שאנו ממליצים להשבית את הצעות החיפוש. אם אינך רואה את האפשרויות הללו תחת הכותרת **סרגל הכתובות**, אין לך את החוויה החדשה ואתה יכול להתעלם משינויים אלה. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. אנו ממליצים להשבית אותו מאותה סיבה שאנו ממליצים להשבית את הצעות החיפוש. אם אינך רואה את האפשרויות הללו תחת הכותרת **סרגל הכתובות**, אין לך את החוויה החדשה ואתה יכול להתעלם משינויים אלה. - [] בטל את הסימון **הצעות מהאינטרנט** - [ ] בטל את הסימון **הצעות מנותני חסות** @@ -183,7 +183,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug > Firefox שולח נתונים על הגרסה והשפה של Firefox שלך; תצורת מערכת ההפעלה והחומרה של המכשיר; זיכרון, מידע בסיסי על קריסות ושגיאות; תוצאה של תהליכים אוטומטיים כמו עדכונים, גלישה בטוחה והפעלה אלינו. כאשר Firefox שולח לנו נתונים, כתובת ה-IP שלך נאספת זמנית כחלק מיומני השרת שלנו. -בנוסף, שירות חשבונות Firefox אוסף [כמה נתונים טכניים](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). אם אתה משתמש בחשבון Firefox אתה יכול לבטל את הסכמתך: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). אם אתה משתמש בחשבון Firefox אתה יכול לבטל את הסכמתך: 1. פתח את [הגדרות הפרופיל שלך ב ](https://accounts.firefox.com/settings#data-collection)accounts.firefox.com 2. ביטול סימון **איסוף נתונים ושימוש** > **עזרה בשיפור חשבונות Firefox** @@ -204,7 +204,7 @@ Max Protection אוכפת את השימוש ב-DNS על HTTPS, ואזהרת אב #### סנכרון -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) מאפשר לנתוני הגלישה שלך (היסטוריה, סימניות וכו') להיות נגישים בכל המכשירים שלך ומגן עליהם באמצעות E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (מתקדם) @@ -215,7 +215,7 @@ Max Protection אוכפת את השימוש ב-DNS על HTTPS, ואזהרת אב -פרויקט [Arkenfox](https://github.com/arkenfox/user.js) מספק קבוצה של אפשרויות שנשקלו בקפידה עבור Firefox. אם אתה [מחליט](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) להשתמש ב-Arkenfox, [כמה אפשרויות](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) הן קפדניות סובייקטיבית ו/או עלולות לגרום לאתרים מסוימים לא לעבוד כראוי [שאותן תוכל לשנות בקלות](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) כדי להתאים לצרכים שלך. אנו **ממליצים בחום** לקרוא את [הויקי](https://github.com/arkenfox/user.js/wiki) המלא שלהם. Arkenfox גם מאפשר תמיכה ב[מכולות](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users). +פרויקט [Arkenfox](https://github.com/arkenfox/user.js) מספק קבוצה של אפשרויות שנשקלו בקפידה עבור Firefox. אם אתה [מחליט](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) להשתמש ב-Arkenfox, [כמה אפשרויות](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) הן קפדניות סובייקטיבית ו/או עלולות לגרום לאתרים מסוימים לא לעבוד כראוי [שאותן תוכל לשנות בקלות](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) כדי להתאים לצרכים שלך. אנו **ממליצים בחום** לקרוא את [הויקי](https://github.com/arkenfox/user.js/wiki) המלא שלהם. Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox שואפת רק לסכל תסריטי מעקב בסיסיים או נאיביים באמצעות קנבס אקראי והגדרות תצורת התנגדות טביעות האצבע המובנות של Firefox. זה לא מכוון לגרום לדפדפן שלך להשתלב עם קהל גדול של משתמשי Arkenfox אחרים באותו אופן שבו Mullvad Browser או Tor Browser עושים, וזו הדרך היחידה לסכל סקריפטים מתקדמים למעקב אחר טביעות אצבע. זכור שאתה תמיד יכול להשתמש במספר דפדפנים, לדוגמה, אתה יכול לשקול להשתמש ב-Firefox+Arkenfox עבור כמה אתרים שאתה רוצה להישאר מחובר אליהם או לסמוך עליהם בדרך אחרת, ואת Mullvad Browser לגלישה כללית. @@ -223,25 +223,25 @@ Arkenfox שואפת רק לסכל תסריטי מעקב בסיסיים או נא
-![Brave לוגו](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**דפדפן Brave** כולל חוסם תוכן מובנה ו [תכונות פרטיות ]( https://brave.com/privacy-features/), רבים מהם מופעלים כברירת מחדל. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave בנוי על פרויקט דפדפן Chromium, כך שהוא אמור להרגיש מוכר ושיהיו לו בעיות תאימות מינימליות לאתר. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ Brave מוסיף "[קוד הפניה](https://github.com/brave/brave-browser/wik ##### Shields -Brave כולל כמה אמצעים נגד טביעת אצבע בתכונת [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) שלו. אנו מציעים להגדיר את האפשרויות האלה [גלובלי](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) בכל הדפים שבהם אתה מבקר. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ניתן לשדרג לאחור את האפשרויות של Shields על בסיס אתר לפי הצורך, אך כברירת מחדל אנו ממליצים להגדיר את האפשרויות הבאות: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave
-1. אפשרות זו מספקת פונקציונליות דומה ל [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) המתקדמים של uBlock Origin או ל [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### פרטיות ואבטחה
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave הוא **לא** עמיד בפני טביעת אצבע כמו דפדפן Tor והרבה פחות אנשים משתמשים אמיץ עם Tor, כך תוכל להתבלט. כאשר [נדרשת אנונימיות חזקה](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) השתמש בדפדפן [Tor](tor.md#tor-browser). +1. Brave הוא **לא** עמיד בפני טביעת אצבע כמו דפדפן Tor והרבה פחות אנשים משתמשים אמיץ עם Tor, כך תוכל להתבלט. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ If you wish to stay logged in to a particular site you visit often, you can set #### סנכרון -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) מאפשר לנתוני הגלישה שלך (היסטוריה, סימניות וכו ') להיות נגישים בכל המכשירים שלך ללא צורך בחשבון ומגן עליהם באמצעות E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ If you wish to stay logged in to a particular site you visit often, you can set
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ uBlock Origin Lite only receives block list updates whenever the extension is up - זמין ב-Linux, macOS ו-Windows. - כל שינוי שיידרש כדי להפוך את הדפדפן ליותר מכבד פרטיות לא צריך להשפיע לרעה על חוויית המשתמש. - חוסם קובצי עוגיות של צד שלישי כברירת מחדל. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### המקרה הטוב ביותר הקריטריונים הטובים ביותר שלנו מייצגים את מה שהיינו רוצים לראות מהפרויקט המושלם בקטגוריה זו. ייתכן שההמלצות שלנו לא יכללו חלק מהפונקציונליות הזו או את כולה, אך אלו שכן כן עשויות לדרג גבוה יותר מאחרות בדף זה. - כולל פונקציונליות מובנית לחסימת תוכן. -- תומך מידור עוגיות ([מכולות מרובות חשבון](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. זה יכול להיות בעל יתרונות על פני התקנת אפליקציות מבוססות-אלקטרון, מכיוון שאתה נהנה מעדכוני האבטחה הרגילים של הדפדפן שלך. - לא כולל פונקציונליות הרחבה (bloatware) שאינה משפיעה על פרטיות המשתמש. - אינו אוסף טלמטריה כברירת מחדל. @@ -462,4 +462,4 @@ uBlock Origin Lite only receives block list updates whenever the extension is up - חייב להשפיע ישירות על פרטיות המשתמש, כלומר לא חייב פשוט לספק מידע. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/he/desktop.md b/i18n/he/desktop.md index 90286e98..bca3f79b 100644 --- a/i18n/he/desktop.md +++ b/i18n/he/desktop.md @@ -17,17 +17,17 @@ cover: desktop.webp ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora בדרך כלל מאמצת טכנולוגיות חדשות יותר לפני הפצות אחרות, למשל [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org), ובקרוב [FS-Verity](https://fedoraproject.org/wiki/Changes/FsVerityRPM). טכנולוגיות חדשות אלה מגיעות לעתים קרובות עם שיפורים באבטחה, בפרטיות ובשימושיות באופן כללי. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). טכנולוגיות חדשות אלה מגיעות לעתים קרובות עם שיפורים באבטחה, בפרטיות ובשימושיות באופן כללי. -[:octicons-home-16: דף הבית](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=תיעוד} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=לתרומה } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-לFedora יש מהדורת שחרור מתגלגל-למחצה. בעוד כמה חבילות כמו [GNOME](https://www.gnome.org) מוקפאות עד לשחרור הבא של פדורה, רוב החבילות (כולל הקרנל) מתעדכנות לעתים קרובות לאורך תוחלת החיים של השחרור. כל גרסה של פדורה נתמכת למשך שנה אחת, עם גרסה חדשה ששוחררה כל שישה חודשים. +לFedora יש מהדורת שחרור מתגלגל-למחצה. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. כל גרסה של פדורה נתמכת למשך שנה אחת, עם גרסה חדשה ששוחררה כל שישה חודשים. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ cover: desktop.webp **openSUSE Tumbleweed** היא הפצת שחרור מתגלגלת יציבה. -ל-openSUSE Tumblewee יש a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) יש מערכת המשתמשת [Btrfs](https://en.wikipedia.org/wiki/Btrfs) ו [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) כדי להבטיח שניתן יהיה להחזיר תמונות אם תהיה בעיה. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed עוקב אחר מודל מהדורה מתגלגל שבו כל עדכ **Arch Linux** הוא הפצה קלה של עשה זאת בעצמך (DIY) שמשמעותה שאתה מקבל רק את מה שאתה מתקין. לקבלת מידע נוסף, עיין ב[FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ Tumbleweed עוקב אחר מודל מהדורה מתגלגל שבו כל עדכ **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS היא הפצה עצמאית המבוססת על מנהל החבילות של Nix ומתמקדת בשחזור ואמינות. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** מבוסס על [Kicksecure](#kicksecure), נגזר ממוקד אבטחה של דביאן. מטרתו לספק פרטיות, אבטחה ואנונימיות באינטרנט. כדאי להשתמש ב - Whonix בשילוב עם [Qubes OS](# qubes- os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** היא מערכת הפעלה חיה המבוססת על דביאן המנתבת את כל התקשורת דרך Tor, שיכולה לאתחל כמעט כל מחשב מ - DVD, מקל USB או התקנת כרטיס SD. הוא משתמש ב - [Tor](tor.md) כדי לשמור על פרטיות ואנונימיות תוך עקיפת הצנזורה, והוא אינו מותיר עקבות של עצמו במחשב שבו הוא נמצא בשימוש לאחר שהוא כבוי. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## הפצות ממוקדות אבטחה @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** היא מערכת הפעלה בקוד פתוח שנועדה לספק אבטחה חזקה עבור מחשוב שולחני באמצעות מכונות וירטואליות מאובטחות (או "qubes"). Qubes מבוסס על Xen, מערכת חלונות X ו- Linux. זה יכול להריץ את רוב יישומי לינוקס ולהשתמש ברוב מנהלי ההתקנים של לינוקס. -[:octicons-home-16: דף הבית](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=תיעוד } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=לתרומה } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure** - במונחים פשוטים מדי - היא קבוצה של סקריפטים, תצורות וחבילות שמצמצמות באופן משמעותי את משטח ההתקפה של דביאן. זה מכסה הרבה המלצות לפרטיות והקשחה כברירת מחדל. הוא משמש גם כמערכת ההפעלה הבסיסית עבור [Whonix](#whonix). -[:octicons-home-16: דף הבית](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=תיעוד } -[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=לתרומה } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/he/device-integrity.md b/i18n/he/device-integrity.md index b0993f6c..6f2509ab 100644 --- a/i18n/he/device-integrity.md +++ b/i18n/he/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/he/dns.md b/i18n/he/dns.md index 3ca5b88b..1a868e5a 100644 --- a/i18n/he/dns.md +++ b/i18n/he/dns.md @@ -11,14 +11,14 @@ cover: dns.webp ## ספקים מומלצים -| ספקי DNS | מדיניות פרטיות | פרוטוקולים | תיעוד בקשות | ECS | סינון | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------ | -------------- | ---------- | --------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | חלקי[^1] | Yes | מבוסס על תצורה אישית. רשימת סינון בשימוש ניתן למצוא כאן. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH
DoT | חלקי[^2] | לא | מבוסס על תצורה אישית. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH
DoT
DNSCrypt
DoQ
DoH3 | אופציונאלי[^3] | לא | מבוסס על תצורה אישית. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | לא[^4] | לא | מבוסס על תצורה אישית. רשימת סינון בשימוש ניתן למצוא כאן. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH
DoT
DNSCrypt
DoQ
DoH3 | אופציונאלי[^5] | אופציונאלי | מבוסס על תצורה אישית. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | חלק[^6] | אופציונאלי | בהתבסס על תצורה אישית, חוסם תוכנות זדוניות כברירת מחדל. | +| ספקי DNS | מדיניות פרטיות | פרוטוקולים | תיעוד בקשות | ECS | סינון | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------ | -------------- | ---------- | --------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | חלקי[^1] | Yes | מבוסס על תצורה אישית. רשימת סינון בשימוש ניתן למצוא כאן. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH
DoT | חלקי[^2] | לא | מבוסס על תצורה אישית. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH
DoT
DNSCrypt
DoQ
DoH3 | אופציונאלי[^3] | לא | מבוסס על תצורה אישית. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | לא[^4] | לא | מבוסס על תצורה אישית. רשימת סינון בשימוש ניתן למצוא כאן. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH
DoT
DNSCrypt
DoQ
DoH3 | אופציונאלי[^5] | אופציונאלי | מבוסס על תצורה אישית. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | חלק[^6] | אופציונאלי | בהתבסס על תצורה אישית, חוסם תוכנות זדוניות כברירת מחדל. | ### קריטריונים @@ -50,7 +50,7 @@ cover: dns.webp #### פרופילים חתומים -Apple אינה מספקת ממשק מקורי ליצירת פרופילי DNS מוצפנים. [יוצר פרופיל DNS מאובטח](https://dns.notjakob.com/tool.html) הוא כלי לא רשמי ליצירת פרופילי DNS מוצפנים משלך, אולם הם לא ייחתמו. פרופילים חתומים מועדפים; החתימה מאמתת את מקור הפרופיל ומסייעת להבטיח את שלמות הפרופילים. תווית "מאומת" ירוקה ניתנת לפרופילי תצורה חתומים. לקבלת מידע נוסף על חתימת קוד, ראה [אודות חתימת קוד](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **פרופילים חתומים** מוצעים על ידי [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), ו [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple אינה מספקת ממשק מקורי ליצירת פרופילי DNS מוצפנים. [יוצר פרופיל DNS מאובטח](https://dns.notjakob.com/tool.html) הוא כלי לא רשמי ליצירת פרופילי DNS מוצפנים משלך, אולם הם לא ייחתמו. פרופילים חתומים מועדפים; החתימה מאמתת את מקור הפרופיל ומסייעת להבטיח את שלמות הפרופילים. תווית "מאומת" ירוקה ניתנת לפרופילי תצורה חתומים. לקבלת מידע נוסף על חתימת קוד, ראה [אודות חתימת קוד](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Apple אינה מספקת ממשק מקורי ליצירת פרופילי DNS מ [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -123,9 +123,9 @@ Apple אינה מספקת ממשק מקורי ליצירת פרופילי DNS מ
-![AdGuard Home לוגו](assets/img/dns/adguard-home.svg){ align=right } +![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** הוא קוד פתוח [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) שמשתמש ב[סינון DNS](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) כדי לחסום תוכן אינטרנט לא רצוי, כגון פרסומות. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home כולל ממשק אינטרנט משופשף כדי להציג תובנות ולנהל תוכן חסום. @@ -142,25 +142,25 @@ AdGuard Home כולל ממשק אינטרנט משופשף כדי להציג ת
-![Pi-hole לוגו](assets/img/dns/pi-hole.svg){ align=right } +![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** הוא קוד פתוח [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) שמשתמש ב[סינון DNS](https://www.cloudflare.com/learning/access -management/what-is-dns-filtering/) כדי לחסום תוכן אינטרנט לא רצוי, כגון פרסומות. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole מיועד להתארח ב-Raspberry Pi, אך הוא אינו מוגבל לחומרה כזו. התוכנה כוללת ממשק אינטרנט ידידותי כדי להציג תובנות ולנהל תוכן חסום. -[:octicons-home-16: דף הבית](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=תיעוד} -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=לתרומה } +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
[^1]: AdGuard מאחסן מדדי ביצועים מצטברים של שרתי ה-DNS שלהם, כלומר מספר הבקשות המלאות לשרת מסוים, מספר הבקשות החסומות ומהירות עיבוד הבקשות. הם גם שומרים ומאחסנים את מסד הנתונים של הדומיינים שהתבקשו ב-24 השעות האחרונות. "אנחנו צריכים את המידע הזה כדי לזהות ולחסום עוקבים ואיומים חדשים." "אנחנו גם מתעדים כמה פעמים גשש זה או אחר נחסם. אנחנו צריכים את המידע הזה כדי להסיר את הכללים המיושנים מהמסננים שלנו." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare אוספת ומאחסנת רק את נתוני שאילתת ה-DNS המוגבלים שנשלחים לפותר 1.1.1.1. שירות הפותר 1.1.1.1 אינו רושם נתונים אישיים, וחלק הארי של נתוני השאילתות המוגבלים שאינם ניתנים לזיהוי אישי מאוחסן למשך 25 שעות בלבד. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare אוספת ומאחסנת רק את נתוני שאילתת ה-DNS המוגבלים שנשלחים לפותר 1.1.1.1. שירות הפותר 1.1.1.1 אינו רושם נתונים אישיים, וחלק הארי של נתוני השאילתות המוגבלים שאינם ניתנים לזיהוי אישי מאוחסן למשך 25 שעות בלבד. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D רק מתעדים עבור פותרי Premium עם פרופילי DNS מותאמים אישית. פותרים חינמיים אינם רושמים נתונים. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: שירות ה-DNS של Mullvad זמין הן למנויים והן ללא מנויים של Mullvad VPN. מדיניות הפרטיות שלהם טוענת במפורש שהם לא רושמים בקשות DNS בשום צורה. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: שירות ה-DNS של Mullvad זמין הן למנויים והן ללא מנויים של Mullvad VPN. מדיניות הפרטיות שלהם טוענת במפורש שהם לא רושמים בקשות DNS בשום צורה. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. אתה יכול לבחור זמני שמירה ומיקומי אחסון ביומן עבור כל יומן שתבחר לשמור. אם זה לא מתבקש במיוחד, לא נרשמים נתונים. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 אוספת חלק מהנתונים למטרות ניטור ותגובה של איומים. לאחר מכן ניתן לערבב מחדש את הנתונים הללו ולשתף אותם, למשל לצורך מחקר אבטחה. Quad9 אינה אוספת או מתעדת כתובות IP או נתונים אחרים שלדעתם ניתנים לזיהוי אישי. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 אוספת חלק מהנתונים למטרות ניטור ותגובה של איומים. לאחר מכן ניתן לערבב מחדש את הנתונים הללו ולשתף אותם, למשל לצורך מחקר אבטחה. Quad9 אינה אוספת או מתעדת כתובות IP או נתונים אחרים שלדעתם ניתנים לזיהוי אישי. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/he/email-clients.md b/i18n/he/email-clients.md index 9e302525..a6a6ff20 100644 --- a/i18n/he/email-clients.md +++ b/i18n/he/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -74,9 +74,9 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Apple Mail** כלול ב-macOS וניתן להרחיב אותו כך שתהיה לו תמיכה ב-OpenPGP עם [GPG Suite](encryption.md#gpg-suite), אשר מוסיפה את היכולת לשלוח מייל מוצפן PGP. -[:octicons-home-16: דף הבית](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=תיעוד} +[:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail הוא קוד סגור. אנו ממליצים על זה בגלל ה [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail הוא קוד סגור. אנו ממליצים על זה בגלל ה ![Evolution לוגו](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** הוא יישום לניהול מידע אישי המספק פונקציונליות משולבת של דואר, לוחות שנה ופנקס כתובות. ל-Evolution יש [תיעוד](https://help.gnome.org/users/evolution/stable/) נרחב שיעזור לך להתחיל. +**Evolution** הוא יישום לניהול מידע אישי המספק פונקציונליות משולבת של דואר, לוחות שנה ופנקס כתובות. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ Canary Mail הוא קוד סגור. אנו ממליצים על זה בגלל ה [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ Canary Mail הוא קוד סגור. אנו ממליצים על זה בגלל ה [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ Canary Mail הוא קוד סגור. אנו ממליצים על זה בגלל ה **Mailvelope** היא תוסף דפדפן המאפשר החלפת מיילים מוצפנים בהתאם לתקן ההצפנה OpenPGP. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ Canary Mail הוא קוד סגור. אנו ממליצים על זה בגלל ה NeoMutt הוא לקוח מבוסס טקסט שיש לו עקומת למידה תלולה. עם זאת, זה מאוד להתאמה אישית. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/he/email.md b/i18n/he/email.md index 5e1a390a..034bdc53 100644 --- a/i18n/he/email.md +++ b/i18n/he/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the #### :material-check:{ .pg-green } דומיינים וכינויים מותאמים אישית -מנויי Proton Mail בתשלום יכולים להשתמש בדומיין משלהם עם השירות או בכתובת [תפוס-הכל](https://proton.me/support/catch-all). Proton Mail תומך גם ב[כתובת משנה](https://proton.me/support/creating-aliases), שהיא שימושית לאנשים שלא רוצים לרכוש דומיין. +מנויי Proton Mail בתשלום יכולים להשתמש בדומיין משלהם עם השירות או בכתובת [תפוס-הכל](https://proton.me/support/catch-all). Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } שיטות תשלום פרטיות @@ -129,7 +129,7 @@ Proton Mail אינו מציע תכונה מורשת דיגיטלית. #### :material-check:{ .pg-green } דומיינים וכינויים מותאמים אישית -Mailbox.org מאפשר לך להשתמש בדומיין משלך, והם תומכים בכתובות [תפוס כל](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain). Mailbox.org תומך גם [בכתובת משנה](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), וזה שימושי אם אינך רוצה לרכוש דומיין. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } שיטות תשלום פרטיות @@ -137,17 +137,17 @@ Mailbox.org אינו מקבל מטבעות קריפטוגרפיים כלשהם #### :material-check:{ .pg-green } אבטחת חשבון -Mailbox.org תומך ב[אימות דו-שלבי](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) עבור דואר האינטרנט שלהם בלבד. אתה יכול להשתמש ב- TOTP או ב- [YubiKey](https://en.wikipedia.org/wiki/YubiKey) דרך [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). תקני אינטרנט כגון [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) אינם נתמכים עדיין. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). תקני אינטרנט כגון [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) אינם נתמכים עדיין. #### :material-information-outline:{ .pg-blue } אבטחת מידע -Mailbox.org מאפשר הצפנה של דואר נכנס באמצעות [תיבת הדואר המוצפנת](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox) שלהם. הודעות חדשות שתקבל יוצפנו באופן מיידי באמצעות המפתח הציבורי שלך. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). הודעות חדשות שתקבל יוצפנו באופן מיידי באמצעות המפתח הציבורי שלך. -עם זאת, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), פלטפורמת התוכנה המשמשת את Mailbox.org, [אינה תומכת](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) בהצפנה של פנקס הכתובות והלוח שנה שלך. [אפשרות עצמאית](calendar.md) עשויה להתאים יותר למידע זה. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. [אפשרות עצמאית](calendar.md) עשויה להתאים יותר למידע זה. #### :material-check:{ .pg-green } הצפנת אימייל -ל-Mailbox.org יש [הצפנה משולבת](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) בדואר האינטרנט שלהם, מה שמקל על שליחת הודעות לאנשים עם מפתחות OpenPGP ציבוריים. הם גם מאפשרים [לנמענים מרוחקים לפענח אימייל בשרתים](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) של Mailbox.org. תכונה זו שימושית כאשר לנמען המרוחק אין OpenPGP ואין באפשרותו לפענח עותק של הדואר האלקטרוני בתיבת הדואר שלו. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. תכונה זו שימושית כאשר לנמען המרוחק אין OpenPGP ואין באפשרותו לפענח עותק של הדואר האלקטרוני בתיבת הדואר שלו. Mailbox.org תומך גם בגילוי מפתחות ציבוריים באמצעות HTTP מ-[Web Key Directory (WKD)](https://wiki.gnupg.org/WKD) שלהם. זה מאפשר לאנשים מחוץ Mailbox.org למצוא את מפתחות OpenPGP של חשבונות Mailbox.org בקלות, עבור E2EE חוצה ספקים. זה חל רק על כתובות אימיילים המסתיימות באחד מהדומיינים של Mailbox.org עצמו, כמו mailbox.org@. אם אתה משתמש בדומיין מותאם אישית, עליך [להגדיר את WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) בנפרד. @@ -157,9 +157,9 @@ Mailbox.org תומך גם בגילוי מפתחות ציבוריים באמצע #### :material-information-outline:{ .pg-blue } פונקציונליות נוספת -אתה יכול לגשת לחשבון Mailbox.org שלך דרך IMAP/SMTP באמצעות [שירות.onion](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org) שלהם. עם זאת, לא ניתן לגשת לממשק דואר האינטרנט שלהם באמצעות שירות.onion שלהם ואתה עלול להיתקל בשגיאות אישור TLS. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). עם זאת, לא ניתן לגשת לממשק דואר האינטרנט שלהם באמצעות שירות.onion שלהם ואתה עלול להיתקל בשגיאות אישור TLS. -כל החשבונות מגיעים עם אחסון ענן מוגבל ש[ניתן להצפנה](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org מציעה גם את הכינוי [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), אשר אוכף את הצפנת TLS על החיבור בין שרתי דואר, אחרת ההודעה לא תישלח כלל. Mailbox.org תומך גם ב-[Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) בנוסף לפרוטוקולי גישה סטנדרטיים כמו IMAP ו-POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org תומך גם ב-[Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) בנוסף לפרוטוקולי גישה סטנדרטיים כמו IMAP ו-POP3. Mailbox.org כולל תכונת מורשת דיגיטלית לכל התוכניות. אתה יכול לבחור אם אתה רוצה שכל הנתונים שלך יועברו ליורשים בתנאי שהם חלים ומספקים את הצוואה שלך. לחלופין, ניתן למנות אדם לפי שם וכתובת. @@ -185,18 +185,18 @@ Mailbox.org כולל תכונת מורשת דיגיטלית לכל התוכני [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta אינו תומך ב[פרוטוקול IMAP](https://tuta.com/faq/#imap) א #### :material-check:{ .pg-green } דומיינים וכינויים מותאמים אישית -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } שיטות תשלום פרטיות @@ -232,7 +232,7 @@ Tuta [ימחק חשבונות בחינם לא פעילים](https://tuta.com/faq Tuta מציעה את הגרסה העסקית של [Tuta לארגונים ללא מטרות רווח](https://tuta.com/blog/posts/secure-email-for-non-profit) בחינם או בהנחה כבדה. -ל-Tuta יש גם תכונה עסקית בשם [חיבור מאובטח](https://tuta.com/secure-connect/). זה מבטיח שיצירת קשר עם הלקוח לעסק משתמשת ב- E2EE. התכונה עולה 240 אירו לשנה. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). זה מבטיח שיצירת קשר עם הלקוח לעסק משתמשת ב- E2EE. התכונה עולה 240 אירו לשנה. Tuta אינו מציע תכונה מורשת דיגיטלית. @@ -284,14 +284,14 @@ Tuta אינו מציע תכונה מורשת דיגיטלית. - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-מספר הכינויים המשותפים (שמסתיימים בדומיין משותף כמו @addy.io) שאתה יכול ליצור מוגבל ל-10 בתוכנית החינמית של addy.io, 50 בתוכנית של $1 לחודש וללא הגבלה בתוכנית של $4 לחודש (החיוב 3 דולר לשנה). אתה יכול ליצור כינויים סטנדרטיים ללא הגבלה (שמסתיימים בדומיין כמו @[username].addy.io או דומיין מותאם אישית בתוכניות בתשלום), עם זאת, כפי שצוין קודם לכן, זה יכול להזיק לפרטיות מכיוון שאנשים יכולים לקשור באופן טריוויאלי את הכינויים הסטנדרטיים שלך יחד על סמך שם הדומיין בלבד. הם שימושיים כאשר דומיין משותף עשוי להיות חסום על ידי שירות. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +מספר הכינויים המשותפים (שמסתיימים בדומיין משותף כמו @addy.io) שאתה יכול ליצור מוגבל ל-10 בתוכנית החינמית של addy.io, 50 בתוכנית של $1 לחודש וללא הגבלה בתוכנית של $4 לחודש (החיוב 3 דולר לשנה). אתה יכול ליצור כינויים סטנדרטיים ללא הגבלה (שמסתיימים בדומיין כמו @[username].addy.io או דומיין מותאם אישית בתוכניות בתשלום), עם זאת, כפי שצוין קודם לכן, זה יכול להזיק לפרטיות מכיוון שאנשים יכולים לקשור באופן טריוויאלי את הכינויים הסטנדרטיים שלך יחד על סמך שם הדומיין בלבד. הם שימושיים כאשר דומיין משותף עשוי להיות חסום על ידי שירות. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). תכונות חינמיות בולטות: @@ -310,8 +310,8 @@ Tuta אינו מציע תכונה מורשת דיגיטלית. **SimpleLogin** הוא שירות חינמי המספק כינויי דוא"ל על מגוון שמות דומיין משותפים, ובאופן אופציונלי מספק תכונות בתשלום כמו כינויים בלתי מוגבלים ודומיינים מותאמים אישית. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Tuta אינו מציע תכונה מורשת דיגיטלית. - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin [נרכשה על ידי Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) נכון ל-8 באפריל 2022. אם אתה משתמש ב-Proton Mail עבור תיבת הדואר הראשית שלך, SimpleLogin היא בחירה מצוינת. מכיוון ששני המוצרים נמצאים כעת בבעלות אותה חברה, כעת עליך לסמוך רק על ישות אחת. אנו גם מצפים ש-SimpleLogin תשתלב בצורה הדוקה יותר עם ההיצע של Proton בעתיד. SimpleLogin ממשיכה לתמוך בהעברה לכל ספק דוא"ל שתבחרו. Securitum [ביקרה את SimpleLogin](https://simplelogin.io/blog/security-audit/) בתחילת 2022 וכל הבעיות [טופלו](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin [נרכשה על ידי Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) נכון ל-8 באפריל 2022. אם אתה משתמש ב-Proton Mail עבור תיבת הדואר הראשית שלך, SimpleLogin היא בחירה מצוינת. מכיוון ששני המוצרים נמצאים כעת בבעלות אותה חברה, כעת עליך לסמוך רק על ישות אחת. אנו גם מצפים ש-SimpleLogin תשתלב בצורה הדוקה יותר עם ההיצע של Proton בעתיד. SimpleLogin ממשיכה לתמוך בהעברה לכל ספק דוא"ל שתבחרו. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). תוכל לקשר את חשבון SimpleLogin שלך בהגדרות עם חשבון Proton שלך. אם יש לך את הפרוטון ללא הגבלה, עסקים, או תוכנית חזון, יהיה לך SimpleLogin פרימיום בחינם. @@ -352,9 +352,9 @@ SimpleLogin [נרכשה על ידי Proton AG](https://proton.me/news/proton-and **Mailcow** הוא שרת דואר מתקדם יותר המושלם עבור אלה עם קצת יותר ניסיון בלינוקס. יש לו את כל מה שאתה צריך במיכל Docker: שרת דואר עם תמיכה ב- DKIM, ניטור אנטי וירוס וספאם, דואר אינטרנט ו- ActiveSync עם SOGo, וניהול מבוסס אינטרנט עם תמיכה ב- 2FA. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=תיעוד} -[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=לתרומה } +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ SimpleLogin [נרכשה על ידי Proton AG](https://proton.me/news/proton-and לגישה ידנית יותר בחרנו את שני המאמרים הבאים: -- [הגדרת שרת דואר עם OpenSMTPD, Dovecot ו - Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [כיצד להפעיל שרת דואר משלך](https://www.c0ffee.net/blog/mail-server-guide/) (אוגוסט 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## קריטריונים @@ -386,7 +386,7 @@ SimpleLogin [נרכשה על ידי Proton AG](https://proton.me/news/proton-and **מינימום כדי לעמוד בדרישות:** - מצפין נתוני חשבון אימייל במצב מנוחה עם הצפנה ללא גישה. -- יכולת ייצוא כ [Mbox](https://en.wikipedia.org/wiki/Mbox) או .eml בודד עם תקן [RFC5322](https://datatracker.ietf.org/doc/rfc5322/). +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - מאפשר למשתמשים להשתמש ב[שם דומיין](https://en.wikipedia.org/wiki/Domain_name) משלהם. שמות דומיין מותאמים אישית חשובים למשתמשים מכיוון שהם מאפשרים להם לתחזק את הסוכנות שלהם מהשירות, אם היא תהפוך לגרועה או תירכש על ידי חברה אחרת שאינה מתעדפת פרטיות. - פועל על תשתית בבעלות, כלומר לא בנוי על ספקי שירותי דואר אלקטרוני של צד שלישי. @@ -397,7 +397,7 @@ SimpleLogin [נרכשה על ידי Proton AG](https://proton.me/news/proton-and - תמיכה עבור [WKD](https://wiki.gnupg.org/WKD) כדי לאפשר גילוי משופר של מפתחות OpenPGP ציבוריים באמצעות HTTP. משתמשי GnuPG יכולים לקבל מפתח על ידי הקלדה `gpg --locate-key example_user@example.com` - תמיכה בתיבת דואר זמנית למשתמשים חיצוניים. פעולה זו שימושית כאשר ברצונך לשלוח דוא"ל מוצפן, מבלי לשלוח עותק בפועל לנמען שלך. למיילים אלה יש בדרך כלל תוחלת חיים מוגבלת ולאחר מכן נמחקות אוטומטית. הם גם לא דורשים מהנמען להגדיר שום קריפטוגרפיה כמו OpenPGP. - זמינות שירותי ספק הדואר האלקטרוני באמצעות [שירות onion](https://en.wikipedia.org/wiki/.onion). -- [תמיכה בתת - כתובת](https://en.wikipedia.org/wiki/Email_address#Subaddressing). +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - פונקציונליות של תפוס - הכל או כינוי עבור בעלי דומיינים משלהם. - שימוש בפרוטוקולי גישה סטנדרטיים למייל כגון IMAP, SMTP או [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). פרוטוקולי גישה סטנדרטיים מבטיחים שלקוחות יכולים להוריד בקלות את כל האימייל שלהם, אם הם רוצים לעבור לספק אחר. @@ -425,13 +425,13 @@ SimpleLogin [נרכשה על ידי Proton AG](https://proton.me/news/proton-and - הגנה על דואר אינטרנט עם 2FA, כגון TOTP. - הצפנת אפס גישה, מתבססת על הצפנה במנוחה. לספק אין את מפתחות הפענוח של הנתונים שברשותו. פעולה זו מונעת מעובד שסרח להדליף נתונים שיש לו גישה אליהם או מיריב מרחוק לשחרר נתונים שגנב על ידי השגת גישה בלתי מורשית לשרת. - תמיכה ב [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions). -- אין שגיאות TLS או פגיעות בעת פרופיל על ידי כלים כגון [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), או [Qualys SSL Labs](https://www.ssllabs.com/ssltest); זה כולל שגיאות הקשורות לאישור ופרמטרים חלשים של DH, כגון אלה שהובילו ל - [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - העדפת חבילת שרתים (אופציונלית ב-TLSv1.3) עבור חבילות צופן חזקות התומכות בסודיות קדימה ובהצפנה מאומתת. - [MTA-STS](https://tools.ietf.org/html/rfc8461) בתוקף וגם מדיניות [TLS-RPT](https://tools.ietf.org/html/rfc8460). - בתוקף [רשומות DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities). - בתוקף [רשומות SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) ו - [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail). - שיהיה לך מתאים [DMARC](https://en.wikipedia.org/wiki/DMARC) עבר ומדיניות או שימוש ב [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) לאימות. אם נעשה שימוש באימות DMARC, יש להגדיר את המדיניות ל- `דוחה` או `הסגר`. -- העדפת חבילת שרת של TLS 1.2 ואילך ותוכנית עבור [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [שליחת SMTPS](https://en.wikipedia.org/wiki/SMTPS), בהנחה שנעשה שימוש ב - SMTP. - תקני אבטחת אתר אינטרנט כגון: - [אבטחת תעבורה קפדנית של HTTP](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ SimpleLogin [נרכשה על ידי Proton AG](https://proton.me/news/proton-and - תוכניות לחיפוש באגים ו/או תהליך גילוי - פגיעות מתואם. - תקני אבטחת אתר אינטרנט כגון: - [מדיניות אבטחת תוכן (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### אמון diff --git a/i18n/he/encryption.md b/i18n/he/encryption.md index ae46940b..84fa8c78 100644 --- a/i18n/he/encryption.md +++ b/i18n/he/encryption.md @@ -22,15 +22,15 @@ cover: encryption.webp [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator משתמש בהצפנת AES-256 כדי להצפין קבצים וש מספר ספריות קריפטוגרפיות של Cryptomator [עברו ביקורת](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) על ידי Cure53. היקף הספריות המבוקרים כולל: [cryptolib](https://github.com/cryptomator/cryptolib), [ cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) ו-[cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). הביקורת לא התרחבה ל[cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), שהיא ספרייה המשמשת את Cryptomator עבור iOS. -התיעוד של Cryptomator מפרט את [יעד האבטחה](https://docs.cryptomator.org/en/latest/security/security-target/) המיועד, [ארכיטקטורת האבטחה](https://docs.cryptomator.org/en/latest/security/architecture/) ו[שיטות העבודה המומלצות](https://docs.cryptomator.org/en/latest/security/best-practices/) לשימוש ביתר פירוט. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (קובץ) @@ -81,15 +81,15 @@ Cryptomator משתמש בהצפנת AES-256 כדי להצפין קבצים וש [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ Truecrypt [נבדק מספר פעמים](https://en.wikipedia.org/wiki/TrueCrypt ![BitLocker לוגו](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** הוא פתרון ההצפנה המלא המצורף ל-Microsoft Windows. הסיבה העיקרית שאנו ממליצים עליה להצפנת כונן האתחול שלך היא בגלל [השימוש ב-TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, חברה לזיהוי פלילי, כתבה על תכונה זו ב-[הבנת BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** הוא פתרון ההצפנה המלא המצורף ל-Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=תיעוד} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker [ נתמך רק](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) במהדורות Pro, Enterprise ו- Education של Windows. ניתן להפעיל אותו במהדורות ביתיות בתנאי שהן עומדות בדרישות המוקדמות. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. ניתן להפעיל אותו במהדורות ביתיות בתנאי שהן עומדות בדרישות המוקדמות.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. גישה ל[אפשרויות הפעלה מתקדמות](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). עליך לאתחל מחדש תוך כדי לחיצה על מקש F8 לפני הפעלת Windows ולהיכנס ל *שורת הפקודה* ב **פתרון בעיות** → **אפשרויות מתקדמות** → **שורת הפקודהPrompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). עליך לאתחל מחדש תוך כדי לחיצה על מקש F8 לפני הפעלת Windows ולהיכנס ל *שורת הפקודה* ב **פתרון בעיות** → **אפשרויות מתקדמות** → **שורת הפקודהPrompt**. 4. התחבר עם חשבון הניהול שלך והקלד זאת בשורת הפקודה כדי להתחיל בהצפנה: ```powershell manage-bde -on c: -used @@ -183,9 +183,9 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form **LUKS** היא שיטת ברירת המחדל של FDE עבור לינוקס. ניתן להשתמש בו כדי להצפין אמצעי אחסון מלאים, מחיצות או ליצור מיכלים מוצפנים. -[:octicons-home-16: דף הבית](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=תיעוד} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="קוד מקור" } +[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im ![Kryptor לוגו](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** הוא כלי הצפנת וחתימה של קבצים חינמי ופתוח העושה שימוש באלגוריתמים קריפטוגרפיים מודרניים ומאובטחים. המטרה היא להיות גרסה טובה יותר של [age](https://github.com/FiloSottile/age) ו [Minisign](https://jedisct1.github.io/minisign/) כדי לספק חלופה פשוטה וקלה יותר ל GPG. +**Kryptor** הוא כלי הצפנת וחתימה של קבצים חינמי ופתוח העושה שימוש באלגוריתמים קריפטוגרפיים מודרניים ומאובטחים. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im **Tomb** הוא מעטפת מעטפת שורת פקודה עבור LUKS. הוא תומך בסטגנוגרפיה באמצעות [כלים של צד שלישי](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: דף הבית](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=תיעוד} -[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=לתרומה } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im לעתים יש צורך ב-OpenPGP עבור משימות ספציפיות כמו חתימה דיגיטלית והצפנת דואר אלקטרוני. ל-PGP תכונות רבות והוא [מורכב](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) כפי שהוא קיים זמן רב. עבור משימות כגון חתימה או הצפנה של קבצים, אנו מציעים את האפשרויות לעיל. -בעת הצפנה באמצעות PGP, יש לך אפשרות להגדיר אפשרויות שונות בקובץ `gpg.conf` שלך. אנו ממליצים להישאר עם האפשרויות הסטנדרטיות המפורטות ב[שאלות הנפוצות של משתמשי GnuPG ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +בעת הצפנה באמצעות PGP, יש לך אפשרות להגדיר אפשרויות שונות בקובץ `gpg.conf` שלך. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard לוגו](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** היא חלופה ברישיון GPL לחבילת PGP של תוכנות הצפנה. GnuPG תואם ל-[RFC 4880](https://tools.ietf.org/html/rfc4880), שהוא מפרט ה-IETF הנוכחי של OpenPGP. פרויקט GnuPG עבד על [טיוטה מעודכנת](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) בניסיון לחדש את OpenPGP. GnuPG הוא חלק מפרויקט התוכנה GNU של קרן התוכנה החופשית וקיבל [מימון] גדול (https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) מממשלת גרמניה. +**GnuPG** היא חלופה ברישיון GPL לחבילת PGP של תוכנות הצפנה. GnuPG תואם ל-[RFC 4880](https://tools.ietf.org/html/rfc4880), שהוא מפרט ה-IETF הנוכחי של OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG הוא חלק מפרויקט התוכנה GNU של קרן התוכנה החופשית וקיבל [מימון] גדול (https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) מממשלת גרמניה. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ gpg --quick-gen-key alice@example.com future-default ![OpenKeychain לוגו](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** הוא יישום אנדרואיד של GnuPG. זה נדרש בדרך כלל על ידי לקוחות דואר כגון [K-9 Mail](email-clients.md#k-9-mail) ו- [FairEmail](email-clients.md#fairemail) ואפליקציות Android אחרות כדי לספק תמיכה בהצפנה. Cure53 השלימה [ביקורת אבטחה](https://www.openkeychain.org/openkeychain-3-6) של OpenKeychain 3.6 באוקטובר 2015. פרטים טכניים על הביקורת והפתרונות של OpenKeychain ניתן למצוא [כאן](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** הוא יישום אנדרואיד של GnuPG. זה נדרש בדרך כלל על ידי לקוחות דואר כגון [K-9 Mail](email-clients.md#k-9-mail) ו- [FairEmail](email-clients.md#fairemail) ואפליקציות Android אחרות כדי לספק תמיכה בהצפנה. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. פרטים טכניים על הביקורת והפתרונות של OpenKeychain ניתן למצוא [כאן](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/he/file-sharing.md b/i18n/he/file-sharing.md index 7c18df58..43793de6 100644 --- a/i18n/he/file-sharing.md +++ b/i18n/he/file-sharing.md @@ -15,7 +15,7 @@ cover: file-sharing.webp ![Send לוגו](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** היא נגזרת של שירות Firefox Send של Mozilla שהופסקה המאפשר לך לשלוח קבצים לאחרים עם קישור. קבצים מוצפנים במכשיר שלך כך שלא ניתן לקרוא אותם על ידי השרת, והם יכולים להיות מוגנים באמצעות סיסמה. המתחזק של שלח Send מארח [מופע ציבורי](https://send.vis.ee/). אפשר להשתמש במועדים ציבוריים אחרים, או לארח לשלוח את עצמכם. +**Send** היא נגזרת של שירות Firefox Send של Mozilla שהופסקה המאפשר לך לשלוח קבצים לאחרים עם קישור. קבצים מוצפנים במכשיר שלך כך שלא ניתן לקרוא אותם על ידי השרת, והם יכולים להיות מוגנים באמצעות סיסמה. The maintainer of Send hosts a [public instance](https://send.vis.ee). אפשר להשתמש במועדים ציבוריים אחרים, או לארח לשלוח את עצמכם. [:octicons-home-16: דף הבית](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="מופעים ציבוריים"} @@ -80,10 +80,10 @@ ffsend upload -- host https://send.vis.ee/ FILE **FreedomBox** היא מערכת הפעלה המיועדת להפעלה על [מחשב עם לוח יחיד (SBC)](https://en.wikipedia.org/wiki/Single-board_computer). המטרה היא להקל על הגדרת יישומי שרת שאולי תרצה לארח בעצמך. -[:octicons-home-16: דף הבית](https://freedombox.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=תיעוד} -[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=לתרומה } +[:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} +[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ ffsend upload -- host https://send.vis.ee/ FILE [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ ffsend upload -- host https://send.vis.ee/ FILE [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/he/financial-services.md b/i18n/he/financial-services.md index d0cbe09b..f3f519f8 100644 --- a/i18n/he/financial-services.md +++ b/i18n/he/financial-services.md @@ -28,9 +28,9 @@ cover: financial-services.webp התוכנית החינמית של **Privacy.com** מאפשרת לך ליצור עד 12 כרטיסים וירטואליים בחודש, להגדיר מגבלות הוצאות על כרטיסים אלה ולכבות כרטיסים באופן מיידי. התוכנית בתשלום שלהם מאפשרת לך ליצור עד 36 כרטיסים בחודש, לקבל החזר של 1% מזומן על רכישות ולהסתיר מידע של העסקה מהבנק שלך. -[:octicons-home-16: דף הבית](https://privacy.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=תיעוד} +[:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com מספק מידע על הסוחרים מהם אתה רוכש לבנ **MySudo** מספקת עד 9 כרטיסים וירטואליים בהתאם לתוכנית שתרכשו. התוכניות בתשלום שלהם כוללות בנוסף פונקציונליות שעשויה להיות שימושית לביצוע רכישות באופן פרטי, כגון מספרי טלפון וירטואליים וכתובות אימייל, אם כי בדרך כלל אנו ממליצים על [ספקי כינוי אימייל](email.md) אחרים לשימוש נרחב בכינויי אימייל. -[:octicons-home-16: דף הבית](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=תיעוד} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ Privacy.com מספק מידע על הסוחרים מהם אתה רוכש לבנ ** CoinCards ** (זמין בארה"ב ובקנדה) מאפשר לך לרכוש כרטיסי מתנה למגוון גדול של סוחרים. -[:octicons-home-16: דף הבית](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=תיעוד} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/he/frontends.md b/i18n/he/frontends.md index 0412d5d3..4845a24c 100644 --- a/i18n/he/frontends.md +++ b/i18n/he/frontends.md @@ -17,9 +17,9 @@ cover: frontends.webp
-![ProxiTok לוגו](assets/img/frontends/proxitok.svg){ align=right } +![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** הוא חזית קוד פתוח לאתר [TikTok](https://www.tiktok.com) שהוא גם מארח עצמי. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T

Warning

-בעת השימוש ב-FreeTube, ייתכן שכתובת ה-IP שלך עדיין ידועה ליוטיוב, [Invidious](https://instances.invidious.io) או [SponsorBlock](https://sponsor.ajay.app/) בהתאם לתצורה שלך. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T **Yattee** הוא נגן וידאו חינמי וקוד פתוח מוכוון פרטיות עבור iOS, tvOS ו-macOS עבור [יוטיוב](https://youtube.com). בעת השימוש ב - Yattee, רשימת המנויים שלך נשמרת באופן מקומי במכשיר שלך. -תצטרך לבצע כמה [צעדים נוספים](https://gonzoknows.com/posts/Yattee/) לפני שתוכל להשתמש ב-Yattee כדי לצפות ב-YouTube, עקב הגבלות של App Store. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T

Warning

-בעת השימוש ב- Yattee, כתובת ה- IP שלך עשויה עדיין להיות ידועה ליוטיוב, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) או [SponsorBlock](https://sponsor.ajay.app/) בהתאם לתצורה שלך. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube מאפשר לך לאחסן את רשימת המנויים והפליי

Warning

-בעת שימוש ב-LibreTube, כתובת ה-IP שלך תהיה גלויה למופע [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) שתבחר ו/או ל-[SponsorBlock](https://sponsor.ajay.app/) בהתאם לתצורה שלך. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -149,17 +149,17 @@ LibreTube מאפשר לך לאחסן את רשימת המנויים והפליי
-![Newpipe לוגו](assets/img/frontends/newpipe.svg){ align=right } +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** היא אפליקציית אנדרואיד חינמית וקוד פתוח עבור [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), ו-[PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). רשימת המנויים והפלייליסטים שלך נשמרים באופן מקומי במכשיר האנדרואיד שלך. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ LibreTube מאפשר לך לאחסן את רשימת המנויים והפליי
-1. מופע ברירת המחדל הוא [FramaTube](https://framatube.org/), עם זאת ניתן להוסיף יותר דרך **הגדרות** ← **תוכן** ← **מופעים PeerTube** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -190,11 +190,11 @@ LibreTube מאפשר לך לאחסן את רשימת המנויים והפליי There are a number of public instances, with some instances having [Tor](tor.md) onion services support. -[:octicons-home-16: דף הבית](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="מופעים ציבוריים"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=תיעוד} -[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=לתרומה } +[:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -224,11 +224,11 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped דורש JavaScript כדי לתפקד ויש מספר מופעים ציבוריים. -[:octicons-repo-16: מאגר](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="מופעים ציבוריים"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=תיעוד} -[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=לתרומה } +[:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } +[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/he/index.md b/i18n/he/index.md index 2861d5f1..5762c1cb 100644 --- a/i18n/he/index.md +++ b/i18n/he/index.md @@ -62,12 +62,12 @@ schema: ## אנחנו זקוקים לך! יש כמה דרכים לעזור לנו: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="הצטרף לפורום שלנו" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="עקבו אחרינו במסטודון" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="תרום לאתר זה" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="עזור לתרגם את האתר הזה" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="שוחח איתנו במטריקס" } -[:material-information-outline:](about/index.md){ title="למד עוד אודותינו" } -[:material-hand-coin-outline:](about/donate.md){ title="תמכו בפרויקט" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } חשוב שאתר כמו Privacy Guides יישאר תמיד מעודכן. אנחנו צריכים שהקהל שלנו יפקח עין על עדכוני תוכנה עבור היישומים הרשומים באתר שלנו ויעקוב אחר התפתחויות לגבי ספקים שאנחנו ממליצים עליהם. קשה לעמוד בקצב המהיר של האינטרנט, אבל אנחנו מנסים כמיטב יכולתנו. אם אתה מזהה איזו שגיאה, חושב שספק לא צריך להיות רשום, שם לב שחסר ספק מוסמך, מאמין שתוסף דפדפן הוא כבר לא הבחירה הטובה ביותר, או מוצא כל בעיה אחרת, אנא הודיע לנו. diff --git a/i18n/he/kb-archive.md b/i18n/he/kb-archive.md index 3f5f4a8f..df668018 100644 --- a/i18n/he/kb-archive.md +++ b/i18n/he/kb-archive.md @@ -8,10 +8,10 @@ description: חלק מהדפים שהיו בעבר במאגר הידע שלנו כמה דפים שהיו בעבר במאגר הידע שלנו נמצאים כעת בבלוג שלנו: -- [GrapheneOS לעומת CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal תצורה והקשחה](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [לינוקס - הקשחת המערכת](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [לינוקס - ארגז חול ליישומים](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [מחיקת נתונים מאובטחת](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [הסרה משולבת של מטא נתונים](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [מדריך התצורה של iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS לעומת CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal תצורה והקשחה](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [לינוקס - הקשחת המערכת](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [לינוקס - ארגז חול ליישומים](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [מחיקת נתונים מאובטחת](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [הסרה משולבת של מטא נתונים](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [מדריך התצורה של iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/he/meta/admonitions.md b/i18n/he/meta/admonitions.md index 513a6ce8..3d4c2680 100644 --- a/i18n/he/meta/admonitions.md +++ b/i18n/he/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/he/meta/translations.md b/i18n/he/meta/translations.md index ff7b0555..f442ad07 100644 --- a/i18n/he/meta/translations.md +++ b/i18n/he/meta/translations.md @@ -2,9 +2,9 @@ title: תרגומים --- -ל-Crowdin יש תיעוד טוב, ואנו מציעים לעיין במדריך [תחילת העבודה](https://support.crowdin.com/crowdin-intro/) שלהם. האתר שלנו כתוב ברובו ב[Markdown](https://en.wikipedia.org/wiki/Markdown), כך שיהיה קל לתרום. דף זה מכיל כמה עצות מועילות לתרגום תחביר ספציפי שאתה עשוי להיתקל בו באתר שלנו. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. האתר שלנו כתוב ברובו ב[Markdown](https://en.wikipedia.org/wiki/Markdown), כך שיהיה קל לתרום. דף זה מכיל כמה עצות מועילות לתרגום תחביר ספציפי שאתה עשוי להיתקל בו באתר שלנו. -אנא הצטרף לחדר הלוקליזציה שלנו ב-Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) אם יש לך שאלות נוספות, וקרא את [פוסט בלוג ההכרזה](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) שלנו לקבלת מידע נוסף על הפרויקט. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. שימו לב שהגרסה האנגלית של האתר היא הגרסה הראשית, כלומר שינויים מתרחשים שם תחילה. אם אתה מבחין בשפה שנמצאת מאחורי הגרסה האנגלית, אנא עזור. איננו יכולים להבטיח את הדיוק של כל התרגומים שלנו. אם יש לך הצעה לגבי תוכן ספציפי לאזור שלך, פתח בעיה או שלח בקשה ל[מאגר הראשי](https://github.com/privacyguides/privacyguides.org) שלנו. @@ -78,4 +78,4 @@ Recommendations הן סוג מיוחד של אזהרה ש**אין** לעקוף - קישורים חייבים להשתמש בסוגריים רגילים, כלומר `(` (Left Parenthesis U+0028) ו-`)` (Right Parenthesis U+0029) ולא `(` (סוגריים שמאליים ברוחב מלא U+FF08) או `)` (סוגריים ימניים ברוחב מלא U+FF09) - טקסט מצוטט עם הזחה חייב להשתמש ב-`:` (נקודתיים U+003A) ולא ב-`:` (נקודתיים U+FF1A ברוחב מלא) -- תמונות חייבות להשתמש ב-`!` (סימן קריאה U+0021) ולא ב-`!` (סימן קריאה ברוחב מלא U+FF01) +- תמונות חייבות להשתמש ב-`!` (סימן קריאה U+0021) ולא ב-`!` (סימן קריאה ברוחב מלא U+FF01) diff --git a/i18n/he/meta/uploading-images.md b/i18n/he/meta/uploading-images.md index f4a845f4..48651305 100644 --- a/i18n/he/meta/uploading-images.md +++ b/i18n/he/meta/uploading-images.md @@ -17,7 +17,7 @@ title: העלאת תמונות ### PNG -השתמש ב-[OptiPNG](https://sourceforge.net/projects/optipng/) כדי לבצע אופטימיזציה של תמונת PNG: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/he/meta/writing-style.md b/i18n/he/meta/writing-style.md index 6ee20e4a..46ba93ad 100644 --- a/i18n/he/meta/writing-style.md +++ b/i18n/he/meta/writing-style.md @@ -4,11 +4,11 @@ title: סגנון כתיבה Privacy Guides כתובים באנגלית אמריקאית, וכדאי לעיין ב-[APA הנחיות סגנון](https://apastyle.apa.org/style-grammar-guidelines/grammar) כאשר יש ספק. -באופן כללי [ההנחיות הפדרליות לשפה פשוטה של ארצות הברית](https://www.plainlanguage.gov/guidelines/) מספקות סקירה כללית טובה של איך לכתוב בצורה ברורה ותמציתית. אנו מדגישים כמה הערות חשובות מהנחיות אלה להלן. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. אנו מדגישים כמה הערות חשובות מהנחיות אלה להלן. ## כתיבה עבור הקהל שלנו -[הקהל](https://www.plainlanguage.gov/guidelines/audience/) המיועד של Privacy Guides הוא בעיקר טכנולוגיה ממוצעת שמבוגרים משתמשים בה. אל תאט תוכן כאילו אתה פונה לכיתה בחטיבת הביניים, אבל אל תשתמש יתר על המידה בטרמינולוגיה מסובכת לגבי מושגים שמשתמשי מחשב ממוצעים לא היו מכירים. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. אל תאט תוכן כאילו אתה פונה לכיתה בחטיבת הביניים, אבל אל תשתמש יתר על המידה בטרמינולוגיה מסובכת לגבי מושגים שמשתמשי מחשב ממוצעים לא היו מכירים. ### התייחס רק למה שאנשים רוצים לדעת @@ -24,7 +24,7 @@ Privacy Guides כתובים באנגלית אמריקאית, וכדאי לעיי > > כאשר אתה משתמש ב"אתה" כדי לפנות למשתמשים, סביר יותר שהם יבינו מהי האחריות שלהם. -מקור: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### הימנעו מ"משתמשים " @@ -37,7 +37,7 @@ Privacy Guides כתובים באנגלית אמריקאית, וכדאי לעיי - הגבל את המסמך לסביבות חמישה או שישה חלקים. מסמכים ארוכים כנראה צריכים להיות מחולקים לדפים נפרדים. - סמן רעיונות חשובים ב**מודגש** או ב*אותיות מוטות*. -מקור: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### התחל במשפט נושא @@ -45,7 +45,7 @@ Privacy Guides כתובים באנגלית אמריקאית, וכדאי לעיי > > לעתים קרובות אנו כותבים את הדרך שבה אנו חושבים, שמים את הנחות היסוד שלנו קודם כל ואחר כך את המסקנה שלנו. זו אולי הדרך הטבעית לפתח מחשבות, אבל אנחנו מסיימים עם משפט הנושא בסוף הפסקה. הזז אותו לפנים ואפשר למשתמשים לדעת לאן אתה הולך. אל תגרמו לקוראים להחזיק הרבה מידע בראש לפני שהם מגיעים לנקודה. -מקור: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## בחר את המילים שלך בקפידה @@ -65,7 +65,7 @@ Privacy Guides כתובים באנגלית אמריקאית, וכדאי לעיי > מילים מיותרות מבזבזות את הזמן של הקהל שלך. כתיבה נהדרת היא כמו שיחה. השמט מידע שהקהל לא צריך לדעת. זה יכול להיות קשה כמומחה לנושא ולכן חשוב שמישהו יסתכל על המידע מנקודת המבט של הקהל. -מקור: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## שמור על שיחות טקסט @@ -77,7 +77,7 @@ Privacy Guides כתובים באנגלית אמריקאית, וכדאי לעיי > קול פעיל מבהיר מי אמור לעשות מה. זה מבטל אי בהירות לגבי אחריות. לא "זה חייב להיעשות", אלא "אתה חייב לעשות את זה." -מקור: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### השתמש ב"חייב" לדרישות diff --git a/i18n/he/mobile-browsers.md b/i18n/he/mobile-browsers.md index bb391d2a..beebd75e 100644 --- a/i18n/he/mobile-browsers.md +++ b/i18n/he/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,22 +41,22 @@ schema: ## אנדרואיד -באנדרואיד, פיירפוקס עדיין פחות מאובטח מאלטרנטיבות מבוססות Chromium: המנוע של מוזילה, [GeckoView](https://mozilla.github.io/geckoview/), עדיין לא תמך [בבידוד אתרים](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) או איפשר את [תהליך מבודד](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave
-![Brave לוגו](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**דפדפן Brave** כולל חוסם תוכן מובנה ו [תכונות פרטיות ]( https://brave.com/privacy-features/), רבים מהם מופעלים כברירת מחדל. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave בנוי על פרויקט דפדפן Chromium, כך שהוא אמור להרגיש מוכר ושיהיו לו בעיות תאימות מינימליות לאתר. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ Brave בנוי על פרויקט דפדפן Chromium, כך שהוא אמור ל ##### Shields -Brave כולל כמה אמצעים נגד טביעת אצבע בתכונת [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) שלו. אנו מציעים להגדיר את האפשרויות האלה [גלובלי](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) בכל הדפים שבהם אתה מבקר. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### ברירות מחדל גלובליות של Brave Shield @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. אפשרות זו מספקת פונקציונליות דומה ל [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) המתקדמים של uBlock Origin או ל [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### IPFS @@ -115,13 +115,13 @@ Brave allows you to select additional content filters within the internal `brave
--[x] בחר ** השבת UDP לא פרוקסי ** תחת [WebRTC IP מדיניות טיפול](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) -- [] בטל את הסימון ** אפשר לאתרים לבדוק אם יש לך שיטות תשלום שנשמרו ** -- [] בטל את הסימון ** שער IPFS ** (1) -- [x] בחר ** סגור כרטיסיות ביציאה ** -- [] בטל את הסימון ** אפשר ניתוח מוצרים לשמר פרטיות (P3A) ** -- [] בטל את הסימון ** שלח באופן אוטומטי דוחות אבחון ** -- [] בטל את הסימון ** שלח אוטומטית פינג שימוש יומיומי לאמיץ ** +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Allow sites to check if you have payment methods saved** +- [ ] Uncheck **IPFS Gateway** (1) +- [x] Select **Close tabs on exit** +- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** +- [ ] Uncheck **Automatically send diagnostic reports** +- [ ] Uncheck **Automatically send daily usage ping to Brave**
@@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### סנכרון Brave -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) מאפשר לנתוני הגלישה שלך (היסטוריה, סימניות וכו ') להיות נגישים בכל המכשירים שלך ללא צורך בחשבון ומגן עליהם באמצעות E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,11 +141,11 @@ Brave allows you to select additional content filters within the internal `brave ![Safari לוגו](assets/img/browsers/safari.svg){ align=right } -**Safari** הוא דפדפן ברירת המחדל ב - iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** הוא דפדפן ברירת המחדל ב - iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: דף הבית](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=תיעוד} +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ The **Advanced Tracking and Fingerprinting Protection** setting will randomize c - [ ] השבת **פרטיות שמירה על מדידת מודעות** -מדידת קליקים על מודעה השתמשה באופן מסורתי בטכנולוגיית מעקב הפוגעת בפרטיות המשתמש. [מדידת קליקים פרטית](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) היא תכונה של WebKit ותקן אינטרנט מוצע שמטרתו לאפשר למפרסמים למדוד האפקטיביות של מסעות פרסום באינטרנט מבלי להתפשר על פרטיות המשתמש. +מדידת קליקים על מודעה השתמשה באופן מסורתי בטכנולוגיית מעקב הפוגעת בפרטיות המשתמש. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. לתכונה יש מעט חששות פרטיות בפני עצמה, כך שבעוד שאתה יכול לבחור להשאיר אותה פועלת, אנו רואים בעובדה שהיא מושבתת אוטומטית בגלישה פרטית כאינדיקטור להשבית התכונה. @@ -201,9 +201,9 @@ The **Advanced Tracking and Fingerprinting Protection** setting will randomize c ##### iCloud Sync -סנכרון של היסטוריית ספארי, קבוצות כרטיסיות, כרטיסיות iCloud וסיסמאות שמורות הם E2EE. עם זאת, כברירת מחדל, סימניות [לא](https://support.apple.com/en-us/HT202303). Apple יכולה לפענח ולגשת אליהם בהתאם ל[מדיניות הפרטיות](https://www.apple.com/legal/privacy/en-ww/) שלהם. +סנכרון של היסטוריית ספארי, קבוצות כרטיסיות, כרטיסיות iCloud וסיסמאות שמורות הם E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -אתה יכול להפעיל את E2EE עבור הסימניות וההורדות שלך ב-Safari על ידי הפעלת [הגנה על נתונים מתקדמת](https://support.apple.com/en-us/HT212520). עבור אל **שם Apple ID שלך ← iCloud ← הגנת נתונים מתקדמת**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). עבור אל **שם Apple ID שלך ← iCloud ← הגנת נתונים מתקדמת**. - [x] הפעל **הגנת נתונים מתקדמת** @@ -227,7 +227,7 @@ The **Advanced Tracking and Fingerprinting Protection** setting will randomize c
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/he/multi-factor-authentication.md b/i18n/he/multi-factor-authentication.md index 820d256f..c5df1da5 100644 --- a/i18n/he/multi-factor-authentication.md +++ b/i18n/he/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -**YubiKeys** הם בין מפתחות האבטחה הפופולריים ביותר. לחלק מדגמי YubiKey יש מגוון רחב של תכונות כגון: [גורם שני אוניברסלי (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 ו-WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [אימות זהות אישית (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/),[TOTP ו HOTP](https://developers.yubico.com/OATH). +**YubiKeys** הם בין מפתחות האבטחה הפופולריים ביותר. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -אחד היתרונות של YubiKey הוא שמפתח אחד יכול לעשות כמעט הכל (YubiKey 5), שאפשר לצפות ממפתח אבטחת חומרה. אנו ממליצים לך לקחת את [חידון](https://www.yubico.com/quiz/) לפני הרכישה כדי לוודא שאתה עושה את הבחירה הנכונה. +אחד היתרונות של YubiKey הוא שמפתח אחד יכול לעשות כמעט הכל (YubiKey 5), שאפשר לצפות ממפתח אבטחת חומרה. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: דף הבית](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=תיעוד} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-[טבלת ההשוואה](https://www.yubico.com/store/compare/) מציגה את התכונות ואת אופן ההשוואה של YubiKeys. אנו ממליצים בחום לבחור במפתחות מסדרת YubiKey 5. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. אנו ממליצים בחום לבחור במפתחות מסדרת YubiKey 5. -ניתן לתכנת את [YubiKey מנהל](https://www.yubico.com/support/download/yubikey-manager/) או [YubiKey כלי התאמה אישית](https://www.yubico.com/support/download/yubikey-personalization-tools/). לניהול קודי TOTP, תוכל להשתמש ב - [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). כל הלקוחות של Yubico הם קוד פתוח. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). כל הלקוחות של Yubico הם קוד פתוח. עבור דגמים התומכים ב - HOTP וב - TOTP, ישנם 2 חריצים בממשק ה - OTP שניתן להשתמש בהם עבור HOTP ו -32 חריצים לאחסון סודות TOTP. סודות אלה מאוחסנים מוצפנים על המפתח ואף פעם לא לחשוף אותם למכשירים הם מחוברים. ברגע שזרע (סוד משותף) ניתן למאמת Yubico, הוא ייתן רק את הקודים בני שש הספרות, אך לעולם לא את הזרע. מודל אבטחה זה עוזר להגביל את מה שתוקף יכול לעשות אם הוא מסכן את אחד המכשירים המריצים את המאמת של Yubico והופך את ה - YubiKey לעמיד בפני תוקף פיזי. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. אם אתה ר **ל - Nitrokey** יש מפתח אבטחה המסוגל ל- [FIDO2 ו- WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) בשם **Nitrokey FIDO2**. לתמיכה ב-PGP, עליך לרכוש אחד מהמפתחות האחרים שלהם כגון **Nitrokey Start**, **Nitrokey Pro 2** או **Nitrokey Storage 2**. -[:octicons-home-16: דף הבית](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=תיעוד} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation} -[טבלת ההשוואה](https://www.nitrokey.com/#comparison) מציגה את התכונות ואת ההשוואה בין דגמי Nitrokey. ל**Nitrokey 3** המופיע ברשימה תהיה ערכת תכונות משולבת. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. ל**Nitrokey 3** המופיע ברשימה תהיה ערכת תכונות משולבת. -ניתן להגדיר דגמי Nitrokey באמצעות [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). עבור הדגמים התומכים ב - HOTP וב - TOTP, ישנם 3 חריצים עבור HOTP ו -15 עבור TOTP. Nitrokeys מסוימים יכולים לשמש כמנהל סיסמאות. הם יכולים לאחסן 16 אישורים שונים ולהצפין אותם באמצעות אותה סיסמה כמו ממשק OpenPGP. @@ -74,7 +74,7 @@ The firmware of YubiKey is not open source and is not updatable. אם אתה ר -ה-Nitrokey Pro 2, Nitrokey Storage 2 וה-Nitrokey 3 הקרובים תומכים באימות שלמות המערכת עבור מחשבים ניידים עם קושחת [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/). +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. הקושחה של Nitrokey היא קוד פתוח, שלא כמו YubiKey. הקושחה בדגמי NitroKey המודרניים (למעט ה**NitroKey Pro 2**) ניתנת לעדכון. @@ -127,7 +127,7 @@ The firmware of YubiKey is not open source and is not updatable. אם אתה ר Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ The firmware of YubiKey is not open source and is not updatable. אם אתה ר [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/he/news-aggregators.md b/i18n/he/news-aggregators.md index 189fc963..42aaebc6 100644 --- a/i18n/he/news-aggregators.md +++ b/i18n/he/news-aggregators.md @@ -21,7 +21,7 @@ cover: news-aggregators.webp [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ cover: news-aggregators.webp [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ cover: news-aggregators.webp **NetNewsWire** קורא עדכונים חינמי וקוד פתוח עבור macOS ו-iOS עם התמקדות בעיצוב ותכונות מקוריות. הוא תומך בפורמטי ההזנה האופייניים לצד תמיכה מובנית בפיד טוויטר ו-Reddit. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit מאפשר לך להירשם ל subreddits באמצעות RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ https://www.reddit.com/r/[SUBREDDIT]/new/.rss כדי להירשם לערוץ יוטיוב עם לקוח RSS, חפש תחילה את [קוד הערוץ] שלו (https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/he/notebooks.md b/i18n/he/notebooks.md index 1fd74811..fb9d575c 100644 --- a/i18n/he/notebooks.md +++ b/i18n/he/notebooks.md @@ -34,7 +34,7 @@ cover: notebooks.webp - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ cover: notebooks.webp ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. הוא כולל הצפנה מקצה לקצה בכל הפלטפורמות עם סנכרון רב עוצמה כדי לרשום את ההערות שלך תוך כדי תנועה. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. הוא כולל הצפנה מקצה לקצה בכל הפלטפורמות עם סנכרון רב עוצמה כדי לרשום את ההערות שלך תוך כדי תנועה. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ cover: notebooks.webp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** הוא יישום חינמי, קוד פתוח ומלא תכונות לרישום הערות ומשימות שיכול להתמודד עם מספר רב של הערות סימון מאורגנים במחברות ותגים. הוא מציע E2EE ויכול לסנכרן דרך Nextcloud, Dropbox ועוד. הוא מציע גם ייבוא קל מ-Evernote והערות בטקסט רגיל. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -135,9 +135,9 @@ Cryptee מציע 100MB של אחסון בחינם, עם אפשרויות בתש
-![Org-mode לוגו](assets/img/notebooks/org-mode.svg){ align=right } +![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**מצב ארגוני** הוא [מצב ראשי](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) עבור גנו Emacs. מצב ארגוני מיועד לשמירת הערות, שמירה על רשימות מטלות, תכנון פרויקטים וכתיבת מסמכים עם מערכת טקסט רגיל מהירה ויעילה. סינכרון אפשרי באמצעות הכלי [file synchronization](file-sharing.md#file-sync). +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. מצב ארגוני מיועד לשמירת הערות, שמירה על רשימות מטלות, תכנון פרויקטים וכתיבת מסמכים עם מערכת טקסט רגיל מהירה ויעילה. סינכרון אפשרי באמצעות הכלי [file synchronization](file-sharing.md#file-sync). [:octicons-home-16: דף הבית](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=תיעוד} diff --git a/i18n/he/os/android-overview.md b/i18n/he/os/android-overview.md index 638119d2..a3a45fec 100644 --- a/i18n/he/os/android-overview.md +++ b/i18n/he/os/android-overview.md @@ -60,7 +60,7 @@ AFWall+ פועל על בסיס גישת [סינון חבילות](https://en.wik עדכוני קושחה הם קריטיים לשמירה על האבטחה ובלעדיהם המכשיר שלך לא יכול להיות מאובטח. ליצרני ציוד מקורי יש הסכמי תמיכה עם השותפים שלהם כדי לספק את רכיבי הקוד הסגור לתקופת תמיכה מוגבלת. אלה מפורטים ב[עלוני האבטחה של אנדרואיד](https://source.android.com/security/bulletin) החודשיים. -מכיוון שרכיבי הטלפון, כגון טכנולוגיות המעבד והרדיו, מסתמכים על רכיבי קוד סגור, העדכונים חייבים להיות מסופקים על ידי היצרנים המתאימים. לכן, חשוב שתרכוש מכשיר בתוך מחזור תמיכה פעיל. [קוואלקום](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) ו[סמסונג](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) תומכות במכשירים שלהן במשך 4 שנים, בעוד שלמוצרים זולים יותר יש לרוב מחזורי תמיכה קצרים יותר. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +מכיוון שרכיבי הטלפון, כגון טכנולוגיות המעבד והרדיו, מסתמכים על רכיבי קוד סגור, העדכונים חייבים להיות מסופקים על ידי היצרנים המתאימים. לכן, חשוב שתרכוש מכשיר בתוך מחזור תמיכה פעיל. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. מכשירי EOL שאינם נתמכים עוד על ידי יצרן ה-SoC אינם יכולים לקבל עדכוני קושחה מספקי OEM או מפיצי אנדרואיד לאחר השוק. משמעות הדבר היא שבעיות אבטחה במכשירים אלה יישארו ללא תיקון. @@ -97,19 +97,19 @@ Fairphone, for example, markets their Fairphone 4 device as receiving 6 years of אפליקציה עשויה לבקש הרשאה עבור תכונה ספציפית שיש לה. לדוגמה, כל אפליקציה שיכולה לסרוק קודי QR תדרוש את אישור המצלמה. אפליקציות מסוימות יכולות לבקש יותר הרשאות ממה שהן צריכות. -[Exodus](https://exodus-privacy.eu.org/) יכול להיות שימושי כאשר משווים אפליקציות שיש להן מטרות דומות. אם אפליקציה דורשת הרבה הרשאות ויש לה הרבה פרסום וניתוח זה כנראה סימן רע. אנו ממליצים להסתכל על העוקבים הבודדים ולקרוא את התיאורים שלהם במקום פשוט **לספור את הסכום הכולל** ולהנחה שכל הפריטים הרשומים שווים. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. אם אפליקציה דורשת הרבה הרשאות ויש לה הרבה פרסום וניתוח זה כנראה סימן רע. אנו ממליצים להסתכל על העוקבים הבודדים ולקרוא את התיאורים שלהם במקום פשוט **לספור את הסכום הכולל** ולהנחה שכל הפריטים הרשומים שווים.

Warning

-אם אפליקציה היא ברובה שירות מבוסס אינטרנט, המעקב עשוי להתרחש בצד השרת. [פייסבוק](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) מציג "ללא עוקבים" אבל בהחלט עוקב אחר תחומי העניין וההתנהגות של המשתמשים ברחבי האתר. אפליקציות עשויות להתחמק מזיהוי על ידי אי שימוש בספריות קוד סטנדרטיות המיוצרות על ידי תעשיית הפרסום, אם כי זה לא סביר. +אם אפליקציה היא ברובה שירות מבוסס אינטרנט, המעקב עשוי להתרחש בצד השרת. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. אפליקציות עשויות להתחמק מזיהוי על ידי אי שימוש בספריות קוד סטנדרטיות המיוצרות על ידי תעשיית הפרסום, אם כי זה לא סביר.

Note

-אפליקציות ידידותיות לפרטיות כגון [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) עשויות להציג עוקבים מסוימים כגון [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). ספרייה זו כוללת את [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) שיכולה לספק [הודעות דחיפה](https://en.wikipedia.org/wiki/Push_technology) באפליקציות. זה [המקרה](https://fosstodon.org/@bitwarden/109636825700482007) עם Bitwarden. זה לא אומר ש-Bitwarden משתמש בכל תכונות הניתוח שמסופקות על ידי Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). ספרייה זו כוללת את [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) שיכולה לספק [הודעות דחיפה](https://en.wikipedia.org/wiki/Push_technology) באפליקציות. זה [המקרה](https://fosstodon.org/@bitwarden/109636825700482007) עם Bitwarden. זה לא אומר ש-Bitwarden משתמש בכל תכונות הניתוח שמסופקות על ידי Google Firebase Analytics.
@@ -145,20 +145,20 @@ Android 7 and above supports a VPN kill switch, and it is available without the ### תוכנית הגנה מתקדמת -אם יש לך חשבון Google, אנו מציעים להירשם ל[תוכנית ההגנה המתקדמת](https://landing.google.com/advancedprotection/). הוא זמין ללא עלות לכל מי שיש לו שני מפתחות אבטחה חומרה או יותר עם תמיכה ב-[FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online). +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). הוא זמין ללא עלות לכל מי שיש לו שני מפתחות אבטחה חומרה או יותר עם תמיכה ב-[FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online). תוכנית ההגנה המתקדמת מספקת ניטור איומים משופר ומאפשרת: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - רק גוגל ואפליקציות צד שלישי מאומתות יכולות לגשת לנתוני החשבון - סריקה של הודעות אימייל נכנסות בחשבונות Gmail עבור ניסיונות [דיוג](https://en.wikipedia.org/wiki/Phishing#Email_phishing) -- [סריקת דפדפן בטוחה](https://www.google.com/chrome/privacy/whitepaper.html#malware) מחמירה יותר עם Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - תהליך שחזור מחמיר עבור חשבונות עם אישורים שאבדו - אם אתה משתמש בשירותי Google Play שאינם בארגז חול (נפוצים במערכות הפעלה במלאי), תוכנית ההגנה המתקדמת מגיעה גם עם [הטבות נוספות](https://support.google.com/accounts/answer/9764949?hl=en) כגון: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- סריקת מכשיר אוטומטי חובה עם [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - מזהיר אותך לגבי יישומים לא מאומתים ### עדכוני מערכת Google Play @@ -169,7 +169,7 @@ Android 7 and above supports a VPN kill switch, and it is available without the ### מזהה פרסום -כל המכשירים עם שירותי Google Play מותקנים באופן אוטומטי מייצרים [מזהה פרסום](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) המשמש לפרסום ממוקד. השבת תכונה זו כדי להגביל את הנתונים שנאספו עליך. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. השבת תכונה זו כדי להגביל את הנתונים שנאספו עליך. בהפצות אנדרואיד עם [Google Play בארגז חול](https://grapheneos.org/usage#sandboxed-google-play), עבור אל :gear: **הגדרות** ← **אפליקציות** ← **Google Play בארגז חול** ← **הגדרות גוגל** ← **מודעות**, ותבחר *מחק מזהה פרסום*. diff --git a/i18n/he/os/ios-overview.md b/i18n/he/os/ios-overview.md index b1813837..62e1a129 100644 --- a/i18n/he/os/ios-overview.md +++ b/i18n/he/os/ios-overview.md @@ -22,7 +22,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. ### טלמטריה פולשנית -לאפל היו בעבר בעיות עם אנונימיזציה נכונה של הטלמטריה שלהם ב-iOS. [בשנת 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), אפל נמצאה משדרת הקלטות Siri - חלקן מכילות מידע סודי ביותר - לשרתים שלהן לבדיקה ידנית על ידי קבלני צד שלישי. בזמן שהם הפסיקו זמנית את התוכנית הזו אחרי האימון הזה היה [דיווח נרחב על](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), הבעיה לא נפתרה לחלוטין [עד 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +לאפל היו בעבר בעיות עם אנונימיזציה נכונה של הטלמטריה שלהם ב-iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). לאחרונה, נמצאה שאפל [משדרת ניתוח נתונים גם כאשר שיתוף הניתוח מושבת ](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) ב-iOS, והנתונים האלה [נראה](https://twitter.com/mysk_co/status/1594515229915979776) מקושרים בקלות למזהים ייחודיים של חשבון iCloud למרות שהם כביכול אנונימיים. @@ -54,7 +54,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. #### מצא את שלי - Find My -**Find My** הוא שירות המאפשר לך לעקוב אחר מכשירי ה אפל שלך ולשתף את המיקום שלך עם חברים ובני משפחה. הוא גם מאפשר לך למחוק את המכשיר שלך מרחוק במקרה שהוא נגנב, ומונע מגנב לגשת לנתונים שלך. ה Find My שלך [נתוני המיקום הם E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) כאשר: +**Find My** הוא שירות המאפשר לך לעקוב אחר מכשירי ה אפל שלך ולשתף את המיקום שלך עם חברים ובני משפחה. הוא גם מאפשר לך למחוק את המכשיר שלך מרחוק במקרה שהוא נגנב, ומונע מגנב לגשת לנתונים שלך. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - המיקום משותף עם בן משפחה או חבר, ושניכם משתמשים ב - iOS 15 או יותר. - המכשיר שלך לא מחובר וממוקם על ידי 'מצא את הרשת שלי '. @@ -117,7 +117,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. הגדרת סיסמה חזקה בטלפון שלך היא הצעד החשוב ביותר שאתה יכול לנקוט לאבטחת המכשיר הפיזי. תצטרך לעשות כאן פשרה בין אבטחה לנוחות: סיסמה ארוכה יותר תהיה מעצבנת להזין בכל פעם, אבל סיסמה קצרה יותר או PIN יהיה קל יותר לנחש. הגדרת Face ID או Touch ID יחד עם סיסמה חזקה יכולה להיות פשרה טובה בין שימושיות ואבטחה. -בחר **הפעל קוד גישה** או **שנה קוד גישה** > **אפשרויות קוד סיסמה** > **קוד אלפאנומרי מותאם אישית**. ודא שאתה יוצר [סיסמה מאובטחת](https://www.privacyguides.org/basics/passwords-overview/). +בחר **הפעל קוד גישה** או **שנה קוד גישה** > **אפשרויות קוד סיסמה** > **קוד אלפאנומרי מותאם אישית**. Make sure that you create a [secure password](../basics/passwords-overview.md). אם ברצונך להשתמש ב-Face ID או Touch ID, תוכל להמשיך ולהגדיר זאת כעת. הטלפון שלך ישתמש בסיסמה שהגדרת קודם לכן כחלופה למקרה שהאימות הביומטרי שלך ייכשל. שיטות פתיחה ביומטריות הן בעיקר נוחות, אם כי הן עוצרות מצלמות מעקב או אנשים מעבר לכתף שלך מלצפות בך מזין את קוד הסיסמה שלך. @@ -129,7 +129,7 @@ description: iOS is a mobile operating system developed by Apple for the iPhone. - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **אפשר גישה כאשר הוא נעול** נותן לך אפשרויות למה שאתה יכול לאפשר כשהטלפון שלך נעול. ככל שתבטל יותר מהאפשרויות האלה, כך מישהו ללא הסיסמה שלך יכול לעשות פחות, אבל זה יהיה פחות נוח עבורך. תברר ובחר לאילו מבין אלה אינך רוצה שלמישהו תהיה גישה אם הוא ישים את ידו על הטלפון שלך. @@ -187,7 +187,7 @@ After enabling stolen data protection, [certain actions](https://support.apple.c - [x] בחר **הפעל דוח פרטיות של אפליקציה** -[מצב נעילה](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) הוא הגדרת אבטחה שתוכל להפעיל כדי להפוך את הטלפון שלך עמיד יותר בפני התקפות. שים לב שאפליקציות ותכונות מסוימות [לא יפעלו](https://support.apple.com/en-us/HT212650) כפי שהם פועלים בדרך כלל. +[מצב נעילה](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) הוא הגדרת אבטחה שתוכל להפעיל כדי להפוך את הטלפון שלך עמיד יותר בפני התקפות. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] בחר **הפעל מצב נעילה** diff --git a/i18n/he/os/linux-overview.md b/i18n/he/os/linux-overview.md index 10e24da7..952f61ce 100644 --- a/i18n/he/os/linux-overview.md +++ b/i18n/he/os/linux-overview.md @@ -15,12 +15,12 @@ description: לינוקס היא חלופה למערכת הפעלה שולחני יש כמה חששות בולטים של פרטיות עם לינוקס שכדאי להיות מודעים אליהם. למרות החסרונות הללו, הפצות לינוקס לשולחן העבודה עדיין נהדרות עבור רוב האנשים שרוצים: - הימנע מטלמטריה שמגיעה לרוב עם מערכות הפעלה קנייניות -- לשמור על [חופש תוכנה](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- השתמש במערכות ממוקדות פרטיות כגון [Whonix](https://www.whonix.org) או [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -זוהי [תפיסה שגויה נפוצה](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) שלינוקס ותוכנות קוד פתוח אחרות מאובטחות מטבען פשוט בגלל שקוד המקור זמין. יש ציפייה שאימות קהילה מתרחש באופן קבוע, אבל זה לא תמיד [המקרה](https://seirdy.one/posts/2022/02/02/floss-security/). +זוהי [תפיסה שגויה נפוצה](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) שלינוקס ותוכנות קוד פתוח אחרות מאובטחות מטבען פשוט בגלל שקוד המקור זמין. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). במציאות, אבטחת הפצה תלויה במספר גורמים, כגון פעילות הפרויקט, חווית מפתח, רמת הקפדנות המופעלת על ביקורות קוד, וכמה פעמים ניתנת תשומת לב לחלקים ספציפיים של בסיס הקוד שעלולים להישאר ללא נגיעה במשך שנים. @@ -30,9 +30,9 @@ description: לינוקס היא חלופה למערכת הפעלה שולחני - **אתחול מאומת** בלינוקס אינו חזק כמו חלופות כגון [אתחול מאובטח של אפל](https://support.apple.com/guide/security/secac71d5623/web) או [אתחול מאומת](https://source.android.com/security/verifiedboot) של אנדרואיד. אתחול מאומת מונע התעסקות מתמשכת על ידי תוכנות זדוניות ו[התקפות עוזרות מרושעות](https://en.wikipedia.org/wiki/Evil_Maid_attack), אך הוא עדיין ברובו [לא זמין אפילו בהפצות המתקדמות ביותר](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **ארגז חול חזק** עבור אפליקציות בלינוקס חסר מאוד, אפילו עם אפליקציות מכולות כמו Flatpaks או פתרונות ארגז חול כמו Firejail. Flatpak היא כלי השירות המבטיח ביותר לארגזי חול עבור לינוקס עד כה, אך עדיין חסרה בתחומים רבים ומאפשרת [ברירות מחדל לא בטוחות](https://flatkill.org/2020/) המאפשרות לרוב האפליקציות לעקוף באופן טריוויאלי את ארגז החול שלהם. +- **ארגז חול חזק** עבור אפליקציות בלינוקס חסר מאוד, אפילו עם אפליקציות מכולות כמו Flatpaks או פתרונות ארגז חול כמו Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -בנוסף, לינוקס מפגרת בהטמעת [הפחתות ניצול](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) אשר כעת סטנדרטיות במערכות הפעלה אחרות, כגון Code Guard שרירותי ב-Windows או Hardened Runtime ב-macOS. כמו כן, רוב תוכניות הלינוקס ולינוקס עצמה מקודדות בשפות שאינן בטוחות בזיכרון. באגים של שחיתות זיכרון אחראים ל[רוב הפגיעויות](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) תיקנו והוקצו CVE. למרות שזה נכון גם עבור Windows ו-macOS, הם מתקדמים במהירות באימוץ שפות בטוחות לזיכרון - כמו Rust ו- Swift, בהתאמה - בעוד שאין מאמץ דומה לשכתב את לינוקס בשפה בטוחה לזיכרון כמו Rust. +בנוסף, לינוקס מפגרת בהטמעת [הפחתות ניצול](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) אשר כעת סטנדרטיות במערכות הפעלה אחרות, כגון Code Guard שרירותי ב-Windows או Hardened Runtime ב-macOS. כמו כן, רוב תוכניות הלינוקס ולינוקס עצמה מקודדות בשפות שאינן בטוחות בזיכרון. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. למרות שזה נכון גם עבור Windows ו-macOS, הם מתקדמים במהירות באימוץ שפות בטוחות לזיכרון - כמו Rust ו- Swift, בהתאמה - בעוד שאין מאמץ דומה לשכתב את לינוקס בשפה בטוחה לזיכרון כמו Rust. ## בחירת ההפצה שלך @@ -42,9 +42,9 @@ description: לינוקס היא חלופה למערכת הפעלה שולחני אנו ממליצים בחום לבחור בהפצות שנשארות קרובות למהדורות התוכנה היציבות במעלה הזרם, המכונה לעתים קרובות הפצות מהדורות מתגלגלות. הסיבה לכך היא שהפצות מחזור שחרור קפוא לרוב אינן מעדכנות גרסאות חבילה ונגררות לפי עדכוני אבטחה. -עבור הפצות קפואות כגון [Debian](https://www.debian.org/security/faq#handling), מתחזקים חבילות צפויים לבצע אחורה תיקונים כדי לתקן נקודות תורפה במקום להקפיץ את התוכנה ל- "הגרסה הבאה" שפורסמה על ידי המפתח במעלה הזרם. חלק מתיקוני האבטחה [לא](https://arxiv.org/abs/2105.14565) מקבלים [מזהה CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (במיוחד תוכנה פחות פופולרית) כלל ולכן אינם נכנסים להפצה עם מודל התיקון הזה. כתוצאה מכך תיקוני אבטחה קלים מתעכבים לפעמים עד לגרסה הגדולה הבאה. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. חלק מתיקוני האבטחה [לא](https://arxiv.org/abs/2105.14565) מקבלים [מזהה CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (במיוחד תוכנה פחות פופולרית) כלל ולכן אינם נכנסים להפצה עם מודל התיקון הזה. כתוצאה מכך תיקוני אבטחה קלים מתעכבים לפעמים עד לגרסה הגדולה הבאה. -אנחנו לא מאמינים שהחזקת חבילות והחלת תיקוני ביניים הם רעיון טוב, מכיוון שהוא שונה מהדרך שבה המפתח התכוון שהתוכנה תעבוד. ל [Richard Brown](https://rootco.de/aboutme/) יש מצגת על נושא זה: +אנחנו לא מאמינים שהחזקת חבילות והחלת תיקוני ביניים הם רעיון טוב, מכיוון שהוא שונה מהדרך שבה המפתח התכוון שהתוכנה תעבוד. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ The Atomic update method is used for [distributions](../desktop.md#atomic-distri עבור מערכת מאובטחת, מצפים ממך גם שיהיה לך מספיק ידע בלינוקס כדי להגדיר כראוי אבטחה עבור המערכת שלהם, כגון אימוץ מערכת [בקרת כניסה חובה](https://en.wikipedia.org/wiki/Mandatory_access_control), הגדרת רשימות שחורות של [מודול ליבה](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) רשימות שחורות, הקשחת פרמטרי אתחול, מניפולציה של [סיסקטל](https://en.wikipedia.org/wiki/Sysctl) פרמטרים, ולדעת אילו רכיבים הם צריכים כמו [Polkit](https://en.wikipedia.org/wiki/Polkit). -כל מי שמשתמש ב[Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **חייב** להרגיש בנוח ביקורת PKGBUILD שהם מורידים מהשירות הזה. חבילות AUR הן תוכן המיוצר בקהילה ואינן נבדקות בשום צורה, ולכן הן פגיעות להתקפות שרשרת אספקת תוכנה, [מה שקרה למעשה](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +כל מי שמשתמש ב[Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **חייב** להרגיש בנוח ביקורת PKGBUILD שהם מורידים מהשירות הזה. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). תמיד יש להשתמש ב-AUR במשורה, ולעתים קרובות יש הרבה עצות רעות בדפים שונים שמפנים אנשים להשתמש באופן עיוור ב[עוזרים של AUR](https://wiki.archlinux.org/title/AUR_helpers) ללא אזהרה מספקת. אזהרות דומות חלות על שימוש בארכיון חבילות אישיות של צד שלישי (PPA) בהפצות מבוססות דביאן או בפרויקטים קהילתיים (COPR) בפדורה. @@ -83,11 +83,11 @@ The Atomic update method is used for [distributions](../desktop.md#atomic-distri בנוסף, אנו ממליצים על **נגד** שתי נגזרות Arch אלו במיוחד: - **Manjaro**: הפצה זו מעכבת חבילות למשך שבועיים כדי לוודא שהשינויים שלהן לא יישברו, לא כדי לוודא שהמעלה הזרם יציב. כאשר נעשה שימוש בחבילות AUR, הן בנויות לרוב על פי [ספריות](https://en.wikipedia.org/wiki/Library_(computing)) העדכניות ביותר מהמאגרים של Arch. -- **Garuda**: הם משתמשים ב[Chaotic-AUR](https://aur.chaotic.cx/) אשר מרכיב באופן אוטומטי ועיוור חבילות מה- AUR. אין תהליך אימות כדי לוודא שחבילות AUR אינן סובלות מהתקפות שרשרת האספקה. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. אין תהליך אימות כדי לוודא שחבילות AUR אינן סובלות מהתקפות שרשרת האספקה. ### הפצות ליבה של לינוקס ו-"Libre" -אנו ממליצים **נגד** להשתמש בליבת Linux-libre, מכיוון שהיא [מסירה אמצעי אבטחה](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) ו[מדכא אזהרות ליבה](https://news.ycombinator.com/item?id=29674846) לגבי מיקרוקוד פגיע. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## המלצות כלליות @@ -95,7 +95,7 @@ The Atomic update method is used for [distributions](../desktop.md#atomic-distri לרוב ההפצות של לינוקס יש אפשרות בתוך תוכנית ההתקנה שלה להפעלת [LUKS](../encryption.md#linux-unified-key-setup) FDE. אם אפשרות זו לא מוגדרת בזמן ההתקנה, תצטרך לגבות את הנתונים שלך ולהתקין מחדש, מכיוון שההצפנה מוחלת לאחר [חלוקת דיסקים ](https://en.wikipedia.org/wiki/Disk_partitioning), אבל לפני ש[מערכות הקבצים](https://en.wikipedia.org/wiki/File_system) מתעצבות. אנו מציעים גם למחוק בצורה מאובטחת את מכשיר האחסון שלך: -- [מחיקת נתונים מאובטחת :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [מחיקת נתונים מאובטחת :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### החלף @@ -105,15 +105,15 @@ The Atomic update method is used for [distributions](../desktop.md#atomic-distri ### Wayland -אנו ממליצים להשתמש בסביבת שולחן עבודה התומכת בפרוטוקול התצוגה [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)), שכן הוא פותח עם האבטחה [לזכור](https://lwn.net/Articles/589147/). קודמו ([X11](https://en.wikipedia.org/wiki/X_Window_System)) אינו תומך בבידוד GUI, המאפשר לכל חלון [תיעדו, רשמו והזריקו קלט בחלונות אחרים](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), מה שהופך כל ניסיון לארגז חול חסר תועלת. אמנם יש אפשרויות לעשות X11 מקונן כגון [Xpra](https://en.wikipedia.org/wiki/Xpra) או [Xephyr](https://en.wikipedia.org/wiki/Xephyr), לעתים קרובות הם מגיעים עם השלכות ביצועים שליליות, ואינם נוחים להגדרה ואינם עדיפים על פני Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). קודמו ([X11](https://en.wikipedia.org/wiki/X_Window_System)) אינו תומך בבידוד GUI, המאפשר לכל חלון [תיעדו, רשמו והזריקו קלט בחלונות אחרים](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), מה שהופך כל ניסיון לארגז חול חסר תועלת. אמנם יש אפשרויות לעשות X11 מקונן כגון [Xpra](https://en.wikipedia.org/wiki/Xpra) או [Xephyr](https://en.wikipedia.org/wiki/Xephyr), לעתים קרובות הם מגיעים עם השלכות ביצועים שליליות, ואינם נוחים להגדרה ואינם עדיפים על פני Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). חלק מההפצות כמו Fedora ו- Tumbleweed משתמשות בו כברירת מחדל, וחלק אחרות עשויות לעשות זאת בעתיד מכיוון ש-X11 נמצא ב[מצב תחזוקה קשה](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). אם אתה משתמש באחת מהסביבות האלה זה קל כמו לבחור את הפגישה "Wayland" במנהל התצוגה של שולחן העבודה ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). אם אתה משתמש באחת מהסביבות האלה זה קל כמו לבחור את הפגישה "Wayland" במנהל התצוגה של שולחן העבודה ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). אנו ממליצים **נגד** להשתמש בסביבות שולחן עבודה או במנהלי חלונות שאין להם תמיכה ב-Wayland, כגון Cinnamon (ברירת מחדל ב-Linux Mint), Pantheon (ברירת מחדל במערכת ההפעלה היסודית), MATE, Xfce, ו-i3. ### קושחה קניינית (עדכוני מיקרוקוד) -חלק מההפצות של לינוקס (כגון [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre) מבוססות או הפצות עשה זאת בעצמך) אינן מגיעות עם קנייני [microcode](https://en.wikipedia.org/wiki/Microcode) עדכוני המתקן פרצות אבטחה קריטיות. כמה דוגמאות בולטות לפגיעויות אלה כוללות [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), ועוד [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +חלק מההפצות של לינוקס (כגון [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre) מבוססות או הפצות עשה זאת בעצמך) אינן מגיעות עם קנייני [microcode](https://en.wikipedia.org/wiki/Microcode) עדכוני המתקן פרצות אבטחה קריטיות. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). אנו **ממליצים בחום** להתקין עדכוני מיקרוקוד, מכיוון שהם מכילים תיקוני אבטחה חשובים עבור ה-CPU אשר לא ניתן להפחית באופן מלא בתוכנה בלבד. לפדורה ול-openSUSE יש את עדכוני המיקרוקוד כברירת מחדל. @@ -131,11 +131,11 @@ Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protoc הפצות רבות של לינוקס לשולחן העבודה (Fedora, openSUSE וכו') מגיעות עם [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) כדי להגדיר הגדרות Ethernet ו-Wi-Fi. -אפשר [לבצע באקראי](https://fedoramagazine.org/randomize-mac-address-nm/) את [כתובת MAC](https://en.wikipedia.org/wiki/MAC_address) בעת שימוש ב-NetworkManager. זה מספק קצת יותר פרטיות ברשתות Wi-Fi מכיוון שהוא מקשה על מעקב אחר מכשירים ספציפיים ברשת שאליה אתה מחובר. זה [**לא**](https://papers.mathyvanhoef.com/wisec2016.pdf) הופך אותך לאנונימי. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. זה מספק קצת יותר פרטיות ברשתות Wi-Fi מכיוון שהוא מקשה על מעקב אחר מכשירים ספציפיים ברשת שאליה אתה מחובר. זה [**לא**](https://papers.mathyvanhoef.com/wisec2016.pdf) הופך אותך לאנונימי. -אנו ממליצים לשנות את ההגדרה ל-**אקראי** במקום** יציב**, כפי שהוצע ב[מאמר](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -אם אתה משתמש ב [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), יהיה עליך להגדיר [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) אשר יאפשר [RFC 7844 (פרופילי אנונימיות עבור לקוחות DHCP)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). כתובות MAC אקראית מועילה בעיקר עבור חיבורי Wi-Fi. עבור חיבורי אינטרנט, כתובת אקראית של ה-MAC שלך מספקת תועלת מועטה (אם בכלל), מכיוון שמנהל רשת יכול לזהות את המכשיר שלך באופן טריוויאלי באמצעים אחרים (כגון בדיקת היציאה אליה אתה מחובר במתג הרשת). הקצאה אקראית של כתובות Wi-Fi MAC תלויה בתמיכה מהקושחה של ה-Wi-Fi. @@ -151,6 +151,6 @@ Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protoc פרויקט Fedora [סופר](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) כמה מערכות ייחודיות ניגשים למראות שלו באמצעות [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) משתנה במקום מזהה ייחודי. פדורה עושה זאת כדי לקבוע עומס והספקת שרתים טובים יותר עבור עדכונים במידת הצורך. -[אפשרות](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) זו כבויה כעת כברירת מחדל. אנו ממליצים להוסיף את `countme=false` ל-`/etc/dnf/dnf.conf` למקרה שהוא יופעל בעתיד. במערכות המשתמשות ב-`rpm-ostree` כגון Silverblue, אפשרות ה-countme מושבתת על ידי מיסוך של [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) טיימר. +[אפשרות](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) זו כבויה כעת כברירת מחדל. אנו ממליצים להוסיף את `countme=false` ל-`/etc/dnf/dnf.conf` למקרה שהוא יופעל בעתיד. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE משתמשת גם ב[מזהה ייחודי](https://en.opensuse.org/openSUSE:Statistics) כדי לספור מערכות, אותן ניתן להשבית על ידי מחיקת הקובץ `/var/lib/zypp/AnonymousUniqueId`. diff --git a/i18n/he/os/macos-overview.md b/i18n/he/os/macos-overview.md index a3d31ea4..eb205a14 100644 --- a/i18n/he/os/macos-overview.md +++ b/i18n/he/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** היא מערכת הפעלה Unix שפותחה על ידי אפל עבור מחשבי ה-Mac שלהם. כדי לשפר את הפרטיות ב-macOS, אתה יכול להשבית את תכונות הטלמטריה ולהקשיח את הגדרות הפרטיות והאבטחה הקיימות. -מחשבי Mac ו-Hackintosh ישנים יותר מבוססי אינטל אינם תומכים בכל תכונות האבטחה ש-macOS מציעה. כדי לשפר את אבטחת הנתונים, אנו ממליצים להשתמש ב-Mac חדש יותר עם [סיליקון של אפל](https://support.apple.com/en-us/HT211814). +מחשבי Mac ו-Hackintosh ישנים יותר מבוססי אינטל אינם תומכים בכל תכונות האבטחה ש-macOS מציעה. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## הערות פרטיות @@ -22,13 +22,13 @@ macOS מבצעת בדיקות מקוונות כאשר אתה פותח אפליק בעבר, בדיקות אלו בוצעו באמצעות פרוטוקול OCSP לא מוצפן שיכול היה להדליף מידע על האפליקציות שהרצת לרשת שלך. אפל שדרגה את שירות ה-OCSP שלה לשימוש בהצפנת HTTPS בשנת 2021, ו[פרסמה מידע](https://support.apple.com/HT202491) על מדיניות הרישום שלהם עבור שירות זה. בנוסף, הם הבטיחו להוסיף מנגנון שיאפשר לאנשים לבטל את הסכמתם לבדיקה המקוונת הזו, אך זה לא התווסף ל-macOS נכון ליולי 2023. -בעוד שאתה [יכול](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) לבטל את ההסכמה ידנית לבדיקה זו בקלות יחסית, אנו ממליצה שלא לעשות זאת אלא אם כן תיפגע בצורה חמורה על ידי בדיקות הביטול שבוצעו על ידי macOS, מכיוון שהן ממלאות תפקיד חשוב בהבטחת היישומים שנפרצו לחסום לפעול. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## תצורה מומלצת החשבון שלך כשתגדיר לראשונה את ה-Mac שלך יהיה חשבון Administrator, בעל הרשאות גבוהות יותר מאשר חשבון משתמש רגיל. ל-macOS יש מספר הגנות שמונעות מתוכנות זדוניות ותוכניות אחרות לנצל לרעה את הרשאות המנהל שלך, כך שבדרך כלל בטוח להשתמש בחשבון זה. -עם זאת, ניצול של כלי עזר מגן כמו `sudo` ה[תגלו בעבר](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). אם ברצונך להימנע מהאפשרות שתוכניות שאתה מפעיל מנצלות לרעה את הרשאות המנהל שלך, תוכל לשקול ליצור חשבון משתמש שני סטנדרטי שבו אתה משתמש לפעולות יומיומיות. יש לזה יתרון נוסף בכך שהוא הופך את זה לברור יותר כאשר אפליקציה צריכה גישת מנהל, מכיוון שהיא תבקש ממך אישורים בכל פעם. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). אם ברצונך להימנע מהאפשרות שתוכניות שאתה מפעיל מנצלות לרעה את הרשאות המנהל שלך, תוכל לשקול ליצור חשבון משתמש שני סטנדרטי שבו אתה משתמש לפעולות יומיומיות. יש לזה יתרון נוסף בכך שהוא הופך את זה לברור יותר כאשר אפליקציה צריכה גישת מנהל, מכיוון שהיא תבקש ממך אישורים בכל פעם. אם אתה משתמש בחשבון שני, אין צורך בהחלט להיכנס לחשבון המנהל המקורי שלך ממסך הכניסה של macOS. כאשר אתה עושה משהו כמשתמש רגיל הדורש הרשאות מנהל מערכת, המערכת אמורה לבקש ממך אימות, שם תוכל להזין את אישורי המנהל שלך כמשתמש הרגיל שלך באופן חד פעמי. אפל מספקת [הנחיות](https://support.apple.com/HT203998) להסתרת חשבון המנהל שלך אם אתה מעדיף לראות רק חשבון בודד במסך ההתחברות שלך. @@ -128,7 +128,7 @@ macOS מבצעת בדיקות מקוונות כאשר אתה פותח אפליק ##### מצב נעילה -[מצב נעילה](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) משבית תכונות מסוימות כדי לשפר בִּטָחוֹן. אפליקציות או תכונות מסוימות לא יפעלו כמו שהם פועלים כשהם כבויים, לדוגמה, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in -time-jit-compilers/) ו-[WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) מושבתים ב-Safari עם נעילה מצב מופעל. אנו ממליצים להפעיל את מצב הנעילה ולראות אם זה משפיע באופן משמעותי על השימוש שלך, הרבה מהשינויים שהוא עושה קלים לחיות איתם. +[מצב נעילה](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) משבית תכונות מסוימות כדי לשפר בִּטָחוֹן. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. אנו ממליצים להפעיל את מצב הנעילה ולראות אם זה משפיע באופן משמעותי על השימוש שלך, הרבה מהשינויים שהוא עושה קלים לחיות איתם. - [x] לחץ על **הפעל** diff --git a/i18n/he/os/qubes-overview.md b/i18n/he/os/qubes-overview.md index f5db23cf..4a9f8243 100644 --- a/i18n/he/os/qubes-overview.md +++ b/i18n/he/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes היא מערכת הפעלה הבנויה סביב בידוד אפליקציות בתוך *qubes* (לשעבר "VMs") לאבטחה מוגברת. --- -[**Qubes OS**](../desktop.md#qubes-os) היא מערכת הפעלה בקוד פתוח המשתמשת ב[Xen](https://en.wikipedia.org/wiki/Xen) היפרוויזר לספק אבטחה חזקה עבור מחשוב שולחני באמצעות *qubes* מבודדים, (אשר הם מכונות וירטואליות). אתה יכול להקצות לכל *qube* רמת אמון על סמך מטרתו. מערכת ההפעלה Qubes מספקת אבטחה באמצעות בידוד. הוא מתיר פעולות רק על בסיס כל מקרה ומקרה ולכן הוא ההפך מ[badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) היא מערכת הפעלה בקוד פתוח המשתמשת ב[Xen](https://en.wikipedia.org/wiki/Xen) היפרוויזר לספק אבטחה חזקה עבור מחשוב שולחני באמצעות *qubes* מבודדים, (אשר הם מכונות וירטואליות). אתה יכול להקצות לכל *qube* רמת אמון על סמך מטרתו. מערכת ההפעלה Qubes מספקת אבטחה באמצעות בידוד. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## איך עובדת מערכת ההפעלה של Qubes? -Qubes משתמשת ב[מידור](https://www.qubes-os.org/intro/) כדי לשמור על אבטחת המערכת. Qubes נוצרים מתבניות, ברירת המחדל היא עבור Fedora, Debian ו-[Whonix](../desktop.md#whonix). מערכת ההפעלה Qubes מאפשרת לך גם ליצור [חד פעמי](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes* לשימוש חד פעמי. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes נוצרים מתבניות, ברירת המחדל היא עבור Fedora, Debian ו-[Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Qubes משתמשת ב[מידור](https://www.qubes-os.org/intro/) כדי לשמ ![ארכיטקטורת Qubes](../assets/img/qubes/qubes-trust-level-architecture.png)
ארכיטקטורת Qubes, קרדיט: מהי הקדמה למערכת ההפעלה של Qubes
-לכל qube יש [גבול צבעוני](https://www.qubes-os.org/screenshots/) שיכול לעזור לך לעקוב אחר התחום שבו היא פועלת. אתה יכול, למשל, להשתמש בצבע ספציפי עבור הדפדפן הבנקאי שלך, תוך שימוש בצבע אחר עבור דפדפן כללי שאינו מהימן. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. אתה יכול, למשל, להשתמש בצבע ספציפי עבור הדפדפן הבנקאי שלך, תוך שימוש בצבע אחר עבור דפדפן כללי שאינו מהימן. ![גבול צבוע](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
גבולות החלונות של Qubes, קרדיט: צילומי מסך של Qubes
@@ -33,7 +33,7 @@ Qubes OS משתמשת ב-[דום0](https://wiki.xenproject.org/wiki/Dom0)Xen VM ### העתקה והדבקה של טקסט -אתה יכול [להעתיק ולהדביק טקסט](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) באמצעות `qvm-copy -to-vm` או ההוראות שלהלן: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. הקש על **Ctrl+C** כדי לומר ל-*qube* שאתה נמצא בו שאתה רוצה להעתיק משהו. 2. הקש על **Ctrl+Shift+C** כדי לומר ל*qube* להפוך את המאגר הזה לזמין ללוח הגלובלי. @@ -47,13 +47,13 @@ Qubes OS משתמשת ב-[דום0](https://wiki.xenproject.org/wiki/Dom0)Xen VM
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. כאשר עושים זאת השינויים לא מתבצעים באופן מיידי וניתן לבטל אותם בקלות במקרה של תאונה. When you run a *qube*, it does not have a persistent filesystem. אתה יכול ליצור ולמחוק קבצים, אבל השינויים האלה הם ארעיים. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. כאשר עושים זאת השינויים לא מתבצעים באופן מיידי וניתן לבטל אותם בקלות במקרה של תאונה. When you run a *qube*, it does not have a persistent filesystem. אתה יכול ליצור ולמחוק קבצים, אבל השינויים האלה הם ארעיים.
### אינטראקציות בין-VM -[מסגרת qrexec](https://www.qubes-os.org/doc/qrexec/) היא חלק מרכזי ב-Qubes המאפשר תקשורת בין דומיינים. הוא בנוי על גבי ספריית Xen *vchan*, המאפשרת [בידוד באמצעות מדיניות](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## מקורות נוספים -למידע נוסף, אנו ממליצים לך לעיין בדפי התיעוד הנרחבים של Qubes OS הממוקמים ב[אתר האינטרנט של Qubes OS](https://www.qubes-os.org/doc/). ניתן להוריד עותקים לא מקוונים מ[מאגר התיעוד](https://github.com/QubesOS/qubes-doc) של Qubes OS. +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). ניתן להוריד עותקים לא מקוונים מ[מאגר התיעוד](https://github.com/QubesOS/qubes-doc) של Qubes OS. -- [ללא ספק מערכת ההפעלה המאובטחת ביותר בעולם](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [מידור תוכנה לעומת הפרדה פיזית](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [חלוקת החיים הדיגיטליים שלי לתחומי אבטחה](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [מאמרים קשורים](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/he/passwords.md b/i18n/he/passwords.md index 6ccc2f8b..c45836c6 100644 --- a/i18n/he/passwords.md +++ b/i18n/he/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: מנהל הסיסמאות operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: מנהל הסיסמאות operatingSystem: אנדרואיד subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: מנהל הסיסמאות operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: מנהל הסיסמאות operatingSystem: - ווינדוס @@ -127,7 +127,7 @@ schema: מנהלי סיסמאות מובנים בתוכנות כמו דפדפנים ומערכות הפעלה אינם טובים לפעמים כמו תוכנות ייעודיות למנהל סיסמאות. היתרון של מנהל סיסמאות מובנה הוא אינטגרציה טובה עם התוכנה, אך לרוב זה יכול להיות פשוט מאוד וחסר תכונות פרטיות ואבטחה שיש להצעות עצמאיות. -לדוגמה, מנהל הסיסמאות ב-Microsoft Edge אינו מציע E2EE כלל. למנהל הסיסמאות של Google יש E2EE [אופציונלי](https://support.google.com/accounts/answer/11350823), ו-[של Apple](https://support.apple.com/en-us/HT202303) מציע E2EE על ידי ברירת מחדל. +לדוגמה, מנהל הסיסמאות ב-Microsoft Edge אינו מציע E2EE כלל. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ schema: [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ schema:
-Bitwarden כולל גם [Bitwarden Send](https://bitwarden.com/products/send/), המאפשר לך לשתף טקסט וקבצים בצורה מאובטחת עם [הצפנה מקצה לקצה](https://bitwarden.com/help/send-encryption). ניתן לדרוש [סיסמה](https://bitwarden.com/help/send-privacy/#send-passwords) יחד עם קישור השליחה. Bitwarden Send כולל גם תכונות [מחיקה אוטומטית](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). ניתן לדרוש [סיסמה](https://bitwarden.com/help/send-privacy/#send-passwords) יחד עם קישור השליחה. Bitwarden Send כולל גם תכונות [מחיקה אוטומטית](https://bitwarden.com/help/send-lifespan). אתה צריך [תוכנית פרימיום](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) כדי להיות מסוגל לשתף קבצים. התוכנית החינמית מאפשרת שיתוף טקסט בלבד. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password לוגו](assets/img/password-management/1password.svg){ align=right } -**1Password** הוא מנהל סיסמאות עם דגש חזק על אבטחה וקלות שימוש, המאפשר לך לאחסן סיסמאות, כרטיסי אשראי, רישיונות תוכנה וכל מידע רגיש אחר בכספת דיגיטלית מאובטחת. הכספת שלכם מתארחת בשרתים של 1Password תמורת [תשלום חודשי](https://1password.com/sign-up/). 1Password [מבוקרת](https://support.1password.com/security-assessments/) על בסיס קבוע ומספקת תמיכת לקוחות יוצאת דופן. 1Password הוא מקור סגור; עם זאת, האבטחה של המוצר מתועדת ביסודיות ב[מסמך האבטחה הלבן](https://1passwordstatic.com/files/security/1password-white-paper.pdf) שלהם. +**1Password** הוא מנהל סיסמאות עם דגש חזק על אבטחה וקלות שימוש, המאפשר לך לאחסן סיסמאות, כרטיסי אשראי, רישיונות תוכנה וכל מידע רגיש אחר בכספת דיגיטלית מאובטחת. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password הוא מקור סגור; עם זאת, האבטחה של המוצר מתועדת ביסודיות ב[מסמך האבטחה הלבן](https://1passwordstatic.com/files/security/1password-white-paper.pdf) שלהם. -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ Psono מספקת תיעוד נרחב עבור המוצר שלהם. לקוח הא [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC מאחסן את נתוני הייצוא שלו כקובצי [CSV](http **KeePassDX** הוא מנהל סיסמאות קל משקל לאנדרואיד, מאפשר עריכת נתונים מוצפנים בקובץ בודד בפורמט KeePass ויכול למלא את הטפסים בצורה מאובטחת. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) מאפשר ביטול נעילה של תוכן קוסמטי ותכונות פרוטוקול לא סטנדרטיות, אך חשוב מכך, זה עוזר ומעודד התפתחות. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC מאחסן את נתוני הייצוא שלו כקובצי [CSV](http ![לוגו Strongbox](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** הוא מנהל סיסמאות מקורי בקוד פתוח עבור iOS ו-macOS. תמיכה בפורמטים של KeePass ו- Password Safe, ניתן להשתמש ב-Strongbox במקביל למנהלי סיסמאות אחרים, כמו KeePassXC, בפלטפורמות שאינן של אפל. על ידי שימוש ב[מודל freemium](https://strongboxsafe.com/pricing/), Strongbox מציעה את רוב התכונות תחת השכבה החינמית שלה עם [תכונות](https://strongboxsafe.com/comparison/) יותר מוכוונות נוחות - כגון כאימות ביומטרי - נעול מאחורי מנוי או רישיון תמידי. +**Strongbox** הוא מנהל סיסמאות מקורי בקוד פתוח עבור iOS ו-macOS. תמיכה בפורמטים של KeePass ו- Password Safe, ניתן להשתמש ב-Strongbox במקביל למנהלי סיסמאות אחרים, כמו KeePassXC, בפלטפורמות שאינן של אפל. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-בנוסף, קיימת גרסה לא מקוונת בלבד המוצעת: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). גרסה זו מופשטת בניסיון לצמצם את שטח התקיפה. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). גרסה זו מופשטת בניסיון לצמצם את שטח התקיפה. ### שורת הפקודה @@ -356,7 +356,7 @@ KeePassXC מאחסן את נתוני הייצוא שלו כקובצי [CSV](http **gopass** הוא מנהל סיסמאות עבור שורת הפקודה הכתובה ב-Go. זה עובד על כל מערכות ההפעלה העיקריות של שולחן העבודה והשרת (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ KeePassXC מאחסן את נתוני הייצוא שלו כקובצי [CSV](http
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/he/photo-management.md b/i18n/he/photo-management.md index d2bfaf4c..f48e3c7c 100644 --- a/i18n/he/photo-management.md +++ b/i18n/he/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/he/productivity.md b/i18n/he/productivity.md index f39bf55b..b52804e8 100644 --- a/i18n/he/productivity.md +++ b/i18n/he/productivity.md @@ -19,9 +19,9 @@ cover: productivity.webp [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -52,11 +52,11 @@ cover: productivity.webp **CryptPad** הוא אלטרנטיבה פרטית-עיצובית לכלי משרד פופולריים. כל התוכן בשירות אינטרנט זה מוצפן מקצה לקצה וניתן לשתף אותו עם משתמשים אחרים בקלות. -[:octicons-home-16: דף הבית](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=תיעוד} -[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=לתרומה } +[:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute }
@@ -99,20 +99,20 @@ cover: productivity.webp **LibreOffice** היא חבילת משרדים חינמית וקוד פתוח עם פונקציונליות נרחבת. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ cover: productivity.webp **OnlyOffice** היא חבילת משרדים חינמית מבוססת ענן וקוד פתוח עם פונקציונליות נרחבת, כולל אינטגרציה עם Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ cover: productivity.webp - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -175,10 +175,10 @@ cover: productivity.webp **PrivateBin** הוא מינימליסטי, קוד פתוח מקוון Pastebin שבו לשרת יש אפס ידע על נתונים מודבקים. הנתונים מוצפנים/מפוענים בדפדפן באמצעות 256 סיביות AES. זוהי הגרסה המשופרת של ZeroBin. -[:octicons-home-16: דף הבית](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="מופעים ציבוריים"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=תיעוד} -[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="קוד מקור" } +[:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
diff --git a/i18n/he/real-time-communication.md b/i18n/he/real-time-communication.md index 4dfcb6b6..9d4a9c9a 100644 --- a/i18n/he/real-time-communication.md +++ b/i18n/he/real-time-communication.md @@ -22,18 +22,18 @@ cover: real-time-communication.webp **Signal** היא אפליקציה לנייד שפותחה על ידי סיגנל מסנג'ר LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. גם פרופילים אישיים מוצפנים ומשותפים רק עם אנשי קשר שאיתם אתה משוחח בצ'אט. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. לSignal יש מטא נתונים מינימליים כאשר [שולח חתום](https://signal.org/blog/sealed-sender/) מופעל. כתובת השולח מוצפנת יחד עם גוף ההודעה, ורק כתובת הנמען גלויה לשרת. 'שולח אטום' זמין רק עבור אנשים ברשימת אנשי הקשר שלך, אך ניתן להפוך אותו לזמין עבור כל הנמענים עם סיכון מוגבר לקבלת דואר זבל. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. גם פרופילים אישיים מוצפנים ומשותפים רק עם אנשי קשר שאיתם אתה משוחח בצ'אט. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. כתובת השולח מוצפנת יחד עם גוף ההודעה, ורק כתובת הנמען גלויה לשרת. 'שולח אטום' זמין רק עבור אנשים ברשימת אנשי הקשר שלך, אך ניתן להפוך אותו לזמין עבור כל הנמענים עם סיכון מוגבר לקבלת דואר זבל. -הפרוטוקול היה מבוקר [באופן עצמאי](https://eprint.iacr.org/2016/1013.pdf) בשנת 2016. ניתן למצוא את המפרט של פרוטוקול סיגנל בתיעוד [](https://signal.org/docs/)שלהם. +הפרוטוקול היה מבוקר [באופן עצמאי](https://eprint.iacr.org/2016/1013.pdf) בשנת 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). יש לנו כמה טיפים נוספים להגדרה והקשחה של התקנת הSignal שלך: -[תצורת סיגנל והקשחה :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[תצורת סיגנל והקשחה :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ Contact lists on Signal are encrypted using your Signal PIN and the server does Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -96,22 +96,22 @@ SimpleX Chat תומך בפונקציונליות בסיסית של צ'אט קב
-![לוגו של Briar](assets/img/messengers/briar.svg){ align=right } +![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** הוא מסנג'ר מיידי מוצפן ש[מתחבר](https://briarproject.org/how-it-works/) ללקוחות אחרים המשתמשים ברשת Tor. Briar יכול גם להתחבר באמצעות Wi-Fi או Bluetooth כאשר הוא נמצא בקרבה מקומית. מצב הרשת המקומי של Briar יכול להיות שימושי כאשר זמינות האינטרנט היא בעיה. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar יכול גם להתחבר באמצעות Wi-Fi או Bluetooth כאשר הוא נמצא בקרבה מקומית. מצב הרשת המקומי של Briar יכול להיות שימושי כאשר זמינות האינטרנט היא בעיה. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat תומך בפונקציונליות בסיסית של צ'אט קב כדי להוסיף איש קשר ב Briar, שניכם חייבים להוסיף אחד את השני קודם. באפשרותך להחליף `קישורים ` או לסרוק את קוד ה - QR של איש הקשר אם הוא נמצא בקרבת מקום. -תוכנת הקליינט נבדקה באופן עצמאי [](https://briarproject.org/news/2017-beta-released-security-audit/), ופרוטוקול הניתוב האנונימי משתמש ברשת Tor שנבדקה אף היא. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. ל Briar יש מפרט ש[פורסם במלואו](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. הודעות וקבצים המשותפים בחדרים פרטיים (אלו הדורשים הזמנה) הם כברירת מחדל E2EE וכך גם שיחות קול ווידאו אחד לאחד. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -הפרוטוקול היה מבוקר [באופן עצמאי](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) בשנת 2016. את המפרט לפרוטוקול מטריקס ניתן למצוא [בתיעוד שלהם](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +הפרוטוקול היה מבוקר [באופן עצמאי](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) בשנת 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The Matrix protocol itself [theoretically supports forward secrecy](https://gitl **Session** הוא מסנג'ר מבוזר עם התמקדות בתקשורת פרטית, מאובטחת ואנונימית. Session מציע תמיכה בהודעות ישירות, צ'אטים קבוצתיים ושיחות קוליות. -Session משתמש ב-[Oxen Service Node Network](https://oxen.io/) המבוזר כדי לאחסן ולנתב הודעות. כל הודעה מוצפנת מנותבת דרך שלושה צמתים ברשת Oxen Service Node Network, מה שהופך את זה למעשה לבלתי אפשרי עבור הצמתים לאסוף מידע משמעותי על המשתמשים ברשת. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. כל הודעה מוצפנת מנותבת דרך שלושה צמתים ברשת Oxen Service Node Network, מה שהופך את זה למעשה לבלתי אפשרי עבור הצמתים לאסוף מידע משמעותי על המשתמשים ברשת. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/he/router.md b/i18n/he/router.md index 518335e4..62b44e00 100644 --- a/i18n/he/router.md +++ b/i18n/he/router.md @@ -35,10 +35,10 @@ cover: router.webp **OPNsense** היא חומת אש ופלטפורמת ניתוב מבוססת קוד פתוח, מבוססת FreeBSD, המשלבת תכונות מתקדמות רבות כגון עיצוב תעבורה, איזון עומסים ויכולות VPN, עם תכונות רבות נוספות הזמינות בצורה של תוספים. OPNsense נפוץ כחומת אש היקפית, נתב, נקודת גישה אלחוטית, שרת DHCP, שרת DNS ונקודת קצה VPN. -[:octicons-home-16: דף הבית](https://opnsense.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=תיעוד} -[:octicons-code-16:](https://github.com/opnsense){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=לתרומה } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/he/search-engines.md b/i18n/he/search-engines.md index f00e5e4c..16d97be2 100644 --- a/i18n/he/search-engines.md +++ b/i18n/he/search-engines.md @@ -10,7 +10,7 @@ cover: search-engines.webp ההמלצות כאן מבוססות על היתרונות של מדיניות הפרטיות של כל שירות. אין **ערובה לכך** שמדיניות פרטיות זו תכובד. -מומלץ להשתמש ב - [VPN](vpn.md) או [Tor](https://www.torproject.org/) אם מודל האיום דורש הסתרת כתובת ה - IP שלכם מספק החיפוש. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## חיפוש Brave @@ -24,10 +24,10 @@ Brave Search כולל תכונות ייחודיות כגון דיונים, המ אנו ממליצים להשבית את [מדדי שימוש אנונימיים](https://search.brave.com/help/usage-metrics) מכיוון שהוא מופעל כברירת מחדל וניתן להשבית אותו בהגדרות. -[:octicons-home-16: דף הבית](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://search.brave.com/help){ .card-link title=תיעוד} +[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search מבוסס בארצות הברית. [מדיניות הפרטיות] ![DuckDuckGo לוגו](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** היא אחת האפשרויות היותר מיינסטרים במנועי חיפוש פרטיים. תכונות החיפוש הבולטות של DuckDuckGo כוללות [bangs](https://duckduckgo.com/bang) והרבה [תשובות מיידיות](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). מנוע החיפוש מסתמך על Bing API מסחרי כדי להגיש את רוב התוצאות, אך הוא משתמש במספר [מקורות אחרים](https://help.duckduckgo.com/results/sources/) לתשובות מיידיות ולתוצאות אחרות שאינן ראשוניות. +**DuckDuckGo** היא אחת האפשרויות היותר מיינסטרים במנועי חיפוש פרטיים. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo הוא מנוע החיפוש המוגדר כברירת מחדל עבור דפדפן Tor והוא אחת האפשרויות הבודדות הזמינות בדפדפן הספארי של אפל. -[:octicons-home-16: דף הבית](https://duckduckgo.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=תיעוד} +[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation} @@ -56,7 +56,7 @@ DuckDuckGo הוא מנוע החיפוש המוגדר כברירת מחדל עב DuckDuckGo מבוססת בארצות הברית. [מדיניות הפרטיות](https://duckduckgo.com/privacy) שלהם קובעת **שהם** שומרים את החיפושים שלך למטרות שיפור מוצרים, אך לא את כתובת ה-IP שלך או כל מידע מזהה אישי אחר. -DuckDuckGo מציעה שתי [גרסאות אחרות](https://help.duckduckgo.com/features/non-javascript/) של מנוע החיפוש שלהם, שתיהן אינן דורשות JavaScript. עם זאת, גרסאות אלו חסרות תכונות. ניתן להשתמש בגרסאות אלה גם יחד עם [Tor כתובת בצל](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) על-ידי צירוף [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) או [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) עבור הגרסה המתאימה. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. עם זאת, גרסאות אלו חסרות תכונות. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -66,9 +66,9 @@ DuckDuckGo מציעה שתי [גרסאות אחרות](https://help.duckduckgo.c **SearXNG** הוא מנוע חיפוש מטה-חיפוש, מתארח בעצמו, קוד-פתוח, אוסף את התוצאות של מנועי חיפוש אחרים מבלי לאחסן מידע בעצמו. זהו מזלג מתוחזק פעיל של [SearX](https://github.com/searx/searx). -[:octicons-home-16: דף הבית](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="מופעים ציבוריים"} -[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="קוד מקור" } +[:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} +[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" } @@ -84,14 +84,14 @@ SearXNG הוא פרוקסי בינך לבין מנועי החיפוש שמהם
-![Startpage לוגו](assets/img/search-engines/startpage.svg#only-light){ align=right } -![Startpage לוגו](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } +![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } +![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** הוא מנוע חיפוש פרטי הידוע בשירות [Google ו-Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage -and-your-search-partners-like-Google-and-Microsoft-Bing-) תוצאות החיפוש. אחת התכונות הייחודיות של Startpage היא [תצוגה אנונימית](https://www.startpage.com/en/anonymous-view/), שמשקיעה מאמצים בסטנדרטיזציה של פעילות המשתמשים כדי להקשות על זיהוי ייחודי. התכונה יכולה להיות שימושית להסתרת [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) מאפייני הרשת והדפדפן. שלא כמו שהשם מרמז, אין להסתמך על התכונה לאנונימיות. אם אתה מחפש אנונימיות, השתמש במקום זאת ב [Tor Browser]( tor.md#tor - browser). +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. שלא כמו שהשם מרמז, אין להסתמך על התכונה לאנונימיות. אם אתה מחפש אנונימיות, השתמש במקום זאת ב [Tor Browser]( tor.md#tor - browser). -[:octicons-home-16: דף הבית](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="מדיניות פרטיות" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=תיעוד} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} @@ -104,9 +104,9 @@ Startpage מגביל באופן קבוע את גישת השירות לכתובו
-Startpage מבוסס בהולנד. לפי [מדיניות הפרטיות](https://www.startpage.com/en/privacy-policy/) שלהם, הם רושמים פרטים כגון: מערכת הפעלה, סוג הדפדפן והשפה. הם לא רושמים את כתובת ה-IP שלך, שאילתות חיפוש או מידע אישי מזהה אחר. +Startpage מבוסס בהולנד. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. הם לא רושמים את כתובת ה-IP שלך, שאילתות חיפוש או מידע אישי מזהה אחר. -בעלת המניות הרוב של Startpage היא System1 שהיא חברת adtech. אנחנו לא מאמינים שזו בעיה מכיוון שיש להם [מדיניות פרטיות](https://system1.com/terms/privacy-policy) נפרדת באופן מובהק. צוות Privacy Guides פנה אל Startpage [בשנת 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) כדי לפתור את כל החששות מההשקעה הגדולה של System1 בשירות. היינו מרוצים מהתשובות שקיבלנו. +בעלת המניות הרוב של Startpage היא System1 שהיא חברת adtech. אנחנו לא מאמינים שזו בעיה מכיוון שיש להם [מדיניות פרטיות](https://system1.com/terms/privacy-policy) נפרדת באופן מובהק. The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. היינו מרוצים מהתשובות שקיבלנו. ## קריטריונים diff --git a/i18n/he/tools.md b/i18n/he/tools.md index f71bde76..24a3da31 100644 --- a/i18n/he/tools.md +++ b/i18n/he/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides הוא האתר השקוף והאמין ביותר אם אתם מחפשים פתרון ספציפי למשהו, אלו הם כלי החומרה והתוכנה שאנו ממליצים עליהם במגוון קטגוריות. כלי הפרטיות המומלצים שלנו נבחרים בעיקר על סמך תכונות אבטחה, עם דגש נוסף על כלים מבוזרים וקוד פתוח. הם ישימים למגוון מודלים של איומים, החל מהגנה מפני תוכניות מעקב המוני גלובליות והימנעות מחברות טכנולוגיה גדולות ועד למיתון התקפות, אבל רק אתה יכול לקבוע מה יעבוד הכי טוב עבור הצרכים שלך. -אם אתה רוצה עזרה בזיהוי כלי הפרטיות והתוכניות החלופיות הטובות ביותר לצרכים שלך, התחל דיון ב[פורום](https://discuss.privacyguides.net/) או בקהילת ה- [Matrix](https://matrix.to/#/#privacyguides:matrix.org) שלנו! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! לפרטים נוספים על כל פרויקט, מדוע הם נבחרו וטיפים או טריקים נוספים שאנו ממליצים עליו, לחץ על הקישור "למד עוד" בכל חלק, או לחץ על ההמלצה עצמה כדי לעבור לאותו חלק ספציפי של העמוד. @@ -89,7 +89,7 @@ description: Privacy Guides הוא האתר השקוף והאמין ביותר #### ספקי DNS -אנו ממליצים [](dns.md#recommended-providers) מספר שרתי DNS מוצפנים על בסיס מגוון רחב של קריטריונים, כגון [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) ו [Quad9](https://quad9.net/) בין היתר. אנו ממליצים לך לקרוא את הדפים שלנו על DNS לפני בחירת ספק. במקרים רבים, שימוש בספק DNS חלופי אינו מומלץ. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. אנו ממליצים לך לקרוא את הדפים שלנו על DNS לפני בחירת ספק. במקרים רבים, שימוש בספק DNS חלופי אינו מומלץ. [למד עוד :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/he/tor.md b/i18n/he/tor.md index 95eb9bfb..aea23b7a 100644 --- a/i18n/he/tor.md +++ b/i18n/he/tor.md @@ -10,7 +10,7 @@ schema: "@type": יישום תוכנה name: דפדפן Tor image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: דפדפן אינטרנט operatingSystem: @@ -27,11 +27,11 @@ schema: הרשת **Tor** היא קבוצה של שרתים המופעלים בהתנדבות המאפשרת לך להתחבר בחינם ולשפר את הפרטיות והאבטחה שלך באינטרנט. אנשים וארגונים יכולים גם לשתף מידע על גבי רשת Tor עם ".onion hidden services" מבלי לפגוע בפרטיותם. מכיוון שקשה לחסום ולעקוב אחר תעבורת Tor, Tor הוא כלי יעיל לעקוף צנזורה. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=דף הבית} +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=תיעוד} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=לתרומה} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor פועלת על ידי ניתוב תעבורת האינטרנט שלך דרך אותם שרתים המופעלים על ידי מתנדבים, במקום ליצור חיבור ישיר לאתר שבו אתה מנסה לבקר. זה מטשטש מהיכן מגיעה התעבורה, ואף שרת בנתיב החיבור לא מסוגל לראות את הנתיב המלא של המקום ממנו מגיעה התנועה והולכת, כלומר אפילו השרתים שבהם אתה משתמש כדי להתחבר לא יכולים לשבור את האנונימיות שלך. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **דפדפן Tor** הוא הבחירה אם אתה זקוק לאנונימיות, מכיוון שהוא מספק לך גישה לרשת Tor ולגשרים, והוא כולל הגדרות ברירת מחדל והרחבות המוגדרות אוטומטית לפי רמות האבטחה המוגדרות כברירת מחדל: *סטנדרטי*, *בטוח יותר * ו*הבטוח ביותר*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ If more complete anonymity is paramount to your situation, you should **only** b -דפדפן Tor נועד למנוע טביעת אצבע, או לזהות אותך על סמך תצורת הדפדפן שלך. לכן, זה הכרחי כי אתה עושה **לא** לשנות את הדפדפן מעבר ברירת המחדל [רמות אבטחה](https://tb-manual.torproject.org/security-settings/). +דפדפן Tor נועד למנוע טביעת אצבע, או לזהות אותך על סמך תצורת הדפדפן שלך. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** הוא Tor VPN בחינם לסמארטפונים שמנתב תעבורה מכל אפליקציה במכשיר שלך דרך רשת Tor. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) @@ -132,9 +132,9 @@ Orbot מיושן לעתים קרובות ב[מאגר F-Droid](https://guardianpr
-![Onion Browser לוגו](assets/img/self-contained-networks/onion_browser.svg){ align=right } +![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** הוא דפדפן קוד פתוח המאפשר לך לגלוש באינטרנט באופן אנונימי ברשת Tor במכשירי iOS והוא מאושר על ידי [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ Orbot מיושן לעתים קרובות ב[מאגר F-Droid](https://guardianpr אנשים שמצונזרים יכולים להשתמש בפרוקסי של Snowflake כדי להתחבר לרשת Tor. Snowflake היא דרך מצוינת לתרום לרשת גם אם אין לך את הידע הטכני להפעיל ממסר Tor או גשר. -[:octicons-home-16: דף הבית](https://snowflake.torproject.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=תיעוד} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="קוד מקור" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=לתרומה } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake אינו מגדיל את פרטיותך בשום צורה, ואינו הפעלת פרוקסי של Snowflake היא בסיכון נמוך, אפילו יותר מהפעלת ממסר Tor או גשר שהם כבר מאמצים לא מסוכנים במיוחד. עם זאת, היא עדיין עושה תעבורת פרוקסי דרך הרשת שלך, מה שיכול להשפיע במובנים מסוימים, במיוחד אם הרשת שלך מוגבלת ברוחב הפס. ודא שאתה מבין [איך Snowflake עובד](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) לפני שתחליט אם להפעיל פרוקסי. -[^1]: ההגדרה `IsolateDestAddr` נדונה ב [רשימת התפוצה של תור](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) ו-[Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), שבו שני הפרויקטים מצביעים על כך שזו בדרך כלל לא גישה טובה עבור רוב האנשים. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/he/vpn.md b/i18n/he/vpn.md index 42c99388..c93de71e 100644 --- a/i18n/he/vpn.md +++ b/i18n/he/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. אם אתה מחפש **אבטחה** נוספת, עליך תמיד לוודא שאתה מתחבר לאתרים באמצעות HTTPS. VPN אינו תחליף לשיטות אבטחה טובות. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button }
@@ -43,19 +43,19 @@ If you are looking for **anonymity**, you should use the Tor Browser. **Proton VPN** הוא מתחרה חזק בתחום ה-VPN, והם פועלים מאז 2016. Proton AG מבוססת בשוויץ ומציעה רמה מוגבלת בחינם, כמו גם אפשרות פרימיום מומלצת יותר. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ Proton VPN has [servers in 71 countries](https://protonvpn.com/vpn-servers) [or #### :material-check:{ .pg-green } נבדק באופן עצמאי -החל מינואר 2020, Proton VPN עבר ביקורת בלתי תלויה על ידי SEC Consult. SEC Consult מצא כמה נקודות תורפה בסיכון בינוני ונמוך ביישומי Windows, Android ו-iOS של Proton VPN, שכולן תוקנו כראוי על ידי Proton VPN לפני פרסום הדוחות. אף אחת מהבעיות שזוהו לא הייתה מספקת לתוקף גישה מרחוק למכשיר או לתעבורה שלך. אתה יכול להציג דוחות בודדים עבור כל פלטפורמה בכתובת [protonvpn.com](https://protonvpn.com/blog/open-source/). באפריל 2022 Proton VPN עבר [ביקורת נוספת](https://protonvpn.com/blog/no-logs-audit/) והדוח [הופק על ידי Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). [מכתב אישור](https://proton.me/blog/security-audit-all-proton-apps) סופק עבור האפליקציות של Proton VPN ב-9 בנובמבר 2021 על ידי [Securitum](https://research.securitum.com). +החל מינואר 2020, Proton VPN עבר ביקורת בלתי תלויה על ידי SEC Consult. SEC Consult מצא כמה נקודות תורפה בסיכון בינוני ונמוך ביישומי Windows, Android ו-iOS של Proton VPN, שכולן תוקנו כראוי על ידי Proton VPN לפני פרסום הדוחות. אף אחת מהבעיות שזוהו לא הייתה מספקת לתוקף גישה מרחוק למכשיר או לתעבורה שלך. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). [מכתב אישור](https://proton.me/blog/security-audit-all-proton-apps) סופק עבור האפליקציות של Proton VPN ב-9 בנובמבר 2021 על ידי [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } לקוחות קוד פתוח @@ -84,31 +84,31 @@ Proton VPN, בנוסף לקבלת כרטיסי אשראי/חיוב, פייפאל #### :material-check:{ .pg-green } תמיכה ב-WireGuard -Proton VPN תומך בעיקר בפרוטוקול WireGuard®. [WireGuard](https://www.wireguard.com) הוא פרוטוקול חדש יותר המשתמש ב[קריפטוגרפיה](https://www.wireguard.com/protocol/) חדישה. בנוסף, WireGuard שואפת להיות פשוטה וביצועית יותר. +Proton VPN תומך בעיקר בפרוטוקול WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). בנוסף, WireGuard שואפת להיות פשוטה וביצועית יותר. -Proton VPN [ממליץ](https://protonvpn.com/blog/wireguard/) על השימוש ב-WireGuard עם השירות שלהם. באפליקציות Windows, macOS, iOS, Android, ChromeOS ו-Android TV של Proton VPN, פרוטוקול WireGuard הוא ברירת המחדל; עם זאת, [תמיכה](https://protonvpn.com/support/how-to-change-vpn-protocols/) בפרוטוקול אינה קיימת באפליקציית הלינוקס שלהם. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } העברת פורטים מרחוק -Proton VPN תומך כרגע רק ב[העברת פורטים](https://protonvpn.com/support/port-forwarding/) מרחוק ארעיים באמצעות NAT-PMP, עם זמני חכירה של 60 שניות. אפליקציית Windows מספקת אפשרות קלה לגישה עבורה, בעוד שבמערכות הפעלה אחרות תצטרך להפעיל [ משלך לקוח NAT-PMP](https://protonvpn.com/support/port-forwarding-manual-setup/). יישומי טורנט תומכים לעתים קרובות ב-NAT-PMP באופן מקורי. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). יישומי טורנט תומכים לעתים קרובות ב-NAT-PMP באופן מקורי. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } לקוחות ניידים -בנוסף לאספקת קובצי תצורה סטנדרטיים של OpenVPN, ל-Proton VPN יש לקוחות ניידים עבור [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), ו- [GitHub](https://github.com/ProtonVPN/android-app/releases) המאפשרים חיבורים קלים לשרתים שלהם. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } פונקציונליות נוספת -תוכנות Proton VPN תומכים באימות דו-שלבי בכל הפלטפורמות מלבד לינוקס כרגע. ל - Proton VPN יש שרתים ומרכזי נתונים משלו בשוויץ, איסלנד ושוודיה. They offer content blocking and known-malware blocking with their DNS service. בנוסף, Proton VPN מציע גם שרתי "Tor" המאפשרים לך להתחבר בקלות לאתרי בצל, אך אנו עדיין ממליצים בחום להשתמש ב[דפדפן Tor הרשמי](https://www.torproject.org/) למטרה זו. +תוכנות Proton VPN תומכים באימות דו-שלבי בכל הפלטפורמות מלבד לינוקס כרגע. ל - Proton VPN יש שרתים ומרכזי נתונים משלו בשוויץ, איסלנד ושוודיה. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } תכונת Killswitch שבורה במחשבי Mac מבוססי אינטל -קריסות מערכת [עשויות להתרחש](https://protonvpn.com/support/macos-t2-chip-kill-switch/) במחשבי Mac מבוססי אינטל בעת שימוש במתג ההרוג של VPN. אם אתם זקוקים לתכונה זו, ואתם משתמשים ב - Mac עם ערכת שבבים של Intel, כדאי לכם לשקול להשתמש בשירות VPN אחר. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. אם אתם זקוקים לתכונה זו, ואתם משתמשים ב - Mac עם ערכת שבבים של Intel, כדאי לכם לשקול להשתמש בשירות VPN אחר. ### IVPN @@ -118,9 +118,9 @@ Unfortunately it does not work very well in countries where sophisticated filter **IVPN** הוא עוד ספק VPN פרימיום, והם פועלים מאז 2009. IVPN מבוסס בגיברלטר. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ Unfortunately it does not work very well in countries where sophisticated filter - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ Unfortunately it does not work very well in countries where sophisticated filter #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. הסיבה לכך היא מסלול קצר יותר (פחות דילוגים) ליעד. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. הסיבה לכך היא מסלול קצר יותר (פחות דילוגים) ליעד. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Pi #### :material-check:{ .pg-green } נבדק באופן עצמאי -IVPN [עבר ביקורת ללא רישום מ-](https://cure53.de/audit-report_ivpn.pdf)Cure53 שהסתיים בהסכמה עם טענת VPN ללא רישום. IVPN השלימה גם [דוח בדיקה מקיף ](https://cure53.de/summary-report_ivpn_2019.pdf)Cure53 בינואר 2020. IVPN גם אמר שהם מתכננים לקבל [דוחות שנתיים](https://www.ivpn.net/blog/independent-security-audit-concluded) בעתיד. סקירה נוספת נערכה [באפריל ](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/)2022 והופקה על ידי Cure53 [באתר האינטרנט שלהם](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN [עבר ביקורת ללא רישום מ-](https://cure53.de/audit-report_ivpn.pdf)Cure53 שהסתיים בהסכמה עם טענת VPN ללא רישום. IVPN השלימה גם [דוח בדיקה מקיף ](https://cure53.de/summary-report_ivpn_2019.pdf)Cure53 בינואר 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } לקוחות קוד פתוח -החל מפברואר 2020 [יישומי IVPN הם כעת קוד פתוח](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). קוד המקור ניתן לקבל מ[ארגון GitHub שלהם](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). קוד המקור ניתן לקבל מ[ארגון GitHub שלהם](https://github.com/ivpn). #### :material-check:{ .pg-green } מקבל מזומן ומונרו @@ -160,25 +160,25 @@ IVPN [עבר ביקורת ללא רישום מ-](https://cure53.de/audit-report_ #### :material-check:{ .pg-green } תמיכה ב-WireGuard -IVPN תומך בפרוטוקול WireGuard®. [WireGuard](https://www.wireguard.com) הוא פרוטוקול חדש יותר המשתמש ב[קריפטוגרפיה](https://www.wireguard.com/protocol/) חדישה. בנוסף, WireGuard שואפת להיות פשוטה וביצועית יותר. +IVPN תומך בפרוטוקול WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). בנוסף, WireGuard שואפת להיות פשוטה וביצועית יותר. -IVPN [ממליצה](https://www.ivpn.net/wireguard/) להשתמש ב-WireGuard עם השירות שלהם, וככזה, הפרוטוקול הוא ברירת המחדל בכל האפליקציות של IVPN. IVPN מציע גם מחולל תצורה של WireGuard לשימוש עם [אפליקציות](https://www.wireguard.com/install/) WireGuard הרשמיות. +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } העברת פורטים מרחוק -IVPN תמך בעבר בהעברת יציאות, אך הסיר את האפשרות ב[יוני 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). חיסרון של תכונה זו עלולה להשפיע לרעה על יישומים מסוימים, במיוחד יישומי עמית לעמית כמו לקוחות טורנט. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). חיסרון של תכונה זו עלולה להשפיע לרעה על יישומים מסוימים, במיוחד יישומי עמית לעמית כמו לקוחות טורנט. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } לקוחות ניידים -בנוסף לאספקת קובצי תצורה סטנדרטיים של OpenVPN, ל-IVPN יש לקוחות ניידים עבור [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), ו- [GitHub](https://github.com/ivpn/android-app/releases) המאפשרים חיבורים קלים לשרתים שלהם. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } פונקציונליות נוספת -תוכונת IVPN תומכים באימות דו - שלבי (הלקוחות של Mullvad לא תומכים). IVPN מספקת גם פונקציונליות של "[AntiTracker](https://www.ivpn.net/antitracker)", החוסמת רשתות פרסום ועוקבים מרמת הרשת. +תוכונת IVPN תומכים באימות דו - שלבי (הלקוחות של Mullvad לא תומכים). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. הסיבה לכך היא מסלול קצר יותר (פחות דילוגים) ליעד. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. הסיבה לכך היא מסלול קצר יותר (פחות דילוגים) ליעד. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking > Cure53 ו-Assured AB מרוצים מתוצאות הביקורת והתוכנה משאירה רושם חיובי כללי. עם מסירות אבטחה של הצוות הפנימי במתחם ה-VPN של Mullvad, לבודקים אין ספק לגבי הפרויקט בדרך הנכונה מבחינה אבטחה. -בשנת 2020 [הוכרזה](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) ביקורת שנייה ו[דוח הביקורת הסופי](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) הפך לזמין באתר האינטרנט של Cure53: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > התוצאות של פרויקט מאי-יוני 2020 המתמקד במתחם Mullvad הן חיוביות למדי. [...] המערכת האקולוגית הכוללת של היישום המשמשת את Mullvad משאירה רושם קול ומובנה. המבנה הכללי של היישום מקל על גלגול תיקונים ותיקונים באופן מובנה. יותר מכל, הממצאים שנצפו על ידי Cure53 מדגימים את החשיבות של ביקורת מתמדת והערכה מחדש של וקטורי הדליפה הנוכחיים, על מנת להבטיח תמיד את פרטיותם של משתמשי הקצה. עם זאת, Mullvad עושה עבודה נהדרת בהגנה על משתמש הקצה מפני דליפות PII נפוצות וסיכונים הקשורים לפרטיות. -בשנת 2021 [הוכרזה](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) ביקורת תשתית ו[דוח הביקורת הסופי](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) הפך לזמין באתר האינטרנט של Cure53. דוח נוסף הוזמן [ביוני 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) והוא זמין [ באתר של Assured's](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } לקוחות קוד פתוח @@ -239,17 +239,17 @@ Mullvad, בנוסף לקבל כרטיסי אשראי/חיוב ופייפאל, מ #### :material-check:{ .pg-green } תמיכה ב-WireGuard -Mullvad תומך בפרוטוקול WireGuard®. [WireGuard](https://www.wireguard.com) הוא פרוטוקול חדש יותר המשתמש ב[קריפטוגרפיה](https://www.wireguard.com/protocol/) חדישה. בנוסף, WireGuard שואפת להיות פשוטה וביצועית יותר. +Mullvad תומך בפרוטוקול WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). בנוסף, WireGuard שואפת להיות פשוטה וביצועית יותר. -Mullvad [ממליץ](https://mullvad.net/en/help/why-wireguard/) על השימוש ב-WireGuard עם השירות שלהם. זהו פרוטוקול ברירת המחדל או היחיד באפליקציות אנדרואיד, iOS, macOS ו-Linux של Mullvad, אך ב-Windows אתה צריך להפעיל את WireGuard [באופן ידני](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/). Mullvad מציע גם מחולל תצורה של WireGuard לשימוש עם [אפליקציות](https://www.wireguard.com/install/) הרשמיות של WireGuard. +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } תמיכה ב-IPv6 -Mullvad מאפשרת לך [ גישה לשירותים המתארחים ב-IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), בניגוד לספקים אחרים החוסמים חיבורי IPv6. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } העברת פורטים מרחוק -Mullvad תמך בעבר בהעברת יציאות, אך הסיר את האפשרות ב [מאי 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). חיסרון של תכונה זו עלולה להשפיע לרעה על יישומים מסוימים, במיוחד יישומי עמית לעמית כמו לקוחות טורנט. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). חיסרון של תכונה זו עלולה להשפיע לרעה על יישומים מסוימים, במיוחד יישומי עמית לעמית כמו לקוחות טורנט. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } לקוחות ניידים -Mullvad פרסמה לקוחות [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) ו- [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn), שניהם תומכים בממשק קל לשימוש, בניגוד לדרישה ממך להגדיר באופן ידני את חיבור ה-WireGuard שלך. לקוח אנדרואיד זמין גם ב-[GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. לקוח אנדרואיד זמין גם ב-[GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } פונקציונליות נוספת -Mullvad מאוד שקוף לגבי אילו צמתים הם [בעלים או שוכרים](https://mullvad.net/en/servers/). הם משתמשים ב-[ShadowSocks](https://shadowsocks.org/) בתצורת ShadowSocks + OpenVPN שלהם, מה שהופך אותם לעמידות יותר בפני חומות אש עם [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) שמנסה לחסום VPNs. לכאורה, [סין צריכה להשתמש בשיטה אחרת כדי לחסום שרתי ShadowSocks ](https://github.com/net4people/bbs/issues/22). האתר של Mullvad נגיש גם דרך Tor בכתובת [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. לכאורה, [סין צריכה להשתמש בשיטה אחרת כדי לחסום שרתי ShadowSocks ](https://github.com/net4people/bbs/issues/22). האתר של Mullvad נגיש גם דרך Tor בכתובת [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## קריטריונים diff --git a/i18n/hi/CODE_OF_CONDUCT.md b/i18n/hi/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/hi/CODE_OF_CONDUCT.md +++ b/i18n/hi/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/hi/about/index.md b/i18n/hi/about/index.md index 9c3a0d47..618957d5 100644 --- a/i18n/hi/about/index.md +++ b/i18n/hi/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/hi/about/notices.md b/i18n/hi/about/notices.md index d948a76a..0ef0e6f8 100644 --- a/i18n/hi/about/notices.md +++ b/i18n/hi/about/notices.md @@ -29,7 +29,7 @@ This does not include third-party code embedded in this repository, or code wher This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* +We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ You must not conduct any systematic or automated data collection activities on o --- -*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/hi/about/privacytools.md b/i18n/hi/about/privacytools.md index 512ebb93..0c889f62 100644 --- a/i18n/hi/about/privacytools.md +++ b/i18n/hi/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/hi/advanced/communication-network-types.md b/i18n/hi/advanced/communication-network-types.md index 1f07a2c4..f6444ca4 100644 --- a/i18n/hi/advanced/communication-network-types.md +++ b/i18n/hi/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/hi/advanced/dns-overview.md b/i18n/hi/advanced/dns-overview.md index 21889d85..2ffb67b2 100644 --- a/i18n/hi/advanced/dns-overview.md +++ b/i18n/hi/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/hi/advanced/payments.md b/i18n/hi/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/hi/advanced/payments.md +++ b/i18n/hi/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/hi/advanced/tor-overview.md b/i18n/hi/advanced/tor-overview.md index 8a6ab1ce..cc7a2fad 100644 --- a/i18n/hi/advanced/tor-overview.md +++ b/i18n/hi/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/hi/android.md b/i18n/hi/android.md index 6a650455..2f79dd91 100644 --- a/i18n/hi/android.md +++ b/i18n/hi/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,7 +113,7 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/hi/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/hi/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/hi/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/hi/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/hi/assets/img/how-tor-works/tor-encryption.svg b/i18n/hi/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/hi/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/hi/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/hi/assets/img/how-tor-works/tor-path-dark.svg b/i18n/hi/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/hi/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/hi/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/hi/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/hi/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/hi/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/hi/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/hi/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/hi/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/hi/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/hi/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/hi/assets/img/how-tor-works/tor-path.svg b/i18n/hi/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/hi/assets/img/how-tor-works/tor-path.svg +++ b/i18n/hi/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/hi/basics/account-deletion.md b/i18n/hi/basics/account-deletion.md index cd89ea6f..857a57d8 100644 --- a/i18n/hi/basics/account-deletion.md +++ b/i18n/hi/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/hi/basics/common-misconceptions.md b/i18n/hi/basics/common-misconceptions.md index 74650997..5aeaae95 100644 --- a/i18n/hi/basics/common-misconceptions.md +++ b/i18n/hi/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/hi/basics/common-threats.md b/i18n/hi/basics/common-threats.md index a8102469..67bd483b 100644 --- a/i18n/hi/basics/common-threats.md +++ b/i18n/hi/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacy From Service Providers @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/hi/basics/email-security.md b/i18n/hi/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/hi/basics/email-security.md +++ b/i18n/hi/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/hi/basics/multi-factor-authentication.md b/i18n/hi/basics/multi-factor-authentication.md index 75cb7e9b..92a563d7 100644 --- a/i18n/hi/basics/multi-factor-authentication.md +++ b/i18n/hi/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/hi/basics/passwords-overview.md b/i18n/hi/basics/passwords-overview.md index 63b87498..5a828342 100644 --- a/i18n/hi/basics/passwords-overview.md +++ b/i18n/hi/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/hi/basics/vpn-overview.md b/i18n/hi/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/hi/basics/vpn-overview.md +++ b/i18n/hi/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/hi/basics/why-privacy-matters.md b/i18n/hi/basics/why-privacy-matters.md index b89423e0..b48c26e5 100644 --- a/i18n/hi/basics/why-privacy-matters.md +++ b/i18n/hi/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/hi/calendar.md b/i18n/hi/calendar.md index fd26697b..8390538c 100644 --- a/i18n/hi/calendar.md +++ b/i18n/hi/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/hi/cloud.md b/i18n/hi/cloud.md index 34b98b3d..166e2dd6 100644 --- a/i18n/hi/cloud.md +++ b/i18n/hi/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/hi/cryptocurrency.md b/i18n/hi/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/hi/cryptocurrency.md +++ b/i18n/hi/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/hi/data-redaction.md b/i18n/hi/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/hi/data-redaction.md +++ b/i18n/hi/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/hi/desktop-browsers.md b/i18n/hi/desktop-browsers.md index 65743bb4..90f25c19 100644 --- a/i18n/hi/desktop-browsers.md +++ b/i18n/hi/desktop-browsers.md @@ -70,8 +70,8 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ We are working on establishing defined criteria for every section of our site, a - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -462,4 +462,4 @@ Our best-case criteria represents what we would like to see from the perfect pro - Must directly impact user privacy, i.e. must not simply provide information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/hi/desktop.md b/i18n/hi/desktop.md index 5252084a..1fac706b 100644 --- a/i18n/hi/desktop.md +++ b/i18n/hi/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/hi/device-integrity.md b/i18n/hi/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/hi/device-integrity.md +++ b/i18n/hi/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/hi/dns.md b/i18n/hi/dns.md index 61171598..4a78760f 100644 --- a/i18n/hi/dns.md +++ b/i18n/hi/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## Recommended Providers -| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | +| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ After installation of either a configuration profile or an app that uses the DNS #### Signed Profiles -Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home features a polished web interface to view insights and manage blocked content. @@ -144,13 +144,13 @@ AdGuard Home features a polished web interface to view insights and manage block ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -159,8 +159,8 @@ Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to suc
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/hi/email-clients.md b/i18n/hi/email-clients.md index 7434f6bb..c7051cdb 100644 --- a/i18n/hi/email-clients.md +++ b/i18n/hi/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/hi/email.md b/i18n/hi/email.md index c0374704..c4637e6b 100644 --- a/i18n/hi/email.md +++ b/i18n/hi/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail has internal crash reports that they **do not** share with third par #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. +Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -129,7 +129,7 @@ Proton Mail doesn't offer a digital legacy feature. #### :material-check:{ .pg-green } Custom Domains and Aliases -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -137,17 +137,17 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro #### :material-check:{ .pg-green } Account Security -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security -Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } Email Encryption -Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Your account will be set to a restricted user account when your contract ends, a #### :material-information-outline:{ .pg-blue } Additional Functionality -You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. -All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criteria @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/hi/encryption.md b/i18n/hi/encryption.md index d774167a..aa3ee158 100644 --- a/i18n/hi/encryption.md +++ b/i18n/hi/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/hi/file-sharing.md b/i18n/hi/file-sharing.md index d7cd5832..f6732765 100644 --- a/i18n/hi/file-sharing.md +++ b/i18n/hi/file-sharing.md @@ -15,7 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/hi/financial-services.md b/i18n/hi/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/hi/financial-services.md +++ b/i18n/hi/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/hi/frontends.md b/i18n/hi/frontends.md index 01d5ea76..1769b24a 100644 --- a/i18n/hi/frontends.md +++ b/i18n/hi/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/hi/index.md b/i18n/hi/index.md index ebb23566..c19723a2 100644 --- a/i18n/hi/index.md +++ b/i18n/hi/index.md @@ -62,7 +62,7 @@ Trying to protect all your data from everyone all the time is impractical, expen ## We need you! Here's how to get involved: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } [:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } [:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } [:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } diff --git a/i18n/hi/kb-archive.md b/i18n/hi/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/hi/kb-archive.md +++ b/i18n/hi/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/hi/meta/admonitions.md b/i18n/hi/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/hi/meta/admonitions.md +++ b/i18n/hi/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/hi/meta/translations.md b/i18n/hi/meta/translations.md index 30b4c572..60261b1c 100644 --- a/i18n/hi/meta/translations.md +++ b/i18n/hi/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/hi/meta/uploading-images.md b/i18n/hi/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/hi/meta/uploading-images.md +++ b/i18n/hi/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/hi/meta/writing-style.md b/i18n/hi/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/hi/meta/writing-style.md +++ b/i18n/hi/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/hi/mobile-browsers.md b/i18n/hi/mobile-browsers.md index 57ae950f..e1875e1a 100644 --- a/i18n/hi/mobile-browsers.md +++ b/i18n/hi/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ These are our currently recommended mobile web browsers and configurations for s ## Android -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/hi/multi-factor-authentication.md b/i18n/hi/multi-factor-authentication.md index 830c33c8..ee60af63 100644 --- a/i18n/hi/multi-factor-authentication.md +++ b/i18n/hi/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/hi/news-aggregators.md b/i18n/hi/news-aggregators.md index 17438718..00b22c26 100644 --- a/i18n/hi/news-aggregators.md +++ b/i18n/hi/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/hi/notebooks.md b/i18n/hi/notebooks.md index 2131e5e0..0eb1ebef 100644 --- a/i18n/hi/notebooks.md +++ b/i18n/hi/notebooks.md @@ -34,7 +34,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ If you are currently using an application like Evernote, Google Keep, or Microso Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/hi/os/android-overview.md b/i18n/hi/os/android-overview.md index 1ffa3cdc..f866b6cb 100644 --- a/i18n/hi/os/android-overview.md +++ b/i18n/hi/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/hi/os/ios-overview.md b/i18n/hi/os/ios-overview.md index 949d360e..d2744bad 100644 --- a/i18n/hi/os/ios-overview.md +++ b/i18n/hi/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/hi/os/linux-overview.md b/i18n/hi/os/linux-overview.md index da9fa962..56db7195 100644 --- a/i18n/hi/os/linux-overview.md +++ b/i18n/hi/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/hi/os/macos-overview.md b/i18n/hi/os/macos-overview.md index 584d1acc..aa5541ea 100644 --- a/i18n/hi/os/macos-overview.md +++ b/i18n/hi/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Recommended Configuration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/hi/os/qubes-overview.md b/i18n/hi/os/qubes-overview.md index c76924d9..fcea270b 100644 --- a/i18n/hi/os/qubes-overview.md +++ b/i18n/hi/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/hi/passwords.md b/i18n/hi/passwords.md index da2b5d77..1514d105 100644 --- a/i18n/hi/passwords.md +++ b/i18n/hi/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/hi/photo-management.md b/i18n/hi/photo-management.md index a041bdcb..1bb46cae 100644 --- a/i18n/hi/photo-management.md +++ b/i18n/hi/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/hi/productivity.md b/i18n/hi/productivity.md index c63e28bb..1612e148 100644 --- a/i18n/hi/productivity.md +++ b/i18n/hi/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/hi/real-time-communication.md b/i18n/hi/real-time-communication.md index bb96b9c2..6a1f7de0 100644 --- a/i18n/hi/real-time-communication.md +++ b/i18n/hi/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/hi/router.md b/i18n/hi/router.md index 870cd79e..a54378c6 100644 --- a/i18n/hi/router.md +++ b/i18n/hi/router.md @@ -35,10 +35,10 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/hi/search-engines.md b/i18n/hi/search-engines.md index 7fc05e18..9ffdbb0b 100644 --- a/i18n/hi/search-engines.md +++ b/i18n/hi/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/hi/tools.md b/i18n/hi/tools.md index e10a0165..3c0afbab 100644 --- a/i18n/hi/tools.md +++ b/i18n/hi/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Learn more :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/hi/tor.md b/i18n/hi/tor.md index 04bc51b7..3c240ddc 100644 --- a/i18n/hi/tor.md +++ b/i18n/hi/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a -The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake does not increase your privacy in any way, nor is it used to connect t Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/hi/vpn.md b/i18n/hi/vpn.md index caeab50a..e7bc610a 100644 --- a/i18n/hi/vpn.md +++ b/i18n/hi/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria diff --git a/i18n/hu/CODE_OF_CONDUCT.md b/i18n/hu/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/hu/CODE_OF_CONDUCT.md +++ b/i18n/hu/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/hu/about/index.md b/i18n/hu/about/index.md index ff8ef119..ce7a724c 100644 --- a/i18n/hu/about/index.md +++ b/i18n/hu/about/index.md @@ -21,19 +21,19 @@ schema: A **Privacy Guides** egy szociálisan motivált weboldal, amely [információkat nyújt](/kb) az adatbiztonság és a magánélet védelméről. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. Mi egy non-profit csoport vagyunk, ameit teljes egészében önkéntes [csapattagok](https://discuss.privacyguides.net/g/team) és közreműködők működtetnek. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Honlap } -[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Forráskód" } -[:octicons-heart-16:](donate.md){ .card-link title=Közreműködés } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } +[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } +[:octicons-heart-16:](donate.md){ .card-link title=Contribute } > Hogy [adatvédelemre összpontosító alternatív] alkalmazásokat találj, tekints meg olyan oldalakat, mint a Good Reports és a **Privacy Guides**, amelyek adatvédelemre összpontosító alkalmazásokat sorolnak fel különböző kategóriákban, beleértve az olyan (általában fizetős) e-mail szolgáltatókat is, amelyeket nem big tech vállalatok üzemeltetnek. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > Ha egy új VPN-t keresel, akkor szinte bármelyik podcastban találsz egy kedvezménykódot. Ha egy **jó** VPN-t keresel, akkor profi segítségre van szükséged. Ugyanez vonatkozik e-mail kliensekre, böngészőkre, operációs rendszerekre és jelszókezelőkre. Honnan tudhatod, hogy melyik a legjobb, legbiztonságosabb, a magánéletet legjobban tisztelő választás? Ehhez van itt a **Privacy Guides**, egy olyan platform, amelyen számos önkéntes nap mint nap keresi a legjobb adatvédelmi eszközöket az interneten. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## Történet @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/hu/about/notices.md b/i18n/hu/about/notices.md index 9190518f..aa36e7ab 100644 --- a/i18n/hu/about/notices.md +++ b/i18n/hu/about/notices.md @@ -29,7 +29,7 @@ Ez nem vonatkozik az ebbe az adattárba beágyazott, harmadik féltől származ Ez azt jelenti, hogy az ebben a adattárban található, ember által olvasható tartalmat felhasználhatod saját projektedhez, a Creative Commons Attribution-NoDerivatives 4.0 International Public License szövegben foglalt feltételei szerint. Te **nem** használhatod a Privacy Guides márkajelzéseit saját projektedben ennek a projektnek a kifejezett jóváhagyása nélkül. Te **nem** használhatod a Privacy Guides márkajelzéseit saját projektedben ennek a projektnek a kifejezett jóváhagyása nélkül. A Privacy Guides márkavédjegyei közé tartozik a "Privacy Guides" szóvédjegy és a pajzs logó. -Úgy véljük, hogy az `assets`-ekben található logók és egyéb, harmadik féltől származó képek vagy közkincsek, vagy **fair use** alatt állnak. Dióhéjban, a jogi [fair use elmélet](https://www.copyright.gov/fair-use/more-info.html) lehetővé teszi a szerzői joggal védett képek felhasználását a téma azonosítása érdekében nyilvános komment céljából. Ezek a logók és egyéb képek azonban egy vagy több joghatóságban továbbra is védjegyekre vonatkozó törvények hatálya alá tartozhatnak. Mielőtt felhasználnád ezt a tartalmat, kérjük, győződj meg arról, hogy a védjegyet a védjegyegy tulajdonló entitás, vagy szervezet azonosítására használatos, illetve hogy az általad tervezett felhasználás körülményei között alkalmazandó törvények értelmében jogosult vagy-e annak használatára. *A weboldal tartalmának másolásakor kizárólag te vagy felelős azért, hogy ne sértsd meg más védjegyét vagy szerzői jogát.* +Úgy véljük, hogy az `assets`-ekben található logók és egyéb, harmadik féltől származó képek vagy közkincsek, vagy **fair use** alatt állnak. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. Ezek a logók és egyéb képek azonban egy vagy több joghatóságban továbbra is védjegyekre vonatkozó törvények hatálya alá tartozhatnak. Mielőtt felhasználnád ezt a tartalmat, kérjük, győződj meg arról, hogy a védjegyet a védjegyegy tulajdonló entitás, vagy szervezet azonosítására használatos, illetve hogy az általad tervezett felhasználás körülményei között alkalmazandó törvények értelmében jogosult vagy-e annak használatára. *A weboldal tartalmának másolásakor kizárólag te vagy felelős azért, hogy ne sértsd meg más védjegyét vagy szerzői jogát.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ Kifejezett írásbeli hozzájárulás nélkül nem végezhetsz semmilyen sziszte --- -*A közlemény egyes részei a GitHub-on található [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) dokumentumból lettek átvéve. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*A közlemény egyes részei a GitHub-on található [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) dokumentumból lettek átvéve. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/hu/about/privacytools.md b/i18n/hu/about/privacytools.md index 66a52327..389cb00b 100644 --- a/i18n/hu/about/privacytools.md +++ b/i18n/hu/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/hu/advanced/communication-network-types.md b/i18n/hu/advanced/communication-network-types.md index be2dcb71..cacec261 100644 --- a/i18n/hu/advanced/communication-network-types.md +++ b/i18n/hu/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Néhány saját működtetésű üzenetküldő lehetővé teszi, hogy saját sze - Tartalmazhat [korlátozott ellenőrzést vagy hozzáférést](https://drewdevault.com/2018/08/08/Signal.html). Ez olyan dolgokat foglalhat magában, mint: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Gyakran a Felhasználási Feltételekben van meghatározva. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Föderált Hálózatok @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/hu/advanced/dns-overview.md b/i18n/hu/advanced/dns-overview.md index 21889d85..2ffb67b2 100644 --- a/i18n/hu/advanced/dns-overview.md +++ b/i18n/hu/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/hu/advanced/payments.md b/i18n/hu/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/hu/advanced/payments.md +++ b/i18n/hu/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/hu/advanced/tor-overview.md b/i18n/hu/advanced/tor-overview.md index e10fe17e..2193d843 100644 --- a/i18n/hu/advanced/tor-overview.md +++ b/i18n/hu/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/hu/android.md b/i18n/hu/android.md index 64e2c9c5..f21c3ba9 100644 --- a/i18n/hu/android.md +++ b/i18n/hu/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,7 +113,7 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/hu/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/hu/assets/img/how-tor-works/tor-encryption-dark.svg index 3fd9b575..0f1e0716 100644 --- a/i18n/hu/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/hu/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Az - - Eszközöd - - - - Adatok küldése egy webhelynek - - - - - Adatok fogadása egy webhelyről - - - - - Az - - Eszközöd - - - - Belépő - - - - - Közép - - - - - Kilépő - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Belépő - - - - - Közép - - - - - Kilépő - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/hu/assets/img/how-tor-works/tor-encryption.svg b/i18n/hu/assets/img/how-tor-works/tor-encryption.svg index 0d42a82d..f954fb0f 100644 --- a/i18n/hu/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/hu/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Az - - Eszközöd - - - - Adatok küldése egy webhelynek - - - - - Adatok fogadása egy webhelyről - - - - - Az - - Eszközöd - - - - Belépő - - - - - Közép - - - - - Kilépő - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Belépő - - - - - Közép - - - - - Kilépő - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/hu/assets/img/how-tor-works/tor-path-dark.svg b/i18n/hu/assets/img/how-tor-works/tor-path-dark.svg index af62c99f..412a1da1 100644 --- a/i18n/hu/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/hu/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Az - Eszközöd - - - - Belépő - - - - - Közép - - - - - Kilépő - - - - - PrivacyGuides.org - - - - - - - - + + + + Az + Eszközöd + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/hu/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/hu/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index a80d7480..ce51beee 100644 --- a/i18n/hu/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/hu/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - A te - - - Eszközöd - - - - - - Őr - - - Elosztó - - - Elosztó - - - - - rejtett...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Találkozó - - - Elosztó - - - - - Belépő - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/hu/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/hu/assets/img/how-tor-works/tor-path-hidden-service.svg index 86dd7dad..8d008447 100644 --- a/i18n/hu/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/hu/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - A te - - - Eszközöd - - - - - - Őr - - - Elosztó - - - Elosztó - - - - - rejtett...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Találkozó - - - Elosztó - - - - - Belépő - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/hu/assets/img/how-tor-works/tor-path.svg b/i18n/hu/assets/img/how-tor-works/tor-path.svg index 9df7ac98..7e8476ec 100644 --- a/i18n/hu/assets/img/how-tor-works/tor-path.svg +++ b/i18n/hu/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + @@ -25,21 +25,21 @@ Az - Eszközöd + Eszközöd - Belépő + Belépő - Közép + Közép - Kilépő + Kilépő diff --git a/i18n/hu/basics/account-deletion.md b/i18n/hu/basics/account-deletion.md index 6d5d5396..2fc95a4a 100644 --- a/i18n/hu/basics/account-deletion.md +++ b/i18n/hu/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/hu/basics/common-misconceptions.md b/i18n/hu/basics/common-misconceptions.md index 2007ea10..a6aabec2 100644 --- a/i18n/hu/basics/common-misconceptions.md +++ b/i18n/hu/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/hu/basics/common-threats.md b/i18n/hu/basics/common-threats.md index 18ce9166..7f0f8ae2 100644 --- a/i18n/hu/basics/common-threats.md +++ b/i18n/hu/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacy From Service Providers @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/hu/basics/email-security.md b/i18n/hu/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/hu/basics/email-security.md +++ b/i18n/hu/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/hu/basics/multi-factor-authentication.md b/i18n/hu/basics/multi-factor-authentication.md index bf49f773..7ccaaa4a 100644 --- a/i18n/hu/basics/multi-factor-authentication.md +++ b/i18n/hu/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/hu/basics/passwords-overview.md b/i18n/hu/basics/passwords-overview.md index ae1e55de..6ee69041 100644 --- a/i18n/hu/basics/passwords-overview.md +++ b/i18n/hu/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/hu/basics/vpn-overview.md b/i18n/hu/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/hu/basics/vpn-overview.md +++ b/i18n/hu/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/hu/basics/why-privacy-matters.md b/i18n/hu/basics/why-privacy-matters.md index 0746a24f..74ff30d0 100644 --- a/i18n/hu/basics/why-privacy-matters.md +++ b/i18n/hu/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/hu/calendar.md b/i18n/hu/calendar.md index 3c25173b..40794f34 100644 --- a/i18n/hu/calendar.md +++ b/i18n/hu/calendar.md @@ -13,7 +13,7 @@ A naptárak a legérzékenyebb adataidat tartalmazzák; használj at rest End-to ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). A több naptár és kiterjesztett megosztási funkciók csak a fizetett előfizetőknek elérhető. @@ -21,18 +21,18 @@ A több naptár és kiterjesztett megosztási funkciók csak a fizetett előfize [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ A **Proton Calendar** egy titkosított naptárszolgáltatás, amely a Proton-tag Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/hu/cloud.md b/i18n/hu/cloud.md index e408b6f8..1faf26fc 100644 --- a/i18n/hu/cloud.md +++ b/i18n/hu/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Követelmények diff --git a/i18n/hu/cryptocurrency.md b/i18n/hu/cryptocurrency.md index 39214d36..18b527e9 100644 --- a/i18n/hu/cryptocurrency.md +++ b/i18n/hu/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/hu/data-redaction.md b/i18n/hu/data-redaction.md index 89291cc9..57fbd341 100644 --- a/i18n/hu/data-redaction.md +++ b/i18n/hu/data-redaction.md @@ -88,12 +88,12 @@ Az alkalmazás többféle módszert nyújt metaadatokat törléséhez a képekr A **Metapho** egy egyszerű és letisztult megjelenítője fényképek metaadatainak, mint például dátum, fájlnév, méret, fényképező modell, zársebesség és helyszín. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ A **Metapho** egy egyszerű és letisztult megjelenítője fényképek metaadata A **PrivacyBlur** egy ingyenes alkalmazás, amely képes elmosni képek érzékeny részeit, mielőtt online megosztanád azokat. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ A **PrivacyBlur** egy ingyenes alkalmazás, amely képes elmosni képek érzéke Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/hu/desktop-browsers.md b/i18n/hu/desktop-browsers.md index 2fa9c90a..b631e24f 100644 --- a/i18n/hu/desktop-browsers.md +++ b/i18n/hu/desktop-browsers.md @@ -70,8 +70,8 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ Azon dolgozunk, hogy meghatározott követelményeket állapítsunk meg az oldal - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Legjobb esetben A legjobb esetben alkalmazott követelményeink azt fejezik ki, hogy mit szeretnénk látni egy kifogástalan projekttől ebben a kategóriában. Előfordulhat, hogy ajánlásaink nem tartalmazzák az összes ilyen funkciót, de azok, amelyek igen, magasabb helyen szerepelhetnek, mint mások ezen az oldalon. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -462,4 +462,4 @@ A legjobb esetben alkalmazott követelményeink azt fejezik ki, hogy mit szeretn - Must directly impact user privacy, i.e. must not simply provide information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/hu/desktop.md b/i18n/hu/desktop.md index f2d64153..bbf5d363 100644 --- a/i18n/hu/desktop.md +++ b/i18n/hu/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/hu/device-integrity.md b/i18n/hu/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/hu/device-integrity.md +++ b/i18n/hu/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/hu/dns.md b/i18n/hu/dns.md index 38ce28da..db10fa7f 100644 --- a/i18n/hu/dns.md +++ b/i18n/hu/dns.md @@ -11,14 +11,14 @@ Titkosított DNS-t harmadik féltől származó szerverekkel csak alapvető [DNS ## Ajánlott Szolgáltatók -| DNS Szolgáltatók | Adatvédelmi Tájékoztató | Protokollok | Naplózás | ECS | Szűrés | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | --------------- | ----------- | ---------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Némi[^1] | Yes | Based on personal configuration. A használt szűrőlista itt található. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Nyílt szöveg
DoH/3
DoT | Némi[^2] | Nem | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Nyílt szöveg
DoH/3
DoT
DoQ | Választható[^3] | Nem | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | Nem[^4] | Nem | Based on personal configuration. A használt szűrőlista itt található. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Nyílt szöveg
DoH/3
DoT
DoQ | Választható[^5] | Választható | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Nyílt szöveg
DoH
DoT
DNSCrypt | Némi[^6] | Választható | Based on personal configuration, Malware blocking by default. | +| DNS Szolgáltatók | Adatvédelmi Tájékoztató | Protokollok | Naplózás | ECS | Szűrés | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | --------------- | ----------- | ---------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Némi[^1] | Yes | Based on personal configuration. A használt szűrőlista itt található. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Nyílt szöveg
DoH/3
DoT | Némi[^2] | Nem | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Nyílt szöveg
DoH/3
DoT
DoQ | Választható[^3] | Nem | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | Nem[^4] | Nem | Based on personal configuration. A használt szűrőlista itt található. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Nyílt szöveg
DoH/3
DoT
DoQ | Választható[^5] | Választható | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Nyílt szöveg
DoH
DoT
DNSCrypt | Némi[^6] | Választható | Based on personal configuration, Malware blocking by default. | ### Követelmények @@ -50,7 +50,7 @@ Egy konfigurációs profilt vagy egy DNS-beállítások API-t használó alkalma #### Aláírt Profilok -Az Apple nem biztosít natív felületet titkosított DNS-profilok létrehozásához. A [Secure DNS profile creator](https://dns.notjakob.com/tool.html) egy nem hivatalos eszköz saját titkosított DNS-profilok létrehozására, azonban ezek a profilok nem lesznek aláírva. Az aláírt profilok előnyben részesítendők; az aláírás igazolja a profil eredetét, és segít biztosítani a profilok integritását. Az aláírt konfigurációs profilok zöld "Ellenőrzött" címkét kapnak. A kódaláírással kapcsolatos további információkért lásd: [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **** Aláírt profilokat az [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), a [NextDNS](https://apple.nextdns.io) és a [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/) nyújt. +Az Apple nem biztosít natív felületet titkosított DNS-profilok létrehozásához. A [Secure DNS profile creator](https://dns.notjakob.com/tool.html) egy nem hivatalos eszköz saját titkosított DNS-profilok létrehozására, azonban ezek a profilok nem lesznek aláírva. Az aláírt profilok előnyben részesítendők; az aláírás igazolja a profil eredetét, és segít biztosítani a profilok integritását. Az aláírt konfigurációs profilok zöld "Ellenőrzött" címkét kapnak. A kódaláírással kapcsolatos további információkért lásd: [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ A **RethinkDNS** egy nyílt forráskódú Android kliens, amely támogatja a [DN [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ Egy saját üzemeltetésű DNS-megoldás hasznos ellenőrzött platformokon, pé ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -Az **AdGuard Home** egy nyílt forráskódú [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole), amely [DNS-szűrést](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) alkalmaz nem kívánatos webes tartalmak, például hirdetések blokkolására. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Az AdGuard Home egy kifinomult webes felületet kínál az betekintések megtekintéséhez és blokkolt tartalmak kezeléséhez. @@ -144,23 +144,23 @@ Az AdGuard Home egy kifinomult webes felületet kínál az betekintések megteki ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -A **Pi-hole** egy nyílt forráskódú [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole), amely [DNS-szűrést](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) alkalmaz nem kívánatos webes tartalmak, például reklámok blokkolására. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. A Pi-hole-t úgy tervezték, hogy egy Raspberry Pi-n lehessen üzemeltetni, de az nem korlátozott erre a hardverre. Az szoftver egy kifinomult webes felületet kínál az betekintések megtekintéséhez és blokkolt tartalmak kezeléséhez. -[:octicons-home-16: Honlap](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Adatvédelmi Tájékoztató" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Dokumentáció} -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Forráskód" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Közreműködés } +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
[^1]: Az AdGuard tárolja a DNS szervereik összesített teljesítményméréseit, nevezetesen az adott szerverhez érkező teljes kérések számát, a blokkolt kérések számát és a kérések feldolgozásának sebességét. Az elmúlt 24 órában igényelt domainek adatbázisát is eltárolják. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/hu/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: A Cloudflare csak azokat a korlátozott DNS-lekérdezési adatokat gyűjti és tárolja ami az 1.1.1.1 resolverhez érkezik. Az 1.1.1.1 resolver szolgáltatás nem naplóz személyes adatokat, és a korlátozott, személyazonosításra nem alkalmas lekérdezési adatok nagy részét csak 25 órán keresztül tárolja. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: A Cloudflare csak azokat a korlátozott DNS-lekérdezési adatokat gyűjti és tárolja ami az 1.1.1.1 resolverhez érkezik. Az 1.1.1.1 resolver szolgáltatás nem naplóz személyes adatokat, és a korlátozott, személyazonosításra nem alkalmas lekérdezési adatok nagy részét csak 25 órán keresztül tárolja. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: A Control D csak az egyedi DNS-profilokkal rendelkező Premium resolverek esetében naplóz. Az ingyenes resolverek nem naplóznak adatokat. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: A Mullvad DNS szolgáltatása a Mullvad VPN előfizetői és nem előfizetői számára egyaránt elérhető. Az adatvédelmi irányelvük kifejezetten azt állítja, hogy semmilyen módon nem naplóznak DNS-kéréseket. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: A Mullvad DNS szolgáltatása a Mullvad VPN előfizetői és nem előfizetői számára egyaránt elérhető. Az adatvédelmi irányelvük kifejezetten azt állítja, hogy semmilyen módon nem naplóznak DNS-kéréseket. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. A kiválasztott naplók megőrzési idejét és tárolási helyét is kiválaszthatod. Ha erre nincs külön kérés, akkor nem kerül naplózásra semmilyen adat. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: A Quad9 bizonyos adatokat a fenyegetések megfigyelése és elhárítása céljából gyűjt. Ezek az adatok ezután összekeverhetők és megoszthatók, például biztonsági kutatások céljából. A Quad9 nem gyűjt vagy rögzít IP-címeket vagy más, személyazonosításra alkalmasnak ítélt adatokat. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: A Quad9 bizonyos adatokat a fenyegetések megfigyelése és elhárítása céljából gyűjt. Ezek az adatok ezután összekeverhetők és megoszthatók, például biztonsági kutatások céljából. A Quad9 nem gyűjt vagy rögzít IP-címeket vagy más, személyazonosításra alkalmasnak ítélt adatokat. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/hu/email-clients.md b/i18n/hu/email-clients.md index 5ca9c967..003e6664 100644 --- a/i18n/hu/email-clients.md +++ b/i18n/hu/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/hu/email.md b/i18n/hu/email.md index a152f4df..7fe40521 100644 --- a/i18n/hu/email.md +++ b/i18n/hu/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail has internal crash reports that they **do not** share with third par #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. +Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -129,7 +129,7 @@ Proton Mail doesn't offer a digital legacy feature. #### :material-check:{ .pg-green } Custom Domains and Aliases -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -137,17 +137,17 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro #### :material-check:{ .pg-green } Account Security -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security -Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } Email Encryption -Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Your account will be set to a restricted user account when your contract ends, a #### :material-information-outline:{ .pg-blue } Additional Functionality -You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. -All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Követelmények @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Alap Elvárások Minősítéshez:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programok és/vagy összehangolt sebezhetőség-közzétételi folyamat. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Bizalom diff --git a/i18n/hu/encryption.md b/i18n/hu/encryption.md index 26cd9758..989e3c7c 100644 --- a/i18n/hu/encryption.md +++ b/i18n/hu/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/hu/file-sharing.md b/i18n/hu/file-sharing.md index 3e93f103..c091b88a 100644 --- a/i18n/hu/file-sharing.md +++ b/i18n/hu/file-sharing.md @@ -15,7 +15,7 @@ Fedezd fel, hogyan oszthatod meg fájljaid privát módon készülékek között ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -A **Send** a Mozilla megszűnt Firefox Send szolgáltatásának egy forkja, amely lehetővé teszi, hogy fájlokat küldj másoknak egy link segítségével. A fájlok az eszközön kerülnek titkosításra, így a szerver nem tudja azokat elolvasni, és választhatóan jelszóval is védhetők. A Send karbantartója egy [publikus instance-et](https://send.vis.ee/) üzemeltet. Használhatsz más nyilvános instanceket, vagy magad is üzemeltetheted a Send-et. +A **Send** a Mozilla megszűnt Firefox Send szolgáltatásának egy forkja, amely lehetővé teszi, hogy fájlokat küldj másoknak egy link segítségével. A fájlok az eszközön kerülnek titkosításra, így a szerver nem tudja azokat elolvasni, és választhatóan jelszóval is védhetők. The maintainer of Send hosts a [public instance](https://send.vis.ee). Használhatsz más nyilvános instanceket, vagy magad is üzemeltetheted a Send-et. [:octicons-home-16: Honlap](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Publikus Instancek"} @@ -80,10 +80,10 @@ Azon dolgozunk, hogy meghatározott követelményeket állapítsunk meg az oldal A **FreedomBox** egy operációs rendszer, amelyet [single-board számítógépen (SBC)](https://en.wikipedia.org/wiki/Single-board_computer) történő futtatásra terveztek. Célja az, hogy megkönnyítse szerveralkalmazások beállítását, amelyeket esetleg magad szeretnél üzemeltetni. -[:octicons-home-16: Honlap](https://freedombox.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Dokumentáció} -[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Forráskód" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Közreműködés } +[:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} +[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ A **Nextcloud** egy ingyenes és nyílt forráskódú kliens-szerver szoftvercso [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ A **Syncthing** egy nyílt forráskódú peer-to-peer folyamatos fájlszinkroniz [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/hu/financial-services.md b/i18n/hu/financial-services.md index 9e135841..d493d733 100644 --- a/i18n/hu/financial-services.md +++ b/i18n/hu/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/hu/frontends.md b/i18n/hu/frontends.md index af08eb4a..25be6a4a 100644 --- a/i18n/hu/frontends.md +++ b/i18n/hu/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/hu/index.md b/i18n/hu/index.md index 14a5f3a0..f9a3fefc 100644 --- a/i18n/hu/index.md +++ b/i18n/hu/index.md @@ -62,12 +62,12 @@ Megpróbálni az összes adatodat mindenkitől és mindig megvédeni nem praktik ## Szükségünk van rád! Itt van, hogyan tudsz részt venni: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Csatlakozz a Fórumunkhoz" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Kövess minket a Mastodonon" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Járulj hozzá a weboldalhoz" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Segíts lefordítani a weboldalt" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Csevegj velünk a Matrixon" } -[:material-information-outline:](about/index.md){ title="Tudjon meg többet rólunk" } -[:material-hand-coin-outline:](about/donate.md){ title="Támogasd a projektet" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } Fontos, hogy egy olyan weboldal, mint a Privacy Guides, mindig naprakész maradjon. Szükségünk van arra, hogy a közönségünk figyelemmel kísérje az oldalunkon felsorolt alkalmazások frissítéseit, és kövesse az általunk ajánlott szolgáltatókkal kapcsolatos legújabb híreket. Nehéz lépést tartani az internet gyors tempójával, de mi megteszünk minden tőlünk telhetőt. Ha hibát észlelsz, úgy gondolod, hogy egy szolgáltatónak nem kellene szerepelnie a listán, észreveszed, hogy egy alkalmas szolgáltató hiányzik, úgy véled, hogy egy böngésző bővítmény már nem a legjobb választás, vagy ha bármilyen más problémát észlelsz, kérjük, jelezd nekünk. diff --git a/i18n/hu/kb-archive.md b/i18n/hu/kb-archive.md index 9faacbd9..7f74107c 100644 --- a/i18n/hu/kb-archive.md +++ b/i18n/hu/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Néhány oldal, amely korábban a tudásbázisunkban volt, most a blogunkon található: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Konfiguráció Hardenelés](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - Rendszer Hardenelés](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Alkalmazás Sandboxolás](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Biztonságos Adattörlés](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Metaadatok Eltávolításának Integrálása](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Konfigurációs Útmutató](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Konfiguráció Hardenelés](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - Rendszer Hardenelés](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Alkalmazás Sandboxolás](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Biztonságos Adattörlés](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Metaadatok Eltávolításának Integrálása](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Konfigurációs Útmutató](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/hu/meta/admonitions.md b/i18n/hu/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/hu/meta/admonitions.md +++ b/i18n/hu/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/hu/meta/translations.md b/i18n/hu/meta/translations.md index 30b4c572..60261b1c 100644 --- a/i18n/hu/meta/translations.md +++ b/i18n/hu/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/hu/meta/uploading-images.md b/i18n/hu/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/hu/meta/uploading-images.md +++ b/i18n/hu/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/hu/meta/writing-style.md b/i18n/hu/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/hu/meta/writing-style.md +++ b/i18n/hu/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/hu/mobile-browsers.md b/i18n/hu/mobile-browsers.md index 3668b3cc..ed71249f 100644 --- a/i18n/hu/mobile-browsers.md +++ b/i18n/hu/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ These are our currently recommended mobile web browsers and configurations for s ## Android -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/hu/multi-factor-authentication.md b/i18n/hu/multi-factor-authentication.md index 03932ca2..0cabd5d7 100644 --- a/i18n/hu/multi-factor-authentication.md +++ b/i18n/hu/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/hu/news-aggregators.md b/i18n/hu/news-aggregators.md index e8d81edd..08fbea65 100644 --- a/i18n/hu/news-aggregators.md +++ b/i18n/hu/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/hu/notebooks.md b/i18n/hu/notebooks.md index be7ca747..7e6889f7 100644 --- a/i18n/hu/notebooks.md +++ b/i18n/hu/notebooks.md @@ -34,7 +34,7 @@ A **Standard Notes** egy egyszerű és privát jegyzetkezelő alkalmazás, amely - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ A **Standard Notes** egy egyszerű és privát jegyzetkezelő alkalmazás, amely ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ A **Standard Notes** egy egyszerű és privát jegyzetkezelő alkalmazás, amely Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel A **Joplin** egy ingyenes, nyílt forráskódú, teljesen felszerelt jegyzetkezelő és teendő vezető alkalmazás, amely nagyszámú, jegyzetfüzetekbe és címkékbe rendezett markdown jegyzeteket képes kezelni. End-to-End titkosítást kínál, és képes szinkronizálni a Nextcloudon, a Dropboxon és sok máson keresztül is. Evernote és nyílt szöveges jegyzetek egyszerű importálását is lehetővé teszi. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ A Cryptee 100MB tárhelyet kínál ingyenesen, fizetős lehetőséggel, ha több ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -Az **Org-mode** egy [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) a GNU Emacs számára. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Szinkronizálás a [fájlszinkronizációs](file-sharing.md#file-sync) eszközökkel lehetséges. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Szinkronizálás a [fájlszinkronizációs](file-sharing.md#file-sync) eszközökkel lehetséges. [:octicons-home-16: Honlap](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Dokumentáció} diff --git a/i18n/hu/os/android-overview.md b/i18n/hu/os/android-overview.md index 04eef90f..18d05c57 100644 --- a/i18n/hu/os/android-overview.md +++ b/i18n/hu/os/android-overview.md @@ -60,7 +60,7 @@ Több OEM-gyártó is elrontotta a Verified Boot megvalósítását, amivel a ma A firmware-frissítések kritikus fontosságúak a biztonság fenntartása szempontjából, és nélkülük az eszközöd nem lehet biztonságos. Az OEM-gyártók támogatási megállapodásokat kötnek partnereikkel a zárt forráskódú komponensek korlátozott ideig történő biztosítására. Ezek a havonta megjelenő [Android Security Bulletin](https://source.android.com/security/bulletin)-ben vannak részletezve. -Mivel a telefon összetevői, például a processzor és a rádiótechnológiák zárt forráskódú komponensekre épülnek, a frissítéseket az adott gyártóknak kell biztosítaniuk. Ezért fontos, hogy olyan készüléket vásárolj ami rendelkezik aktív támogatási ciklussal. A [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) és a [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) 4 évig támogatja készülékeit, míg az olcsóbb termékek gyakran rövidebb támogatási ciklusokkal rendelkeznek. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +Mivel a telefon összetevői, például a processzor és a rádiótechnológiák zárt forráskódú komponensekre épülnek, a frissítéseket az adott gyártóknak kell biztosítaniuk. Ezért fontos, hogy olyan készüléket vásárolj ami rendelkezik aktív támogatási ciklussal. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. Az SoC gyártó által már nem támogatott, lejárt életciklusú eszközök nem kaphatnak firmware-frissítéseket OEM-gyártóktól vagy utángyártó Android-forgalmazóktól. Ez azt jelenti, hogy ezekkel az eszközökkel kapcsolatos biztonsági problémák javítatlanok maradnak. @@ -97,19 +97,19 @@ Android 13: Egy alkalmazás engedélyt kérhet egy adott funkciójához. Például minden olyan alkalmazásnak, amely QR-kódokat tud beolvasni, szüksége van a kamera engedélyre. Egyes alkalmazások a szükségesnél több engedélyt kérhetnek. -Az [Exodus](https://exodus-privacy.eu.org/) hasznos lehet hasonló célú alkalmazások összehasonlításakor. Ha egy alkalmazás sok engedélyt igényel, valamint sok reklámot és elemzést tartalmaz, az valószínűleg egy rossz jel. Javasoljuk, hogy tekintsd meg az egyes nyomkövetőket és olvasd el a leírásukat, ahelyett, hogy egyszerűen **megszámolod az összeset** azt feltételezve, hogy a felsorolt tételek egyenlőek. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. Ha egy alkalmazás sok engedélyt igényel, valamint sok reklámot és elemzést tartalmaz, az valószínűleg egy rossz jel. Javasoljuk, hogy tekintsd meg az egyes nyomkövetőket és olvasd el a leírásukat, ahelyett, hogy egyszerűen **megszámolod az összeset** azt feltételezve, hogy a felsorolt tételek egyenlőek.

Warning

-Ha egy alkalmazás többnyire egy webalapú szolgáltatás, a nyomon követés történhet a szerveroldalon. A [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) azt mutatja, hogy "nincsenek nyomkövetők", de minden bizonnyal nyomon követi a felhasználók érdeklődését és viselkedését az oldalon. Alkalmazások elkerülhetik az észlelést azzal, hogy nem használják a reklámipar által készített szabványos kódkönyvtárakat, bár ez nem valószínű. +Ha egy alkalmazás többnyire egy webalapú szolgáltatás, a nyomon követés történhet a szerveroldalon. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Alkalmazások elkerülhetik az észlelést azzal, hogy nem használják a reklámipar által készített szabványos kódkönyvtárakat, bár ez nem valószínű.

Note

-Az olyan magánélet-barát alkalmazások, mint a [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/), megjeleníthetnek néhány nyomkövetőt, mint például a [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). Ez a könyvtár tartalmazza a [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging)-et, amely [push értesítéseket](https://en.wikipedia.org/wiki/Push_technology) tud nyújtani az alkalmazásoknak. Ez [a helyzet](https://fosstodon.org/@bitwarden/109636825700482007) a Bitwardennel is. Ez nem jelenti azt, hogy a Bitwarden a Google Firebase Analytics által biztosított összes elemzési funkciót használja. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). Ez a könyvtár tartalmazza a [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging)-et, amely [push értesítéseket](https://en.wikipedia.org/wiki/Push_technology) tud nyújtani az alkalmazásoknak. Ez [a helyzet](https://fosstodon.org/@bitwarden/109636825700482007) a Bitwardennel is. Ez nem jelenti azt, hogy a Bitwarden a Google Firebase Analytics által biztosított összes elemzési funkciót használja.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/hu/os/ios-overview.md b/i18n/hu/os/ios-overview.md index 5a79868f..0550c598 100644 --- a/i18n/hu/os/ios-overview.md +++ b/i18n/hu/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/hu/os/linux-overview.md b/i18n/hu/os/linux-overview.md index da9fa962..56db7195 100644 --- a/i18n/hu/os/linux-overview.md +++ b/i18n/hu/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/hu/os/macos-overview.md b/i18n/hu/os/macos-overview.md index 584d1acc..aa5541ea 100644 --- a/i18n/hu/os/macos-overview.md +++ b/i18n/hu/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Recommended Configuration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/hu/os/qubes-overview.md b/i18n/hu/os/qubes-overview.md index 9986e985..cb429a3c 100644 --- a/i18n/hu/os/qubes-overview.md +++ b/i18n/hu/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: pg/qubes-os description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Android -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/hu/passwords.md b/i18n/hu/passwords.md index 2a9b7754..5e678e10 100644 --- a/i18n/hu/passwords.md +++ b/i18n/hu/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Parancssor @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/hu/photo-management.md b/i18n/hu/photo-management.md index 9ee9a8fe..5ee06b6c 100644 --- a/i18n/hu/photo-management.md +++ b/i18n/hu/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/hu/productivity.md b/i18n/hu/productivity.md index 6f962483..2773f1af 100644 --- a/i18n/hu/productivity.md +++ b/i18n/hu/productivity.md @@ -19,9 +19,9 @@ A **Nextcloud** egy ingyenes és nyílt forráskódú kliens-szerver szoftvercso [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -52,11 +52,11 @@ Nem javasoljuk az [End-to-End titkosított applikáció](https://apps.nextcloud. A **CryptPad** egy a népszerű irodai eszközök privátra tervezett alternatívája. A webes szolgáltatás minden tartalma végponttól végpontig titkosított, és könnyen megosztható más felhasználókkal. -[:octicons-home-16: Honlap](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Adatvédelmi Tájékoztató" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Dokumentáció} -[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Forráskód" } -[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Közremőködés } +[:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute }
@@ -99,20 +99,20 @@ A legjobb esetben alkalmazott követelményeink azt fejezik ki, hogy mit szeretn **A **LibreOffice** egy ingyenes és nyílt forráskódú irodai programcsomag széleskörű funkcionalitással. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ A legjobb esetben alkalmazott követelményeink azt fejezik ki, hogy mit szeretn Az **OnlyOffice** egy felhőalapú, ingyenes és nyílt forráskódú irodai programcsomag, amely széleskörű funkciókkal rendelkezik, beleértve a Nextclouddal való integrációt is. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Az **OnlyOffice** egy felhőalapú, ingyenes és nyílt forráskódú irodai pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -175,10 +175,10 @@ Azon dolgozunk, hogy meghatározott követelményeket állapítsunk meg az oldal **A **PrivateBin** egy minimalista, nyílt forráskódú online pastebin, ahol a szerver nem ismeri a pastelt adatokat. Az adatok titkosítása/dekódolása a böngészőben történik 256 bites AES használatával. Ez a ZeroBin továbbfejlesztett változata. -[:octicons-home-16: Honlap](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Publikus Példányok"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Dokumentáció} -[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Forráskód" } +[:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
diff --git a/i18n/hu/real-time-communication.md b/i18n/hu/real-time-communication.md index 8ce98aa6..56b451b3 100644 --- a/i18n/hu/real-time-communication.md +++ b/i18n/hu/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/hu/router.md b/i18n/hu/router.md index 9c4d8768..79c886cc 100644 --- a/i18n/hu/router.md +++ b/i18n/hu/router.md @@ -35,7 +35,10 @@ Az OpenWrt [hardvertáblázatában](https://openwrt.org/toh/start) ellenőrizhet **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. Az OPNsense-t általában peremtűzfalként, routerként, vezeték nélküli hozzáférési pontként, DHCP-szerverként, DNS-szerverként és VPN végpontként vetik be. -A pfSense-t általában perem tűzfalként, routerként, vezeték nélküli hozzáférési pontként, DHCP szerverként, DNS szerverként és VPN végpontként telepítik. +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/hu/search-engines.md b/i18n/hu/search-engines.md index f340d19d..773a121c 100644 --- a/i18n/hu/search-engines.md +++ b/i18n/hu/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} @@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Követelmények diff --git a/i18n/hu/tools.md b/i18n/hu/tools.md index 6b266bca..0f0b554a 100644 --- a/i18n/hu/tools.md +++ b/i18n/hu/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin Ha valamilyen konkrét megoldást keresel, ezek a hardver- és szoftvereszközök amiket ajánlunk, különböző kategóriákban. Az általunk ajánlott adatvédelmi eszközöket elsősorban biztonsági funkciók alapján választottuk ki, további hangsúlyt fektetve a decentralizált és nyílt forráskódú eszközökre. Ezek számos védelmi modellre alkalmazhatók, globális tömeges megfigyelési programok elleni védelemtől kezdve, big tech cégek elkerüléstől, támadások enyhítéséig, de csak te tudod meghatározni, hogy a te igényeidek mi felel meg a legjobban. -Ha segítségre kérnél a legjobb adatvédelmi eszközök és alternatív programok kiválasztásához a munkaterhelésedhez/felhasználási módodhoz illően, indíts el egy beszélgetést a [fórumon](https://discuss.privacyguides.net/), vagy a [Matrix](https://matrix.to/#/#privacyguides:matrix.org) közösségünkben! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! Ha további információt szeretnél megtudni az egyes projektekről, hogy miért választottuk őket, és további tippekről vagy trükkökről amiket ajánlunk, kattints az egyes szakaszokban található "További információ" linkre, vagy kattints magára az ajánlásra, hogy az oldal ahhoz az adott szakaszához lépj. @@ -89,7 +89,7 @@ Ha további információt szeretnél megtudni az egyes projektekről, hogy miér #### DNS Szolgáltatók -Számos követelmény alapján [ajánlunk](dns.md#recommended-providers) több titkosított DNS szervert, mint [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) és [Quad9](https://quad9.net/) többek között. Javasoljuk, hogy egy szolgáltató kiválasztása előtt olvasd el a DNS-ről szóló oldalainkat. Sok esetben nem ajánlott alternatív DNS-szolgáltató használata. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. Javasoljuk, hogy egy szolgáltató kiválasztása előtt olvasd el a DNS-ről szóló oldalainkat. Sok esetben nem ajánlott alternatív DNS-szolgáltató használata. [További információ :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/hu/tor.md b/i18n/hu/tor.md index d9f065fe..eb0deff7 100644 --- a/i18n/hu/tor.md +++ b/i18n/hu/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Böngésző image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: A **Tor** hálózat egy önkéntesek által üzemeltetett szerverekből álló csoport, amely lehetővé teszi, hogy ingyenesen csatlakozhass, és javíts a magánéleteden, valamint a biztonságodon az Interneten. Személyek és szervezetek a Tor-hálózaton keresztül ".onion rejtett szolgáltatásokkal" is megoszthatnak információkat anélkül, hogy veszélyeztetnék a magánéletüket. Mivel a Tor forgalmat nehéz blokkolni és nyomon követni, a Tor egy hatékony cenzúra megkerülő eszköz. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } A Tor úgy működik, hogy az internetes forgalmadat ezeken az önkéntesek által üzemeltetett szervereken keresztül irányítja át, ahelyett, hogy közvetlen kapcsolatot létesítene a meglátogatni kívánt oldallal. Ez elrejti, hogy honnan érkezik a forgalom, és a kapcsolat útvonalában egyetlen szerver sem látja a teljes útvonalat, ahonnan a forgalom érkezik és ahová tart, ami azt jelenti, hogy még az általad csatlakozásra használt szerverek sem tudják megtörni az anonimitásodat. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b A **Tor Böngésző** a legjobb választás, ha anonimitásra van szükséged, mivel hozzáférést biztosít a Tor-hálózathoz és a Tor-hidakhoz, valamint alapértelmezett beállításokat és bővítményeket tartalmaz, amelyek automatikusan előre beállított biztonsági szintek alapján vannak konfigurálva: *Normál*, *Biztonságosabb* és *Legbiztonságosabb*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ A **Tor Böngésző** a legjobb választás, ha anonimitásra van szükséged, m -A Tor böngészőt úgy tervezték, hogy megakadályozza az fingerprintelést, vagyis a beazonosításodat a böngésző konfigurációja alapján. Ezért elengedhetetlen, hogy **ne** módosítsd a böngészőt az alapértelmezett [biztonsági szinteken](https://tb-manual.torproject.org/security-settings/) túl. +A Tor böngészőt úgy tervezték, hogy megakadályozza az fingerprintelést, vagyis a beazonosításodat a böngésző konfigurációja alapján. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also Az **Orbot** egy ingyenes Tor VPN okostelefonokhoz, amely a Tor hálózaton keresztül irányítja az eszközödön lévő bármely alkalmazás forgalmát. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ Az **Orbot** egy ingyenes Tor VPN okostelefonokhoz, amely a Tor hálózaton kere Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) @@ -134,7 +134,7 @@ Minden verzió ugyanazzal az aláírással van tanusítva, így kompatibilisnek ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ A **Snowflake** lehetővé teszi, hogy sávszélességet adományozz a Tor proje Azok, akik cenzúra alatt állnak, Snowflake proxykat tudnak használni a Tor-hálózathoz való csatlakozáshoz. A Snowflake egy nagyszerű módja annak, hogy hozzájárulj a hálózathoz, még akkor is, ha nincs meg a technikai tudásod egy Tor elosztó vagy híd üzemeltetéséhez. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ A Snowflake semmilyen módon nem növeli az magánéletedet, és a személyes b Egy Snowflake proxy futtatása alacsony kockázatú, még inkább, mint egy Tor elosztó vagy híd futtatása, amelyek már eleve sem különösebben kockázatos vállalkozások. Ettől függetlenül még mindig forgalom kerül átküldésre a hálózatodon ami bizonyos szempontból hatással lehet arra, különösen, ha a hálózatod sávszélessége korlátozott. Győződj meg róla, hogy érted [hogyan működik a Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) mielőtt eldöntöd, hogy futtatsz-e proxyt. -[^1]: Az `IsolateDestAddr` beállítást a [Tor levelezési listáján](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) és a [Whonix's Stream Isolation dokumentációjában](https://www.whonix.org/wiki/Stream_Isolation) tárgyalják, ahol mindkét projekt azt javasolja, hogy ez általában nem jó megközelítés a legtöbb ember számára. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/hu/vpn.md b/i18n/hu/vpn.md index 8913d307..f830622d 100644 --- a/i18n/hu/vpn.md +++ b/i18n/hu/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. Ha több **biztonságot** keresel, mindig győződj meg arról, hogy a weboldalakhoz HTTPS használatával csatlakozol. Egy VPN nem helyettesít helyes biztonsági gyakorlatokat. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Az általunk ajánlott szolgáltatók titkosítást használnak, elfogadják a M A **Proton VPN** egy erős pályázó a VPN-térben, és 2016 óta vannak működésben. A svájci székhelyű Proton AG egy korlátozott ingyenes előfizetést, valamint egy jobban felszerelt prémium opciót is kínál. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -A Proton VPN átesett a SEC Consult független felülvizsálatán 2020 januárjában. A SEC Consult közepes és alacsony kockázatú sebezhetőségeket talált a Proton VPN Windows, Android és iOS alkalmazásaiban, amelyeket a Proton VPN a jelentések közzététele előtt "megfelelően kijavított". Az azonosított problémák egyike sem biztosított volna egy támadó számára távoli hozzáférést az eszközödhöz vagy forgalmadhoz. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +A Proton VPN átesett a SEC Consult független felülvizsálatán 2020 januárjában. A SEC Consult közepes és alacsony kockázatú sebezhetőségeket talált a Proton VPN Windows, Android és iOS alkalmazásaiban, amelyeket a Proton VPN a jelentések közzététele előtt "megfelelően kijavított". Az azonosított problémák egyike sem biztosított volna egy támadó számára távoli hozzáférést az eszközödhöz vagy forgalmadhoz. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -A Proton VPN többnyire támogatja a WireGuard® protokollt. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Emellett a WireGuard célja, hogy egyszerűbb és hatékonyabb legyen. +A Proton VPN többnyire támogatja a WireGuard® protokollt. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Emellett a WireGuard célja, hogy egyszerűbb és hatékonyabb legyen. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -A Proton VPN kliensek jelenleg a Linux kivételével minden platformon támogatják a kétlépcsős hitelesítést. A Proton VPN saját szerverekkel és adatközpontokkal rendelkezik Svájcban, Izlandon és Svédországban. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +A Proton VPN kliensek jelenleg a Linux kivételével minden platformon támogatják a kétlépcsős hitelesítést. A Proton VPN saját szerverekkel és adatközpontokkal rendelkezik Svájcban, Izlandon és Svédországban. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. Ha szükséged van erre a funkcióra, és Intel chipsettel rendelkező Mac-et használsz, akkor fontold meg egy másik VPN szolgáltatás használatát. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. Ha szükséged van erre a funkcióra, és Intel chipsettel rendelkező Mac-et használsz, akkor fontold meg egy másik VPN szolgáltatás használatát. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit Az **IVPN** egy másik prémium VPN szolgáltató, és 2009 óta vannak működésben. Az IVPN székhelye Gibraltáron található. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ Az **IVPN** egy másik prémium VPN szolgáltató, és 2009 óta vannak működ - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ Az **IVPN** egy másik prémium VPN szolgáltató, és 2009 óta vannak működ #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Ennek oka a célállomáshoz vezető rövidebb útvonal (kevesebb ugrás). +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Ennek oka a célállomáshoz vezető rövidebb útvonal (kevesebb ugrás). { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -Az IVPN támogatja a WireGuard® protokollt. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Emellett a WireGuard célja, hogy egyszerűbb és hatékonyabb legyen. +Az IVPN támogatja a WireGuard® protokollt. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Emellett a WireGuard célja, hogy egyszerűbb és hatékonyabb legyen. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Az IVPN kliensei támogatják a kétfaktoros hitelesítést (a Mullvad kliensei nem). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +Az IVPN kliensei támogatják a kétfaktoros hitelesítést (a Mullvad kliensei nem). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ A **Mullvad** egy gyors és olcsó VPN, amely komoly hangsúlyt fektet az átlá [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ A **Mullvad** egy gyors és olcsó VPN, amely komoly hangsúlyt fektet az átlá #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Ennek oka a célállomáshoz vezető rövidebb útvonal (kevesebb ugrás). +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Ennek oka a célállomáshoz vezető rövidebb útvonal (kevesebb ugrás). { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Emellett a WireGuard célja, hogy egyszerűbb és hatékonyabb legyen. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Emellett a WireGuard célja, hogy egyszerűbb és hatékonyabb legyen. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Követelmények diff --git a/i18n/id/CODE_OF_CONDUCT.md b/i18n/id/CODE_OF_CONDUCT.md index 2f091223..af22cb4a 100644 --- a/i18n/id/CODE_OF_CONDUCT.md +++ b/i18n/id/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ Apa yang kami harapkan dari para anggota komunitas kami: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Berperilaku dengan cara yang positif dan konstruktif** diff --git a/i18n/id/about/index.md b/i18n/id/about/index.md index 70925d98..0f5622d7 100644 --- a/i18n/id/about/index.md +++ b/i18n/id/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** adalah situs web bermotif sosial yang menyediakan [informasi](/kb) untuk melindungi keamanan dan privasi data Anda. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. Kami adalah kolektif nirlaba yang dioperasikan sepenuhnya oleh [anggota tim](https://discuss.privacyguides.net/g/team) dan kontributor sukarelawan. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title="Laman Beranda" } -[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Kode Sumber" } -[:octicons-heart-16:](donate.md){ .card-link title=Berkontribusi } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } +[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } +[:octicons-heart-16:](donate.md){ .card-link title=Contribute } > Untuk menemukan aplikasi [alternatif yang berfokus pada privasi], lihat situs-situs seperti Good Reports dan **Privacy Guides**, yang mencantumkan daftar aplikasi yang berfokus pada privasi dalam berbagai kategori, terutama termasuk penyedia email (biasanya dengan paket berbayar) yang tidak dijalankan oleh perusahaan-perusahaan teknologi besar. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > Jika Anda mencari VPN baru, Anda bisa membuka kode diskon dari hampir semua podcast. Jika Anda mencari **VPN** yang bagus, Anda memerlukan bantuan profesional. Hal yang sama berlaku untuk klien email, browser, sistem operasi, dan pengelola kata sandi. Bagaimana Anda tahu mana yang terbaik, opsi yang paling ramah privasi? Untuk itu ada **Privacy Guides**, sebuah platform di mana sejumlah sukarelawan mencari hari demi hari untuk alat ramah privasi terbaik untuk digunakan di internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## Sejarah @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/id/about/notices.md b/i18n/id/about/notices.md index 54172232..4e3226c6 100644 --- a/i18n/id/about/notices.md +++ b/i18n/id/about/notices.md @@ -29,7 +29,7 @@ Ini tidak termasuk kode pihak ketiga yang tertanam dalam repositori ini, atau ko Ini berarti bahwa Anda dapat menggunakan konten yang dapat dibaca manusia dalam repositori ini untuk proyek Anda sendiri, sesuai dengan persyaratan yang diuraikan dalam teks Creative Commons Atribusi-TanpaTurunan 4.0 Internasional. Anda dapat melakukannya dengan cara yang wajar, tetapi tidak dengan cara apa pun yang menyarankan Privacy Guides mendukung Anda atau penggunaan Anda. Anda **tidak boleh** menggunakan merek Privacy Guides dalam proyek Anda sendiri tanpa persetujuan tertulis dari proyek ini. Merek dagang merek Privacy Guides mencakup tanda kata "Privacy Guides" dan logo perisai. -Kami percaya bahwa logo dan gambar lain dalam `aset` yang diperoleh dari penyedia pihak ketiga berada dalam domain publik atau **penggunaan wajar**. Secara singkat, hukum [doktrin penggunaan wajar](https://www.copyright.gov/fair-use/more-info.html) memungkinkan penggunaan gambar berhak cipta untuk mengidentifikasi materi pelajaran untuk tujuan komentar publik. Namun, logo ini dan gambar lainnya mungkin masih tunduk pada undang-undang merek dagang di satu atau lebih yurisdiksi. Sebelum menggunakan konten ini, pastikan bahwa konten tersebut digunakan untuk mengidentifikasi entitas atau organisasi yang memiliki merek dagang dan bahwa Anda memiliki hak untuk menggunakannya berdasarkan hukum yang berlaku dalam situasi yang Anda inginkan. *Ketika menyalin konten dari situs web ini, Anda bertanggung jawab penuh untuk memastikan bahwa Anda tidak melanggar merek dagang atau hak cipta orang lain.* +Kami percaya bahwa logo dan gambar lain dalam `aset` yang diperoleh dari penyedia pihak ketiga berada dalam domain publik atau **penggunaan wajar**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. Namun, logo ini dan gambar lainnya mungkin masih tunduk pada undang-undang merek dagang di satu atau lebih yurisdiksi. Sebelum menggunakan konten ini, pastikan bahwa konten tersebut digunakan untuk mengidentifikasi entitas atau organisasi yang memiliki merek dagang dan bahwa Anda memiliki hak untuk menggunakannya berdasarkan hukum yang berlaku dalam situasi yang Anda inginkan. *Ketika menyalin konten dari situs web ini, Anda bertanggung jawab penuh untuk memastikan bahwa Anda tidak melanggar merek dagang atau hak cipta orang lain.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ Anda tidak boleh melakukan aktivitas pengumpulan data secara sistematis atau oto --- -*Bagian dari pemberitahuan ini sendiri diadopsi dari [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) di GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Bagian dari pemberitahuan ini sendiri diadopsi dari [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) di GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/id/about/privacytools.md b/i18n/id/about/privacytools.md index 33519b07..e16b4fa9 100644 --- a/i18n/id/about/privacytools.md +++ b/i18n/id/about/privacytools.md @@ -14,13 +14,13 @@ Setelah perpindahan organisasi selesai, pendiri PrivacyTools kembali dan mulai m PrivacyTools dibuat pada tahun 2015 oleh "BurungHantu," yang ingin membuat alat yang berguna untuk sumber daya informasi privasi setelah pengungkapan Snowden. Situs ini tumbuh menjadi proyek sumber terbuka yang berkembang dengan [banyak kontributor](https://github.com/privacytools/privacytools.io/graphs/contributors), beberapa akhirnya diberi berbagai tanggung jawab organisasi, seperti mengoperasikan layanan daring seperti Matrix dan Mastodon, mengelola dan meninjau perubahan pada situs di GitHub, mencari sponsor untuk proyek tersebut, menulis kiriman blog dan mengoperasikan platform penjangkauan media sosial seperti Twitter, dll. -Mulai dari tahun 2019, BurungHantu semakin menjauh dari pengembangan aktif situs web dan komunitas, dan mulai menunda pembayaran yang menjadi tanggung jawabnya terkait dengan server yang kami operasikan. Untuk menghindari administrator sistem kami membayar biaya server menggunakan uang mereka sendiri, kami mengubah metode donasi yang tercantum di situs dari akun PayPal dan kripto pribadi BurungHantu ke halaman OpenCollective baru pada tanggal [31 Oktober 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). Hal ini memiliki manfaat tambahan yaitu membuat keuangan kami benar-benar transparan, nilai yang sangat kami yakini, dan dapat dikurangkan dari pajak di Amerika Serikat, karena dipegang oleh Open Collective Foundation 501(c)3. Perubahan ini disetujui dengan suara bulat oleh tim dan tidak dapat diganggu gugat. +Mulai dari tahun 2019, BurungHantu semakin menjauh dari pengembangan aktif situs web dan komunitas, dan mulai menunda pembayaran yang menjadi tanggung jawabnya terkait dengan server yang kami operasikan. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). Hal ini memiliki manfaat tambahan yaitu membuat keuangan kami benar-benar transparan, nilai yang sangat kami yakini, dan dapat dikurangkan dari pajak di Amerika Serikat, karena dipegang oleh Open Collective Foundation 501(c)3. Perubahan ini disetujui dengan suara bulat oleh tim dan tidak dapat diganggu gugat. ## Mengapa Kami Pindah Pada tahun 2020, ketidakhadiran BurungHantu semakin terlihat. Pada suatu ketika, kami meminta supaya server nama domain diubah ke server nama yang dikendalikan oleh administrator sistem kami untuk menghindari gangguan di masa mendatang, dan perubahan ini belum selesai hingga lebih dari satu bulan setelah permintaan awal. Dia akan menghilang dari obrolan publik dan ruang obrolan tim pribadi di Matrix selama berbulan-bulan, sesekali muncul untuk memberikan sedikit umpan balik atau berjanji untuk lebih aktif sebelum menghilang lagi. -Pada bulan Oktober 2020, administrator sistem PrivacyTools (Jonah) [meninggalkan](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) proyek karena kesulitan ini, menyerahkan kendali kepada kontributor lama lainnya. Jonah telah mengoperasikan hampir semua layanan PrivacyTools dan bertindak sebagai *de facto* pimpinan proyek untuk pengembangan situs web selama ketidakhadiran BurungHantu, sehingga kepergiannya merupakan perubahan yang signifikan bagi organisasi. Pada saat itu, karena perubahan organisasi yang signifikan ini, BurungHantu berjanji kepada tim yang tersisa bahwa ia akan kembali untuk mengambil alih kendali proyek ke depannya. ==Tim PrivacyTools menghubungi melalui beberapa metode komunikasi selama beberapa bulan berikutnya, tetapi tidak menerima tanggapan apa pun.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah telah mengoperasikan hampir semua layanan PrivacyTools dan bertindak sebagai *de facto* pimpinan proyek untuk pengembangan situs web selama ketidakhadiran BurungHantu, sehingga kepergiannya merupakan perubahan yang signifikan bagi organisasi. Pada saat itu, karena perubahan organisasi yang signifikan ini, BurungHantu berjanji kepada tim yang tersisa bahwa ia akan kembali untuk mengambil alih kendali proyek ke depannya. ==Tim PrivacyTools menghubungi melalui beberapa metode komunikasi selama beberapa bulan berikutnya, tetapi tidak menerima tanggapan apa pun.== ## Ketergantungan Nama Domain @@ -34,25 +34,25 @@ Pada pertengahan 2021, tim PrivacyTools menghubungi Jonah, yang setuju untuk ber ## Ajakan Komunitas untuk Bertindak -Pada akhir Juli 2021, kami [memberi tahu](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) komunitas PrivacyTools tentang niat kami untuk memilih nama baru dan melanjutkan proyek di domain baru, yang akan [dipilih](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) pada tanggal 2 Agustus 2022. Pada akhirnya, "Privacy Guides" dipilih, dengan domain `privacyguides.org` yang telah dimiliki oleh Jonah untuk proyek sampingan dari tahun 2020 yang tidak berkembang. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. Pada akhirnya, "Privacy Guides" dipilih, dengan domain `privacyguides.org` yang telah dimiliki oleh Jonah untuk proyek sampingan dari tahun 2020 yang tidak berkembang. ## Kontrol dari r/privacytoolsIO -Bersamaan dengan masalah situs web yang sedang berlangsung di privacytools.io, tim moderasi r/privacytoolsIO menghadapi tantangan dalam mengelola subreddit. Subreddit selalu dioperasikan secara independen dari pengembangan situs web, tetapi BurungHantu adalah moderator utama dari subreddit tersebut, dan dia adalah satu-satunya moderator yang diberikan hak istimewa "Kendali Penuh". u/trai_dep adalah satu-satunya moderator aktif pada saat itu, dan [mengirim](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) permintaan kepada administrator Reddit pada tanggal 28 Juni 2021, meminta untuk diberikan posisi moderator utama dan hak kontrol penuh, untuk membuat perubahan yang diperlukan pada Subreddit. +Bersamaan dengan masalah situs web yang sedang berlangsung di privacytools.io, tim moderasi r/privacytoolsIO menghadapi tantangan dalam mengelola subreddit. Subreddit selalu dioperasikan secara independen dari pengembangan situs web, tetapi BurungHantu adalah moderator utama dari subreddit tersebut, dan dia adalah satu-satunya moderator yang diberikan hak istimewa "Kendali Penuh". u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit mengharuskan subreddit memiliki moderator yang aktif. Jika moderator utama tidak aktif dalam jangka waktu yang lama (seperti satu tahun), posisi moderator utama dapat ditunjuk kembali ke moderator berikutnya. Agar permintaan ini dikabulkan, BurungHantu harus benar-benar absen dari semua aktivitas Reddit untuk jangka waktu yang lama, yang konsisten dengan perilakunya di platform lain. > Jika Anda dihapus sebagai moderator dari subreddit melalui permintaan Reddit, itu karena kurangnya tanggapan dan kurangnya aktivitas Anda memenuhi syarat subreddit untuk transfer r/redditrequest. > -> r/redditrequest adalah cara Reddit untuk memastikan komunitas memiliki moderator yang aktif dan merupakan bagian dari [Kode Etik Moderator](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Memulai Transisi -Pada 14 September 2021, kami [mengumumkan](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) awal migrasi kami ke domain baru ini: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] kami merasa perlu untuk melakukan peralihan ini lebih cepat daripada nanti untuk memastikan orang akan mengetahui tentang transisi ini sesegera mungkin. Hal ini memberikan kami waktu yang cukup untuk melakukan transisi nama domain, yang saat ini dialihkan ke www.privacyguides.org, dan diharapkan dapat memberikan waktu yang cukup bagi semua orang untuk mengetahui perubahan tersebut, memperbarui markah dan situs web, dll. -Perubahan ini [mensyaratkan:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Mengalihkan www.privacytools.io ke [www.privacyguides.org](https://www.privacyguides.org). - Mengarsipkan kode sumber di GitHub untuk melestarikan pekerjaan masa lalu dan pelacak masalah kami, yang terus kami gunakan selama berbulan-bulan pengembangan dari situs ini di masa depan. @@ -63,11 +63,11 @@ Segala sesuatunya tampak berjalan dengan lancar, dan sebagian besar komunitas ak ## Peristiwa yang Diikuti -Kira-kira seminggu setelah transisi, BurungHantu kembali daring untuk pertama kalinya dalam hampir satu tahun, namun tidak ada seorang pun dari tim kami yang ingin kembali ke PrivacyTools karena sejarahnya yang tidak dapat diandalkan. Daripada meminta maaf atas ketidakhadirannya yang berkepanjangan, ia segera melakukan serangan dan memposisikan transisi ke Privacy Guides sebagai serangan terhadapnya dan proyeknya. Dia kemudian [menghapus](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) banyak kiriman tersebut ketika ditunjukkan oleh komunitas bahwa dia tidak hadir dan meninggalkan proyek tersebut. +Kira-kira seminggu setelah transisi, BurungHantu kembali daring untuk pertama kalinya dalam hampir satu tahun, namun tidak ada seorang pun dari tim kami yang ingin kembali ke PrivacyTools karena sejarahnya yang tidak dapat diandalkan. Daripada meminta maaf atas ketidakhadirannya yang berkepanjangan, ia segera melakukan serangan dan memposisikan transisi ke Privacy Guides sebagai serangan terhadapnya dan proyeknya. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. Pada titik ini, BurungHantu menyatakan bahwa ia ingin melanjutkan pengerjaan privacytools.io secara mandiri dan meminta kami untuk menghapus pengalihan dari www.privacytools.io ke [www.privacyguides.org](https://www.privacyguides.org). Kami mewajibkan dan meminta supaya subdomain untuk Matrix, Mastodon, dan PeerTube tetap aktif agar kami dapat menjalankan layanan publik kepada komunitas kami setidaknya selama beberapa bulan, agar pengguna di platform tersebut dapat dengan mudah bermigrasi ke akun lain. Karena sifat federasi dari layanan yang kami sediakan, layanan ini terikat pada nama domain tertentu sehingga sangat sulit untuk dimigrasikan (dan dalam beberapa kasus tidak mungkin). -Sayangnya, karena kontrol subreddit r/privacytoolsIO tidak dikembalikan ke BurungHantu atas permintaannya (informasi lebih lanjut di bawah), subdomain tersebut [terputus](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) pada awal Oktober, mengakhiri kemungkinan migrasi ke pengguna yang masih menggunakan layanan tersebut. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Setelah itu, BurungHantu membuat tuduhan palsu tentang Jonah mencuri sumbangan dari proyek tersebut. BurungHantu memiliki waktu lebih dari setahun sejak insiden yang dituduhkan terjadi, namun dia tidak pernah membuat siapa pun menyadarinya sampai setelah migrasi Privacy Guides. BurungHantu telah berulang kali diminta untuk memberikan bukti dan memberikan komentar mengenai alasan kebungkamannya oleh tim [dan komunitas](https://twitter.com/TommyTran732/status/1526153536962281474), namun belum memberikannya. @@ -77,11 +77,11 @@ BurungHantu juga membuat [kiriman Twitter](https://twitter.com/privacytoolsIO/st Pada tanggal 25 September 2022, kami melihat keseluruhan rencana BurungHantu terwujud di privacytools.io, dan ini adalah alasan utama kami memutuskan untuk membuat halaman penjelasan ini hari ini. Situs web yang dia operasikan tampaknya merupakan versi situs yang sangat dioptimalkan untuk SEO yang merekomendasikan alat dengan imbalan kompensasi finansial. Baru-baru ini, IVPN dan Mullvad, dua penyedia VPN yang hampir secara universal [direkomendasikan](../vpn.md) oleh komunitas privasi dan terkenal karena sikap mereka yang menentang program afiliasi telah dihapus dari PrivacyTools. Di tempat mereka? NordVPN, Surfshark, ExpressVPN, dan hide.me; Perusahaan VPN raksasa dengan platform dan praktik bisnis yang tidak dapat dipercaya, terkenal karena program pemasaran dan afiliasi mereka yang agresif. -==**PrivacyTools telah menjadi jenis situs yang kami [peringatkan untuk dihindari](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) di blog PrivacyTools pada 2019.**== Kami telah mencoba untuk menjaga jarak dari PrivacyTools sejak transisi, tetapi pengusikan yang terus mereka lakukan terhadap proyek kami dan sekarang penyalahgunaan mereka yang tidak masuk akal terhadap kredibilitas merek mereka yang diperoleh dari kontribusi terhadap sumber terbuka selama 6 tahun, sangat mengganggu kami. Kami yang benar-benar memperjuangkan privasi tidak bertengkar satu sama lain, dan tidak mendapatkan saran dari penawar tertinggi. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Kami yang benar-benar memperjuangkan privasi tidak bertengkar satu sama lain, dan tidak mendapatkan saran dari penawar tertinggi. ## r/privacytoolsIO Sekarang -Setelah peluncuran [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), tidak praktis bagi u/trai_dep untuk terus memoderasi kedua subreddit tersebut, dan dengan adanya komunitas yang ikut serta dalam transisi ini, r/privacytoolsIO [dijadikan](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) sebagai sub yang dibatasi dalam sebuah postingan pada tanggal 1 November 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] Pertumbuhan Sub ini adalah hasil dari upaya besar, selama beberapa tahun, oleh tim PrivacyGuides.org. Dan oleh Anda semua. > @@ -89,7 +89,7 @@ Setelah peluncuran [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), ti Subreddit bukan milik siapa pun, dan terutama bukan milik pemegang merek. Mereka adalah bagian dari komunitas mereka, dan komunitas serta para moderatornya membuat keputusan untuk mendukung perpindahan ke r/PrivacyGuides. -Beberapa bulan setelahnya, BurungHantu telah mengancam dan memohon untuk mengembalikan kontrol subreddit ke akunnya dalam [pelanggaran](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) aturan Reddit: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Pembalasan dari moderator mana pun sehubungan dengan permintaan penghapusan tidak diperbolehkan. @@ -107,12 +107,12 @@ Dengan demikian, dana yang ada di OpenCollective adalah milik Privacy Guides, da Topik ini telah dibahas secara luas dalam komunitas kami di berbagai tempat, dan sepertinya sebagian besar orang yang membaca halaman ini sudah mengetahui tentang peristiwa yang terjadi sebelum perpindahan ke Privacy Guides. Beberapa tulisan kami sebelumnya mengenai masalah ini mungkin memiliki detail tambahan yang kami hilangkan di sini untuk mempersingkatnya. Mereka telah ditautkan di bawah ini demi kelengkapan. -- [28 Juni 2021 permintaan untuk mengontrol r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [27 Juli 2021 pengumuman tentang niat kami untuk memindahkan blog PrivacyTools, yang ditulis oleh tim](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [13 September 2021 pengumuman awal transisi kami ke Privacy Guides di r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [28 Juni 2021 permintaan untuk mengontrol r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [27 Juli 2021 pengumuman tentang niat kami untuk memindahkan blog PrivacyTools, yang ditulis oleh tim](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [13 September 2021 pengumuman awal transisi kami ke Privacy Guides di r/privacytoolsIO](https://reddit.com/pnql46) - [17 September 2021 pengemuman di OpenCollective dari Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [30 September 2021 utas Twitter yang merinci sebagian besar peristiwa yang sekarang dijelaskan di halaman ini](https://twitter.com/privacy_guides/status/1443633412800225280) -- [1 Oktober 2021 dikirim oleh u/dng99 yang mencatat kegagalan subdomain](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [2 April 2022 tanggapan oleh u/dng99 untuk kiriman blog yang menuduh dari PrivacyTools](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [1 Oktober 2021 dikirim oleh u/dng99 yang mencatat kegagalan subdomain](https://reddit.com/comments/pymthv/comment/hexwrps) +- [2 April 2022 tanggapan oleh u/dng99 untuk kiriman blog yang menuduh dari PrivacyTools](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [16 Mei 2022 tanggapan oleh @TommyTran732 di Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [3 Sep 2022 kiriman di forum Techlore oleh @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/id/advanced/communication-network-types.md b/i18n/id/advanced/communication-network-types.md index 480a8035..279fc903 100644 --- a/i18n/id/advanced/communication-network-types.md +++ b/i18n/id/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Beberapa perpesanan yang dihosting sendiri memungkinkan Anda untuk mengatur serv - Dapat menyertakan [kontrol atau akses terbatas](https://drewdevault.com/2018/08/08/Signal.html). Ini dapat mencakup hal-hal seperti: - Dilarang [menghubungkan klien pihak ketiga](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) ke jaringan terpusat yang mungkin memberikan penyesuaian yang lebih besar atau pengalaman yang lebih baik. Sering kali didefinisikan dalam Syarat dan Ketentuan penggunaan. - Dokumentasi yang buruk atau tidak ada sama sekali untuk pengembang pihak ketiga. -- [Kepemilikan](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), kebijakan privasi, dan operasi layanan dapat berubah dengan mudah ketika satu entitas mengendalikannya, yang berpotensi membahayakan layanan di kemudian hari. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Hosting mandiri membutuhkan upaya dan pengetahuan tentang cara menyiapkan layanan. ## Jaringan Federasi @@ -60,7 +60,7 @@ Ketika dihosting sendiri, anggota server federasi dapat menemukan dan berkomunik Perpesanan P2P terhubung ke [jaringan node yang terdistribusi](https://en.wikipedia.org/wiki/Distributed_networking) untuk menyampaikan pesan ke penerima tanpa server pihak ketiga. -Klien (peer) biasanya menemukan satu sama lain melalui penggunaan jaringan [komputasi terdistribusi](https://id.wikipedia.org/wiki/Komputasi_terdistribusi). Contohnya antara lain [Tabel Hash Terdistribusi](https://id.wikipedia.org/wiki/Tabel_Hash_Terdistribusi) (DHT), yang digunakan oleh [torrent](https://id.wikipedia.org/wiki/BitTorrent) dan [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) sebagai contoh. Pendekatan lain adalah jaringan berbasis kedekatan, di mana koneksi dibuat melalui WiFi atau Bluetooth (misalnya, Briar atau protokol jaringan sosial [Scuttlebutt](https://www.scuttlebutt.nz)). +Klien (peer) biasanya menemukan satu sama lain melalui penggunaan jaringan [komputasi terdistribusi](https://id.wikipedia.org/wiki/Komputasi_terdistribusi). Contohnya antara lain [Tabel Hash Terdistribusi](https://id.wikipedia.org/wiki/Tabel_Hash_Terdistribusi) (DHT), yang digunakan oleh [torrent](https://id.wikipedia.org/wiki/BitTorrent) dan [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) sebagai contoh. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Setelah peer menemukan rute ke kontaknya melalui salah satu metode ini, koneksi langsung di antara mereka dibuat. Meskipun pesan biasanya dienkripsi, seorang pengamat masih dapat menyimpulkan lokasi dan identitas pengirim dan penerima. diff --git a/i18n/id/advanced/dns-overview.md b/i18n/id/advanced/dns-overview.md index ece26641..4190524e 100644 --- a/i18n/id/advanced/dns-overview.md +++ b/i18n/id/advanced/dns-overview.md @@ -18,7 +18,7 @@ Di bawah ini, kami mendiskusikan dan menyediakan tutorial untuk membuktikan apa ### DNS yang tidak terenkripsi -1. Dengan menggunakan [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (bagian dari proyek [Wireshark](https://id.wikipedia.org/wiki/Wireshark)) kita bisa memantau dan merekam aliran paket internet. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Di bawah ini, kami mendiskusikan dan menyediakan tutorial untuk membuktikan apa nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ DNS terenkripsi dapat merujuk pada salah satu dari sejumlah protokol, yang palin ### DNS melalui TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS melalui HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/id/advanced/payments.md b/i18n/id/advanced/payments.md index 2361f6ee..affd9d34 100644 --- a/i18n/id/advanced/payments.md +++ b/i18n/id/advanced/payments.md @@ -9,7 +9,7 @@ Ada alasan mengapa data tentang kebiasaan membeli Anda dianggap sebagai cawan su Selama berabad-abad, **uang tunai** telah berfungsi sebagai bentuk utama pembayaran pribadi. Uang tunai memiliki sifat privasi yang sangat baik dalam banyak kasus, diterima secara luas di sebagian besar negara, dan **dapat dipertukarkan**, artinya tidak unik dan sepenuhnya dapat dipertukarkan. -Undang-undang pembayaran tunai bervariasi menurut negara. Di Amerika Serikat, pengungkapan khusus diperlukan untuk pembayaran tunai lebih dari $10.000 kepada IRS di [Formulir 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). Bisnis penerima wajib memverifikasi nama, alamat, pekerjaan, tanggal lahir, dan Nomor Jaminan Sosial atau NPWP penerima (dengan beberapa pengecualian). Batas bawah tanpa ID seperti $3.000 atau kurang dari itu ada untuk pertukaran dan pengiriman uang. Uang tunai juga memiliki nomor seri. Ini hampir tidak pernah dilacak oleh pedagang, tetapi dapat digunakan oleh penegak hukum dalam penyelidikan yang ditargetkan. +Undang-undang pembayaran tunai bervariasi menurut negara. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). Bisnis penerima wajib memverifikasi nama, alamat, pekerjaan, tanggal lahir, dan Nomor Jaminan Sosial atau NPWP penerima (dengan beberapa pengecualian). Batas bawah tanpa ID seperti $3.000 atau kurang dari itu ada untuk pertukaran dan pengiriman uang. Uang tunai juga memiliki nomor seri. Ini hampir tidak pernah dilacak oleh pedagang, tetapi dapat digunakan oleh penegak hukum dalam penyelidikan yang ditargetkan. Meskipun demikian, ini biasanya merupakan pilihan terbaik. @@ -60,7 +60,7 @@ Ada sejumlah proyek mata uang kripto yang bertujuan untuk memberikan privasi den - [Mata Uang Kripto yang Direkomendasikan :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Koin privasi telah menjadi sasaran pengawasan yang semakin meningkat oleh badan-badan pemerintah. Pada tahun 2020, [IRS menerbitkan bounty $625,000](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) untuk alat yang dapat memecahkan Jaringan Lightning Bitcoin dan/atau privasi transaksi Monero. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Koin privasi telah menjadi sasaran pengawasan yang semakin meningkat oleh badan-badan pemerintah. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/id/advanced/tor-overview.md b/i18n/id/advanced/tor-overview.md index 5e6096e2..7c970ffa 100644 --- a/i18n/id/advanced/tor-overview.md +++ b/i18n/id/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: Relai pertama di sirkuit Anda disebut "penjaga jalan masuk" atau "penjaga". Relai ini adalah relai yang cepat dan stabil yang tetap menjadi relai pertama di sirkuit Anda selama 2-3 bulan untuk melindungi dari serangan pembobolan anonimitas yang telah diketahui. Sisa sirkuit Anda berubah dengan setiap situs web baru yang Anda kunjungi, dan secara keseluruhan relai ini memberikan perlindungan privasi penuh dari Tor. Untuk informasi lebih lanjut tentang cara kerja relai penjaga, lihat [posting blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) ini dan [makalah](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) tentang relai penjaga. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: Relai pertama di sirkuit Anda disebut "penjaga jalan masuk" atau "penjaga". Relai ini adalah relai yang cepat dan stabil yang tetap menjadi relai pertama di sirkuit Anda selama 2-3 bulan untuk melindungi dari serangan pembobolan anonimitas yang telah diketahui. Sisa sirkuit Anda berubah dengan setiap situs web baru yang Anda kunjungi, dan secara keseluruhan relai ini memberikan perlindungan privasi penuh dari Tor. Untuk informasi lebih lanjut tentang cara kerja relai penjaga, lihat [posting blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) ini dan [makalah](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) tentang relai penjaga. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/id/android.md b/i18n/id/android.md index 8049b580..a00ebe04 100644 --- a/i18n/id/android.md +++ b/i18n/id/android.md @@ -83,9 +83,9 @@ schema: **Android Open Source Project** adalah sistem operasi seluler sumber terbuka yang dipimpin oleh Google yang mendukung sebagian besar perangkat seluler di dunia. Sebagian besar ponsel yang dijual dengan Android telah dimodifikasi untuk menyertakan integrasi dan aplikasi invasif seperti Google Play Services, jadi Anda dapat meningkatkan privasi Anda secara signifikan pada perangkat seluler Anda dengan mengganti instalasi bawaan ponsel Anda dengan versi Android tanpa fitur-fitur invasif ini. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Beranda } -[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Dokumentasi} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Kode Sumber" } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } +[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } Berikut ini adalah sistem operasi, perangkat, dan aplikasi Android yang kami rekomendasikan untuk memaksimalkan keamanan dan privasi perangkat seluler Anda. Untuk mengetahui lebih lanjut tentang Android: @@ -113,19 +113,19 @@ Perangkat yang sudah habis masa pakainya (seperti perangkat "dukungan diperpanja GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Beranda](https://grapheneos.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Kebijakan Privasi" } -[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Dokumentasi} -[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Kode Sumber" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Kontribusi } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } -GrapheneOS mendukung [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), yang menjalankan [Layanan Google Play](https://en.wikipedia.org/wiki/Google_Play_Services) sepenuhnya di-sandbox seperti aplikasi biasa lainnya. Ini berarti Anda dapat memanfaatkan sebagian besar Layanan Google Play, seperti [notifikasi push](https://firebase.google.com/docs/cloud-messaging/), sekaligus memberi Anda kontrol penuh atas izin dan aksesnya, dan sambil memasukkannya ke [profil kerja](os/android-overview.md#work-profile) tertentu atau [profil pengguna](os/android-overview.md#user-profiles) pilihan Anda. +GrapheneOS mendukung [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), yang menjalankan [Layanan Google Play](https://en.wikipedia.org/wiki/Google_Play_Services) sepenuhnya di-sandbox seperti aplikasi biasa lainnya. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Ponsel Google Pixel adalah satu-satunya perangkat yang saat ini memenuhi persyaratan keamanan perangkat keras [GrapheneOS](https://grapheneos.org/faq#device-support). -[Mengapa kami lebih merekomendasikan GrapheneOS daripada CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Mengapa kami lebih merekomendasikan GrapheneOS daripada CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Ponsel Google Pixel adalah satu-satunya perangkat yang saat ini memenuhi persyar ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** adalah fork lunak dari [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Beranda](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS memiliki mekanisme [penambalan](https://gitlab.com/divested-mobile/cve_checker) kerentanan kernel ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) otomatis, lebih sedikit *proprietary blobs*, dan berkas [hosts](https://divested.dev/index.php?page=dnsbl) khusus. WebView-nya yang telah diperkuat, [Mulch](https://gitlab.com/divested-mobile/mulch), mengaktifkan [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) untuk semua arsitektur dan [partisi status jaringan](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), dan menerima pembaruan luar *band*. DivestOS juga menyertakan tambalan kernel dari GrapheneOS dan mengaktifkan semua fitur keamanan kernel yang tersedia melalui [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). Semua kernel yang lebih baru dari versi 3.4 menyertakan [sanitasi](https://lwn.net/Articles/334747/) halaman penuh dan semua kernel yang dikompilasi oleh ~22 Clang memiliki [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) yang diaktifkan. +DivestOS memiliki mekanisme [penambalan](https://gitlab.com/divested-mobile/cve_checker) kerentanan kernel ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) otomatis, lebih sedikit *proprietary blobs*, dan berkas [hosts](https://divested.dev/index.php?page=dnsbl) khusus. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS juga menyertakan tambalan kernel dari GrapheneOS dan mengaktifkan semua fitur keamanan kernel yang tersedia melalui [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS mengimplementasikan beberapa tambalan penguatan sistem yang awalnya dikembangkan untuk GrapheneOS. DivestOS 16.0 dan yang lebih tinggi mengimplementasikan fitur GrapheneOS izin [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) dan SENSORS, [pengalokasi memori yang diperkuat](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), dan perangkat tambahan penguatan [bionik](https://en.wikipedia.org/wiki/Bionic_(software)) parsial. Versi 17.1 dan yang lebih tinggi memiliki fitur GrapheneOS opsi [pengacakan MAC](https://en.wikipedia.org/wiki/MAC_address#Randomization) per-jaringan penuh, kontrol [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html), dan opsi mulai ulang/Wi-Fi/ Bluetooth [dalam batas waktu tertentu](https://grapheneos.org/features) secara otomatis. +DivestOS mengimplementasikan beberapa tambalan penguatan sistem yang awalnya dikembangkan untuk GrapheneOS. DivestOS 16.0 dan yang lebih tinggi mengimplementasikan fitur GrapheneOS izin [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) dan SENSORS, [pengalokasi memori yang diperkuat](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), dan perangkat tambahan penguatan [bionik](https://en.wikipedia.org/wiki/Bionic_(software)) parsial. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS menggunakan F-Droid sebagai toko aplikasi bawaan. Kami biasanya [menyarankan untuk menghindari F-Droid](#f-droid), tetapi melakukan hal itu di DivestOS tidak memungkinkan; para pengembang DivestOS memperbarui aplikasi mereka melalui repositori F-Droid mereka sendiri ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) dan [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). Kami menyarankan untuk menonaktifkan aplikasi resmi F-Droid dan menggunakan [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **serta mengaktifkan repositori DivestOS** agar komponen-komponen tersebut selalu diperbarui. Untuk aplikasi-aplikasi lain, kami tetap menyarankan metode yang kami rekomendasikan. +DivestOS menggunakan F-Droid sebagai toko aplikasi bawaan. Kami biasanya [menyarankan untuk menghindari F-Droid](#f-droid), tetapi melakukan hal itu di DivestOS tidak memungkinkan; para pengembang DivestOS memperbarui aplikasi mereka melalui repositori F-Droid mereka sendiri ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) dan [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. Untuk aplikasi-aplikasi lain, kami tetap menyarankan metode yang kami rekomendasikan.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Ponsel Google Pixel menggunakan OS TEE yang disebut Trusty yang [bersumber terbuka](https://source.android.com/security/trusty#whyTrusty), tidak seperti ponsel lainnya. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/id/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/id/assets/img/how-tor-works/tor-encryption-dark.svg index 303b8074..0f1e0716 100644 --- a/i18n/id/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/id/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Perangkat - - Anda - - - - Mengirim data ke situs web - - - - - Menerima data dari situs web - - - - - Perangkat - - Anda - - - - Entri - - - - - Tengah - - - - - Keluar - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entri - - - - - Tengah - - - - - Keluar - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/id/assets/img/how-tor-works/tor-encryption.svg b/i18n/id/assets/img/how-tor-works/tor-encryption.svg index 9f924584..f954fb0f 100644 --- a/i18n/id/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/id/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Perangkat - - Anda - - - - Mengirim data ke situs web - - - - - Menerima data dari situs web - - - - - Perangkat - - Anda - - - - Entri - - - - - Tengah - - - - - Keluar - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entri - - - - - Tengah - - - - - Keluar - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/id/assets/img/how-tor-works/tor-path-dark.svg b/i18n/id/assets/img/how-tor-works/tor-path-dark.svg index 136f24d3..1f31e40b 100644 --- a/i18n/id/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/id/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Perangkat - Anda - - - - Entri - - - - - Tengah - - - - - Keluar - - - - - PrivacyGuides.org - - - - - - - - + + + + Perangkat + Anda + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/id/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/id/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/id/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/id/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/id/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/id/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/id/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/id/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/id/assets/img/how-tor-works/tor-path.svg b/i18n/id/assets/img/how-tor-works/tor-path.svg index 9c1f0b99..da77623b 100644 --- a/i18n/id/assets/img/how-tor-works/tor-path.svg +++ b/i18n/id/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/id/basics/account-deletion.md b/i18n/id/basics/account-deletion.md index 9bd78b23..2b65b294 100644 --- a/i18n/id/basics/account-deletion.md +++ b/i18n/id/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: Sangat mudah untuk mengumpulkan sejumlah besar akun internet, berikut ini beberapa tips tentang cara memangkas koleksi Anda. --- -Seiring waktu, mudah sekali untuk menumpuk sejumlah akun online, yang banyak di antaranya mungkin sudah tidak Anda gunakan lagi. Menghapus akun-akun yang tidak terpakai ini merupakan langkah penting untuk mendapatkan kembali privasi Anda, karena akun-akun yang tidak aktif rentan terhadap pelanggaran data. Pelanggaran data adalah ketika keamanan layanan terganggu dan informasi yang dilindungi dilihat, dikirim, atau dicuri oleh pihak yang tidak berwenang. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Seiring waktu, mudah sekali untuk menumpuk sejumlah akun online, yang banyak di antaranya mungkin sudah tidak Anda gunakan lagi. Menghapus akun-akun yang tidak terpakai ini merupakan langkah penting untuk mendapatkan kembali privasi Anda, karena akun-akun yang tidak aktif rentan terhadap pelanggaran data. Pelanggaran data adalah ketika keamanan layanan terganggu dan informasi yang dilindungi dilihat, dikirim, atau dicuri oleh pihak yang tidak berwenang. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Menemukan Akun Lama ### Pengelola Kata Sandi -Jika Anda memiliki pengelola kata sandi yang telah Anda gunakan untuk seluruh kehidupan digital Anda, bagian ini akan sangat mudah. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +Jika Anda memiliki pengelola kata sandi yang telah Anda gunakan untuk seluruh kehidupan digital Anda, bagian ini akan sangat mudah. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Platform desktop juga sering kali memiliki pengelola kata sandi yang dapat membantu Anda memulihkan kata sandi yang Anda lupakan: -- Windows [Manajer Kredensial](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Kata Sandi](https://support.apple.com/en-us/HT211145) -- iOS [Kata Sandi](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ Ketika mencoba untuk mendapatkan kembali akses, jika situs mengembalikan pesan k ### GDPR (hanya untuk penduduk EEA) -Penduduk EEA memiliki hak tambahan terkait penghapusan data yang ditentukan dalam [Pasal 17](https://www.gdpr.org/regulation/article-17.html) GDPR. Jika itu berlaku untuk Anda, baca kebijakan privasi untuk setiap layanan yang diberikan untuk menemukan informasi tentang cara menggunakan hak Anda untuk menghapus. Membaca kebijakan privasi terbukti penting, karena beberapa layanan memiliki opsi "Hapus Akun" yang hanya menonaktifkan akun Anda dan untuk penghapusan yang sebenarnya Anda harus mengambil tindakan tambahan. Terkadang penghapusan yang sebenarnya mungkin melibatkan pengisian survei, mengirim email ke petugas perlindungan data layanan atau bahkan membuktikan tempat tinggal Anda di EEA. Jika Anda berencana untuk menggunakan cara ini,**jangan** menimpa informasi akun - identitas Anda sebagai penduduk EEA mungkin diperlukan. Perhatikan bahwa lokasi layanan tidak masalah; GDPR berlaku untuk siapa pun yang melayani pengguna Eropa. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. Jika itu berlaku untuk Anda, baca kebijakan privasi untuk setiap layanan yang diberikan untuk menemukan informasi tentang cara menggunakan hak Anda untuk menghapus. Membaca kebijakan privasi terbukti penting, karena beberapa layanan memiliki opsi "Hapus Akun" yang hanya menonaktifkan akun Anda dan untuk penghapusan yang sebenarnya Anda harus mengambil tindakan tambahan. Terkadang penghapusan yang sebenarnya mungkin melibatkan pengisian survei, mengirim email ke petugas perlindungan data layanan atau bahkan membuktikan tempat tinggal Anda di EEA. Jika Anda berencana untuk menggunakan cara ini,**jangan** menimpa informasi akun - identitas Anda sebagai penduduk EEA mungkin diperlukan. Perhatikan bahwa lokasi layanan tidak masalah; GDPR berlaku untuk siapa pun yang melayani pengguna Eropa. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Bahkan ketika Anda dapat menghapus akun, tidak ada jaminan bahwa semua informasi ## Hindari Akun Baru -Seperti kata pepatah lama, "satu ons pencegahan sebanding dengan satu pon pengobatan." Kapan pun Anda merasa tergoda untuk mendaftar akun baru, tanyakan pada diri sendiri, "Apakah saya benar-benar membutuhkan ini? Dapatkah saya menyelesaikan apa yang saya butuhkan tanpa akun?" Menghapus akun sering kali lebih sulit daripada membuat akun. Dan bahkan setelah menghapus atau mengubah informasi di akun Anda, mungkin ada versi cache dari pihak ketiga-seperti [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +Seperti kata pepatah lama, "satu ons pencegahan sebanding dengan satu pon pengobatan." Kapan pun Anda merasa tergoda untuk mendaftar akun baru, tanyakan pada diri sendiri, "Apakah saya benar-benar membutuhkan ini? Dapatkah saya menyelesaikan apa yang saya butuhkan tanpa akun?" Menghapus akun sering kali lebih sulit daripada membuat akun. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/id/basics/common-misconceptions.md b/i18n/id/basics/common-misconceptions.md index 9464daab..b5a0a3e5 100644 --- a/i18n/id/basics/common-misconceptions.md +++ b/i18n/id/basics/common-misconceptions.md @@ -88,7 +88,7 @@ Saat berbelanja secara daring, penggunaan [loker paket] (https://en.wikipedia.or 2. **Identitas tidak dikenal** - Identitas yang tidak dikenal dapat berupa nama samaran yang stabil yang sering Anda gunakan. Ini tidak anonim karena tidak berubah. Jika Anda adalah bagian dari komunitas daring, Anda mungkin ingin mempertahankan persona yang dikenal orang lain. Nama samaran ini tidak anonim karena—jika dipantau cukup lama—rincian tentang pemiliknya dapat mengungkapkan informasi lebih lanjut, seperti cara mereka menulis, pengetahuan umum mereka tentang topik yang diminati, dll. -Anda mungkin ingin menggunakan VPN untuk hal ini, untuk menyembunyikan alamat IP Anda. Transaksi keuangan lebih sulit untuk disamarkan: Anda dapat mempertimbangkan untuk menggunakan mata uang kripto anonim, seperti [Monero](https://www.getmonero.org/). Menggunakan pengalihan altcoin juga dapat membantu menyamarkan dari mana mata uang Anda berasal. Biasanya, bursa memerlukan KYC (kenali pelanggan Anda) untuk diselesaikan sebelum mereka mengizinkan Anda menukar mata uang fiat ke mata uang kripto apa pun. Opsi pertemuan lokal juga dapat menjadi solusi; namun, biasanya lebih mahal dan terkadang juga memerlukan KYC. +Anda mungkin ingin menggunakan VPN untuk hal ini, untuk menyembunyikan alamat IP Anda. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Menggunakan pengalihan altcoin juga dapat membantu menyamarkan dari mana mata uang Anda berasal. Biasanya, bursa memerlukan KYC (kenali pelanggan Anda) untuk diselesaikan sebelum mereka mengizinkan Anda menukar mata uang fiat ke mata uang kripto apa pun. Opsi pertemuan lokal juga dapat menjadi solusi; namun, biasanya lebih mahal dan terkadang juga memerlukan KYC. 3. **Identitas anonim** - Bahkan dengan pengalaman, identitas anonim sulit untuk dipertahankan dalam jangka waktu yang lama. Identitas tersebut haruslah identitas jangka pendek dan berumur pendek yang dirotasi secara teratur. diff --git a/i18n/id/basics/common-threats.md b/i18n/id/basics/common-threats.md index 6a7589ea..9787c5c4 100644 --- a/i18n/id/basics/common-threats.md +++ b/i18n/id/basics/common-threats.md @@ -55,7 +55,7 @@ Secara rancangan, **peramban web**, **klien surel**, dan **aplikasi perkantoran* -Jika Anda khawatir tentang **serangan fisik** Anda harus menggunakan sistem operasi dengan implementasi boot terverifikasi yang aman, seperti Android, iOS, macOS, atau [Windows (dengan TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). Anda juga harus memastikan bahwa penyimpanan Anda dienkripsi, dan bahwa sistem operasi menggunakan TPM atau Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) atau [Element](https://developers.google.com/android/security/android-ready-se) untuk menilai batas upaya memasukkan frasa sandi enkripsi. Anda sebaiknya menghindari berbagi komputer dengan orang yang tidak Anda percayai, karena sebagian besar sistem operasi desktop tidak mengenkripsi data secara terpisah per pengguna. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). Anda juga harus memastikan bahwa penyimpanan Anda dienkripsi, dan bahwa sistem operasi menggunakan TPM atau Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) atau [Element](https://developers.google.com/android/security/android-ready-se) untuk menilai batas upaya memasukkan frasa sandi enkripsi. Anda sebaiknya menghindari berbagi komputer dengan orang yang tidak Anda percayai, karena sebagian besar sistem operasi desktop tidak mengenkripsi data secara terpisah per pengguna. ## Privasi Dari Penyedia Layanan @@ -89,16 +89,16 @@ Pengawasan massal adalah upaya yang rumit untuk memantau "perilaku, berbagai akt

Atlas of Surveillance

-Jika Anda ingin mempelajari lebih lanjut tentang metode pengawasan dan bagaimana metode tersebut diterapkan di kota Anda, Anda juga dapat melihat [Atlas Pengawasan (Atlas of Surveillance)](https://atlasofsurveillance.org/) oleh [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Pemerintah sering kali membenarkan program pengawasan massal sebagai cara yang diperlukan untuk memerangi terorisme dan mencegah kejahatan. Namun, melanggar hak asasi manusia, hal ini paling sering digunakan untuk menargetkan kelompok minoritas dan pembangkang politik secara tidak proporsional.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

Dalam menghadapi [pengungkapan Edward Snowden tentang program-program pemerintah seperti [PRISM](https://en.wikipedia.org/wiki/PRISM) dan [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], para pejabat intelijen juga mengakui bahwa NSA selama bertahun-tahun secara diam-diam telah mengumpulkan catatan tentang hampir semua panggilan telepon setiap orang Amerika—siapa yang menelepon siapa, kapan panggilan itu dilakukan, dan berapa lama panggilan itu berlangsung. Informasi semacam ini, ketika dikumpulkan oleh NSA dari hari ke hari, dapat mengungkapkan detail yang sangat sensitif tentang kehidupan dan pergaulan seseorang, seperti apakah mereka pernah menelepon pendeta, penyedia layanan aborsi, konselor kecanduan, atau bantuan pencegahan bunuh diri. @@ -144,7 +144,7 @@ Jika Anda telah mengirimkan informasi asli Anda ke situs-situs yang seharusnya t Penyensoran secara daring bisa dilakukan (dalam berbagai tingkatan) oleh berbagai pihak, termasuk pemerintah totaliter, administrator jaringan, dan penyedia layanan. Upaya-upaya untuk mengendalikan komunikasi dan membatasi akses terhadap informasi akan selalu tidak sesuai dengan hak asasi manusia atas Kebebasan Berekspresi.[^5] -Penyensoran pada platform perusahaan semakin umum terjadi, karena platform seperti Twitter dan Facebook menyerah pada permintaan publik, tekanan pasar, dan tekanan dari lembaga pemerintah. Tekanan pemerintah dapat berupa permintaan terselubung kepada bisnis, seperti Gedung Putih [yang meminta penghapusan](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) video YouTube yang provokatif, atau secara terang-terangan, seperti pemerintah Cina yang mewajibkan perusahaan untuk mematuhi rezim sensor yang ketat. +Penyensoran pada platform perusahaan semakin umum terjadi, karena platform seperti Twitter dan Facebook menyerah pada permintaan publik, tekanan pasar, dan tekanan dari lembaga pemerintah. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. Orang-orang yang khawatir dengan ancaman penyensoran dapat menggunakan teknologi seperti [Tor](../advanced/tor-overview.md) untuk mengelakkannya, dan mendukung platform komunikasi yang tahan sensor seperti [Matrix](../real-time-communication.md#element), yang tidak memiliki otoritas akun terpusat yang dapat menutup akun secara sewenang-wenang. @@ -162,5 +162,5 @@ Anda harus selalu mempertimbangkan risiko mencoba menerobos sensor, konsekuensi [^1]: Wikipedia: [*Pengawasan Massal*](https://en.wikipedia.org/wiki/Mass_surveillance) dan [*Pengawasan*](https://en.wikipedia.org/wiki/Surveillance). [^2]: Badan Pengawasan Privasi dan Kebebasan Sipil Amerika Serikat: [*Laporan tentang Program Rekaman Telepon yang Dilakukan berdasarkan Pasal 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Kapitalisme pengawasan*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Anda juga harus menggunakan teknik mitigasi lainnya. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Anda juga harus menggunakan teknik mitigasi lainnya. [^5]: Perserikatan Bangsa-Bangsa: [*Deklarasi Universal Hak Asasi Manusia*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/id/basics/email-security.md b/i18n/id/basics/email-security.md index 74d49124..54626744 100644 --- a/i18n/id/basics/email-security.md +++ b/i18n/id/basics/email-security.md @@ -13,7 +13,7 @@ Akibatnya, surel paling baik digunakan untuk menerima surel transaksional (pembe Cara standar untuk menambahkan E2EE ke surel antara penyedia surel yang berbeda adalah dengan menggunakan OpenPGP. Ada beberapa implementasi yang berbeda dari standar OpenPGP, yang paling umum adalah [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) dan [OpenPGP.js](https://openpgpjs.org). -Ada standar lain yang populer di kalangan bisnis yang disebut [S/MIME](https://en.wikipedia.org/wiki/S/MIME), namun standar ini membutuhkan sertifikat yang dikeluarkan dari [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (tidak semua dari mereka mengeluarkan sertifikat S/MIME). Ini memiliki dukungan di [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) dan [Outlook untuk Web atau Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +Ada standar lain yang populer di kalangan bisnis yang disebut [S/MIME](https://en.wikipedia.org/wiki/S/MIME), namun standar ini membutuhkan sertifikat yang dikeluarkan dari [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (tidak semua dari mereka mengeluarkan sertifikat S/MIME). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Bahkan jika Anda menggunakan OpenPGP, ini tidak mendukung [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), yang berarti jika kunci privat Anda atau penerima dicuri, semua pesan sebelumnya yang dienkripsi dengan kunci tersebut akan terekspos. Inilah sebabnya mengapa kami merekomendasikan [instant messenger](../real-time-communication.md) yang menerapkan kerahasiaan ke depan melalui email untuk komunikasi orang-ke-orang bila memungkinkan. @@ -23,7 +23,7 @@ Standar Direktori Kunci Web (Web Key Directory; WKD) memungkinkan klien surel un Selain [klien surel yang kami rekomendasikan](../email-clients.md), yang mendukung WKD, beberapa penyedia surel berabasis web juga mendukung WKD. Apakah kunci *Anda* diterbitkan ke WKD untuk digunakan orang lain tergantung pada konfigurasi domain Anda. Jika Anda menggunakan [penyedia surel](../email.md#openpgp-compatible-services) yang mendukung WKD, seperti Proton Mail atau Mailbox.org, mereka dapat mempublikasikan kunci OpenPGP Anda ke domain mereka untuk Anda. -Jika Anda menggunakan domain khusus Anda sendiri, Anda perlu mengonfigurasikan WKD secara terpisah. Jika Anda mengontrol nama domain Anda, Anda bisa menyiapkan WKD terlepas dari apa pun penyedia surel Anda. Salah satu cara mudah untuk melakukan ini adalah dengan menggunakan fitur "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" dari keys.openpgp.org, dengan mengatur catatan CNAME pada subdomain `openpgpkey` dari domain Anda yang diarahkan ke `wkd.keys.openpgp.org`, kemudian mengunggah kunci Anda ke [keys.openpgp.org](https://keys.openpgp.org/). Sebagai alternatif, Anda dapat [meng-host sendiri WKD di server web Anda sendiri](https://wiki.gnupg.org/WKDHosting). +Jika Anda menggunakan domain khusus Anda sendiri, Anda perlu mengonfigurasikan WKD secara terpisah. Jika Anda mengontrol nama domain Anda, Anda bisa menyiapkan WKD terlepas dari apa pun penyedia surel Anda. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Sebagai alternatif, Anda dapat [meng-host sendiri WKD di server web Anda sendiri](https://wiki.gnupg.org/WKDHosting). Jika Anda menggunakan domain bersama dari penyedia yang tidak mendukung WKD, seperti @gmail.com, Anda tidak akan dapat berbagi kunci OpenPGP dengan orang lain melalui metode ini. @@ -33,7 +33,7 @@ Penyedia email yang memungkinkan Anda menggunakan protokol akses standar seperti ### Bagaimana Cara Melindungi Kunci Pribadi Saya? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Pesan tersebut kemudian didekripsi oleh smartcard dan konten yang telah didekripsi dikirim kembali ke perangkat. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Pesan tersebut kemudian didekripsi oleh smartcard dan konten yang telah didekripsi dikirim kembali ke perangkat. Terjadinya proses dekripsi di kartu pintar begitu menguntungkan karena hal tersebut berfungsi untuk menghindari kemungkinan mengekspos kunci pribadi Anda ke perangkat yang telah tersusupi. diff --git a/i18n/id/basics/multi-factor-authentication.md b/i18n/id/basics/multi-factor-authentication.md index 0d60944b..41f28ef7 100644 --- a/i18n/id/basics/multi-factor-authentication.md +++ b/i18n/id/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP adalah salah satu bentuk MFA yang paling umum yang tersedia. Ketika Anda me Kode terbatas waktunya kemudian diperoleh dari rahasia bersama dan waktu saat ini. Karena kode hanya berlaku untuk waktu yang singkat, tanpa akses ke rahasia bersama, musuh tidak dapat membuat kode baru. -Jika Anda memiliki kunci keamanan perangkat keras dengan dukungan TOTP (seperti YubiKey dengan [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), kami sarankan agar Anda menyimpan "rahasia bersama" di perangkat keras. Perangkat keras seperti YubiKey dikembangkan dengan tujuan untuk membuat "rahasia bersama" menjadi sulit untuk diekstrak dan disalin. YubiKey juga tidak terhubung ke Internet, tidak seperti ponsel dengan aplikasi TOTP. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Perangkat keras seperti YubiKey dikembangkan dengan tujuan untuk membuat "rahasia bersama" menjadi sulit untuk diekstrak dan disalin. YubiKey juga tidak terhubung ke Internet, tidak seperti ponsel dengan aplikasi TOTP. Tidak seperti [WebAuthn](#fido-fast-identity-online), TOTP tidak menawarkan perlindungan terhadap [pengelabuan](https://en.wikipedia.org/wiki/Phishing) atau serangan penggunaan ulang. Jika musuh mendapatkan kode yang valid dari Anda, mereka bisa menggunakannya sebanyak yang mereka suka sampai kode tersebut kedaluwarsa (umumnya 60 detik). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/id/basics/passwords-overview.md b/i18n/id/basics/passwords-overview.md index 18a74084..a41402b6 100644 --- a/i18n/id/basics/passwords-overview.md +++ b/i18n/id/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Lempar dadu enam sisi sebanyak lima kali, catat nomornya setelah setiap lemparan. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. Anda akan menemukan kata `mengenkripsi`. Tuliskan kata itu. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/id/basics/vpn-overview.md b/i18n/id/basics/vpn-overview.md index b161fca6..e1edca6e 100644 --- a/i18n/id/basics/vpn-overview.md +++ b/i18n/id/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. Untuk mengimbangi hal ini, penyedia VPN biasanya akan merutekan semua paket non-TCP melalui server VPN mereka (loncatan pertama Anda). Ini adalah kasus pada [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Selain itu, ketika menggunakan pengaturan Tor melalui VPN ini, Anda tidak memiliki kendali atas fitur Tor penting lainnya seperti [Alamat Tujuan Terisolasi](https://www.whonix.org/wiki/Stream_Isolation) (menggunakan sirkuit Tor yang berbeda untuk setiap domain yang Anda kunjungi). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. Untuk mengimbangi hal ini, penyedia VPN biasanya akan merutekan semua paket non-TCP melalui server VPN mereka (loncatan pertama Anda). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Informasi VPN Terkait -- [Masalah dengan VPN dan Situs Ulasan Privasi](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Investigasi Aplikasi VPN Gratis](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Terungkap pemilik tersembunyi VPN: 101 produk VPN hanya dimiliki oleh 23 perusahaan saja](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [Perusahaan Tiongkok ini diam-diam berada di balik 24 aplikasi populer yang meminta izin berbahaya](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - Narasi yang Sangat Genting](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) oleh Dennis Schubert +- [Masalah dengan VPN dan Situs Ulasan Privasi](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Investigasi Aplikasi VPN Gratis](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Terungkap pemilik tersembunyi VPN: 101 produk VPN hanya dimiliki oleh 23 perusahaan saja](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [Perusahaan Tiongkok ini diam-diam berada di balik 24 aplikasi populer yang meminta izin berbahaya](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/id/basics/why-privacy-matters.md b/i18n/id/basics/why-privacy-matters.md index 6f452a90..e3c4f107 100644 --- a/i18n/id/basics/why-privacy-matters.md +++ b/i18n/id/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sumber -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/id/calendar.md b/i18n/id/calendar.md index c9c1d83f..16447713 100644 --- a/i18n/id/calendar.md +++ b/i18n/id/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/id/cloud.md b/i18n/id/cloud.md index 794f7b78..1423824f 100644 --- a/i18n/id/cloud.md +++ b/i18n/id/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Kriteria diff --git a/i18n/id/cryptocurrency.md b/i18n/id/cryptocurrency.md index 989980bf..95bb5021 100644 --- a/i18n/id/cryptocurrency.md +++ b/i18n/id/cryptocurrency.md @@ -24,10 +24,10 @@ Banyak atau bahkan sebagian besar proyek mata uang kripto adalah penipuan. Lakuk **Monero** menggunakan blockchain dengan teknologi yang meningkatkan privasi yang mengaburkan transaksi untuk mencapai anonimitas. Setiap transaksi Monero menyembunyikan jumlah transaksi, alamat pengirim dan penerima, dan sumber dana tanpa ada rintangan yang harus dilewati, menjadikannya pilihan ideal untuk pemula mata uang kripto. -[:octicons-home-16: Laman Beranda](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Dokumentasi} -[:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Kode Sumber" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Berkontribusi } +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ Dengan Monero, pengamat luar tidak dapat menguraikan alamat yang memperdagangkan Untuk privasi yang optimal, pastikan untuk menggunakan dompet nonkustodian di mana kunci tampilan tetap berada di perangkat. Ini berarti hanya Anda yang dapat menggunakan dana Anda dan melihat transaksi yang masuk dan keluar. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/id/data-redaction.md b/i18n/id/data-redaction.md index e56fae04..dd77aaa3 100644 --- a/i18n/id/data-redaction.md +++ b/i18n/id/data-redaction.md @@ -88,12 +88,12 @@ Aplikasi ini menawarkan beberapa cara untuk menghapus metadata dari gambar. Yait **Metapho** adalah penampil yang sederhana dan bersih untuk metadata foto seperti tanggal, nama file, ukuran, model kamera, kecepatan rana, dan lokasi. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ Aplikasi ini menawarkan beberapa cara untuk menghapus metadata dari gambar. Yait **PrivacyBlur** adalah aplikasi gratis yang dapat memburamkan bagian gambar yang sensitif sebelum membagikannya secara online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ Aplikasi ini menawarkan beberapa cara untuk menghapus metadata dari gambar. Yait Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/id/desktop-browsers.md b/i18n/id/desktop-browsers.md index 2bcc7858..b2c1f04e 100644 --- a/i18n/id/desktop-browsers.md +++ b/i18n/id/desktop-browsers.md @@ -70,8 +70,8 @@ Jika Anda perlu menjelajah internet secara anonim, Anda sebaiknya menggunakan [T **Mullvad Browser** adalah versi dari [Tor Browser](tor.md#tor-browser) dengan integrasi jaringan Tor yang telah dihilangkan. Mullvad Browser bertujuan untuk menyediakan teknologi peramban anti-fingerprinting yang ada di Peramban Tor kepada pengguna VPN. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ Jika Anda perlu menjelajah internet secara anonim, Anda sebaiknya menggunakan [T -Seperti [Tor Browser](tor.md), Mullvad Browser dirancang untuk mencegah fingerprinting dengan membuat fingerprint di browser Anda identik dengan semua pengguna Mullvad Browser lainnya, serta mencakup pengaturan default dan ekstensi yang secara otomatis dikonfigurasi oleh tingkat keamanan default seperti: *Standar*, *Lebih Aman* dan *Paling Aman*. Oleh karena itu, sangat penting bagi Anda untuk tidak memodifikasi pengaturan browser sama sekali kecuali penyesuaian [tingkat keamanan](https://tb-manual.torproject.org/security-settings/). Melakukan modifikasi akan membuat fingerprint pada browser ini menjadi unik, sehingga mengubah tujuan penggunaan dari browser ini. Jika Anda ingin merubah pengaturan browser Anda dengan sesuai dengan keinginan Anda dan fingerprint bukan menjadi masalah bagi Anda, kami sarankan untuk menggunakan [Firefox](#firefox) sebagai gantinya. +Seperti [Tor Browser](tor.md), Mullvad Browser dirancang untuk mencegah fingerprinting dengan membuat fingerprint di browser Anda identik dengan semua pengguna Mullvad Browser lainnya, serta mencakup pengaturan default dan ekstensi yang secara otomatis dikonfigurasi oleh tingkat keamanan default seperti: *Standar*, *Lebih Aman* dan *Paling Aman*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Melakukan modifikasi akan membuat fingerprint pada browser ini menjadi unik, sehingga mengubah tujuan penggunaan dari browser ini. Jika Anda ingin merubah pengaturan browser Anda dengan sesuai dengan keinginan Anda dan fingerprint bukan menjadi masalah bagi Anda, kami sarankan untuk menggunakan [Firefox](#firefox) sebagai gantinya. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser hadir dengan DuckDuckGo yang ditetapkan sebagai [mesin pencari]( **Firefox** menyediakan pengaturan privasi yang kuat seperti [Perlindungan Pelacakan yang Ditingkatkan](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), yang dapat membantu memblokir berbagai [jenis pelacakan](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser hadir dengan DuckDuckGo yang ditetapkan sebagai [mesin pencari](

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave dibuat berdasarkan proyek peramban web Chromium, sehingga seharusnya terasa familier dan memiliki masalah kompatibilitas situs web yang minimal. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Perisai -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ Secara umum, kami menyarankan untuk menjaga ekstensi seminimal mungkin; ekstensi
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ Kami sedang berupaya menetapkan kriteria yang jelas untuk setiap bagian dari sit - Tersedia di Linux, macOS, dan Windows. - Perubahan apa pun yang diperlukan untuk membuat peramban lebih menghargai privasi tidak boleh berdampak negatif pada pengalaman pengguna. - Memblokir kuki pihak ketiga secara bawaan. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Kasus Terbaik Kriteria kasus terbaik kami mewakili apa yang ingin kami lihat dari proyek yang sempurna dalam kategori ini. Rekomendasi kami mungkin tidak menyertakan salah satu atau semua fungsi ini, tetapi rekomendasi yang menyertakan fungsi ini mungkin memiliki peringkat yang lebih tinggi daripada yang lain di halaman ini. - Mencantumkan fungsionalitas pemblokiran konten bawaan. -- Mendukung kompartementalisasi kuki (ala [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. Hal ini dapat memberikan keuntungan dibandingkan memasang aplikasi berbasis Electron, karena Anda mendapatkan manfaat dari pembaruan keamanan reguler peramban Anda. - Tidak mencantumkan fungsionalitas tambahan (bloatware) yang tidak memengaruhi privasi pengguna. - Tidak mengumpulkan telemetri secara bawaan. @@ -462,4 +462,4 @@ Kriteria kasus terbaik kami mewakili apa yang ingin kami lihat dari proyek yang - Harus secara langsung berdampak pada privasi pengguna, yaitu tidak boleh hanya memberikan informasi. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/id/desktop.md b/i18n/id/desktop.md index 0c91514c..2092e9aa 100644 --- a/i18n/id/desktop.md +++ b/i18n/id/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/id/device-integrity.md b/i18n/id/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/id/device-integrity.md +++ b/i18n/id/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/id/dns.md b/i18n/id/dns.md index 5cf3e07b..43cec272 100644 --- a/i18n/id/dns.md +++ b/i18n/id/dns.md @@ -11,14 +11,14 @@ DNS terenkripsi dengan server pihak ketiga sebaiknya hanya digunakan untuk menga ## Penyedia yang Direkomendasikan -| Penyedia DNS | Kebijakan Privasi | Protokol | Pencatatan Log | ECS | Pemfilteran | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | -------------- | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Beberapa[^1] | Yes | Berdasarkan konfigurasi pribadi. Daftar filter yang digunakan dapat ditemukan di sini. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Teks biasa
DoH/3
DoT | Beberapa[^2] | Tidak | Berdasarkan konfigurasi pribadi. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Teks biasa
DoH/3
DoT
DoQ | Opsional[^3] | Tidak | Berdasarkan konfigurasi pribadi. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | Tidak[^4] | Tidak | Berdasarkan konfigurasi pribadi. Daftar filter yang digunakan dapat ditemukan di sini. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Teks biasa
DoH/3
DoT
DoQ | Opsional[^5] | Opsional | Berdasarkan konfigurasi pribadi. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Teks biasa
DoH
DoT
DNSCrypt | Beberapa[^6] | Opsional | Berdasarkan konfigurasi personal, Malware terblokir secara default. | +| Penyedia DNS | Kebijakan Privasi | Protokol | Pencatatan Log | ECS | Pemfilteran | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | -------------- | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Beberapa[^1] | Yes | Berdasarkan konfigurasi pribadi. Daftar filter yang digunakan dapat ditemukan di sini. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Teks biasa
DoH/3
DoT | Beberapa[^2] | Tidak | Berdasarkan konfigurasi pribadi. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Teks biasa
DoH/3
DoT
DoQ | Opsional[^3] | Tidak | Berdasarkan konfigurasi pribadi. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | Tidak[^4] | Tidak | Berdasarkan konfigurasi pribadi. Daftar filter yang digunakan dapat ditemukan di sini. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Teks biasa
DoH/3
DoT
DoQ | Opsional[^5] | Opsional | Berdasarkan konfigurasi pribadi. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Teks biasa
DoH
DoT
DNSCrypt | Beberapa[^6] | Opsional | Berdasarkan konfigurasi personal, Malware terblokir secara default. | ### Kriteria @@ -50,7 +50,7 @@ Setelah pemasangan profil konfigurasi atau aplikasi yang menggunakan API Pengatu #### Profil yang Ditandatangani -Apple tidak menyediakan antarmuka asli untuk membuat profil DNS terenkripsi. [Pembuat profil DNS aman](https://dns.notjakob.com/tool.html) adalah alat tidak resmi untuk membuat profil DNS terenkripsi Anda sendiri, namun profil tersebut tidak akan ditandatangani. Profil yang ditandatangani lebih disukai; penandatanganan memvalidasi asal profil dan membantu memastikan integritas profil. Label "Terverifikasi" berwarna hijau diberikan pada profil konfigurasi yang telah ditandatangani. Untuk informasi lebih lanjut tentang penandatanganan kode, lihat [Tentang Penandatanganan Kode](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Profil yang ditandatangani** ditawarkan oleh [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), dan [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple tidak menyediakan antarmuka asli untuk membuat profil DNS terenkripsi. [Pembuat profil DNS aman](https://dns.notjakob.com/tool.html) adalah alat tidak resmi untuk membuat profil DNS terenkripsi Anda sendiri, namun profil tersebut tidak akan ditandatangani. Profil yang ditandatangani lebih disukai; penandatanganan memvalidasi asal profil dan membantu memastikan integritas profil. Label "Terverifikasi" berwarna hijau diberikan pada profil konfigurasi yang telah ditandatangani. Untuk informasi lebih lanjut tentang penandatanganan kode, lihat [Tentang Penandatanganan Kode](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Perangkat lunak proxy DNS terenkripsi menyediakan proxy lokal untuk [DNS tidak t [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -123,9 +123,9 @@ Solusi DNS yang dihosting sendiri berguna untuk menyediakan penyaringan pada pla
-![Logo AdGuard Home](assets/img/dns/adguard-home.svg){ align=right } +![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** adalah [lubang penyaring DNS](https://en.wikipedia.org/wiki/DNS_sinkhole) yang menggunakan [penyaringan DNS] (https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) untuk memblokir konten web yang tidak diinginkan, seperti iklan. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home memiliki antarmuka web yang dipoles untuk melihat wawasan dan mengelola konten yang diblokir. @@ -142,25 +142,25 @@ AdGuard Home memiliki antarmuka web yang dipoles untuk melihat wawasan dan menge
-![Logo Pi-hole](assets/img/dns/pi-hole.svg){ align=right } +![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** adalah [lubang penyaring DNS](https://en.wikipedia.org/wiki/DNS_sinkhole) yang menggunakan [penyaringan DNS] (https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) untuk memblokir konten web yang tidak diinginkan, seperti iklan. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole dirancang untuk dihosting di Raspberry Pi, tetapi tidak terbatas pada perangkat keras tersebut. Perangkat lunak ini memiliki antarmuka web yang ramah untuk melihat analisis dan mengelola konten yang diblokir. -[:octicons-home-16: Beranda](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Kebijakan Privasi" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Dokumentasi} -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Kode Sumber" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Kontribusi } +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
[^1]: AdGuard menyimpan informasi kinerja dari server DNS mereka, seperti informasi request kepada server tertentu, jumlah request yang terblokir dan informasi mengenai kecepatan request ketika sedang diproses. Mereka juga menyimpan database domain yang diminta dalam waktu 24 jam terakhir. "Kami membutuhkan informasi ini untuk mengidentifikasi dan memblokir pelacak dan ancaman baru." "Kami juga mencatat berapa kali pelacak telah diblokir. Kami membutuhkan informasi ini untuk menghapus aturan lama dari filter kami." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare hanya mengumpulkan dan menyimpan data permintaan DNS terbatas yang dikirim ke resolver 1.1.1.1. Layanan resolver 1.1.1.1 tidak mencatat data pribadi, dan sebagian besar data yang tidak dapat diidentifikasi secara pribadi hanya disimpan selama 25 jam. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare hanya mengumpulkan dan menyimpan data permintaan DNS terbatas yang dikirim ke resolver 1.1.1.1. Layanan resolver 1.1.1.1 tidak mencatat data pribadi, dan sebagian besar data yang tidak dapat diidentifikasi secara pribadi hanya disimpan selama 25 jam. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D hanya mencatat untuk resolver Premium dengan profil DNS khusus. Resolver gratis tidak mencatat data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Layanan DNS Mullvad tersedia untuk pelanggan dan non-pelanggan Mullvad VPN. Kebijakan privasi mereka secara eksplisit mengklaim bahwa mereka tidak mencatat permintaan DNS dengan cara apa pun. [https://mullvad.net/en/help/no-logging-data-policy](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Layanan DNS Mullvad tersedia untuk pelanggan dan non-pelanggan Mullvad VPN. Kebijakan privasi mereka secara eksplisit mengklaim bahwa mereka tidak mencatat permintaan DNS dengan cara apa pun. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. Anda dapat memilih waktu penyimpanan dan lokasi penyimpanan log untuk disimpan. Jika tidak diminta secara khusus, tidak ada data yang dicatat. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 mengumpulkan beberapa data untuk tujuan pemantauan dan tanggapan ancaman. Data nantinya diacak dan dibagikan untuk tujuan penelitian keamanan. Quad9 tidak mengumpulkan atau mencatat alamat IP atau data lain yang mereka anggap dapat diidentifikasi secara pribadi. [https://www.quad9.net/privacy/policy](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 mengumpulkan beberapa data untuk tujuan pemantauan dan tanggapan ancaman. Data nantinya diacak dan dibagikan untuk tujuan penelitian keamanan. Quad9 tidak mengumpulkan atau mencatat alamat IP atau data lain yang mereka anggap dapat diidentifikasi secara pribadi. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/id/email-clients.md b/i18n/id/email-clients.md index 0e4b0a93..927ad727 100644 --- a/i18n/id/email-clients.md +++ b/i18n/id/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/id/email.md b/i18n/id/email.md index 360a3318..671fc507 100644 --- a/i18n/id/email.md +++ b/i18n/id/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail memiliki laporan mogok internal yang tidak **dibagikan kepada pihak #### :material-check:{ .pg-green } Domain dan Alias Khusus -Pelanggan Proton Mail berbayar dapat menggunakan domain mereka sendiri dengan layanan ini atau alamat [yang mencakup semua](https://proton.me/support/catch-all). Proton Mail juga mendukung [subalamat](https://proton.me/support/creating-aliases), yang berguna bagi orang-orang yang tidak ingin membeli domain. +Pelanggan Proton Mail berbayar dapat menggunakan domain mereka sendiri dengan layanan ini atau alamat [yang mencakup semua](https://proton.me/support/catch-all). Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Metode Pembayaran Pribadi @@ -129,7 +129,7 @@ Proton Mail tidak menawarkan fitur warisan digital. #### :material-check:{ .pg-green } Domain dan Alias Khusus -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Metode Pembayaran Pribadi @@ -137,17 +137,17 @@ Mailbox.org tidak menerima Bitcoin atau mata uang kripto lainnya sebagai karena #### :material-check:{ .pg-green } Keamanan Akun -Mailbox.org mendukung [autentikasi dua faktor](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) hanya untuk surel web mereka. Anda dapat menggunakan TOTP atau [YubiKey](https://en.wikipedia.org/wiki/YubiKey) melalui [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Standar web seperti [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) belum didukung. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Standar web seperti [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) belum didukung. #### :material-information-outline:{ .pg-blue } Keamanan Data -Mailbox.org memungkinkan enkripsi surat masuk menggunakan [kotak surat terenkripsi](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). Pesan baru yang Anda terima akan segera dienkripsi dengan kunci publik Anda. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). Pesan baru yang Anda terima akan segera dienkripsi dengan kunci publik Anda. -Namun, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), platform perangkat lunak yang digunakan oleh Mailbox.org, [tidak mendukung](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) enkripsi buku alamat dan kalender Anda. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } Email Encryption -Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. Fitur ini berguna ketika penerima jarak jauh tidak memiliki OpenPGP dan tidak dapat mendekripsi salinan email di kotak surat mereka sendiri. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. Fitur ini berguna ketika penerima jarak jauh tidak memiliki OpenPGP dan tidak dapat mendekripsi salinan email di kotak surat mereka sendiri. Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). Hal ini memungkinkan orang di luar Mailbox.org untuk menemukan kunci OpenPGP dari akun Mailbox.org dengan mudah, untuk lintas-penyedia E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Your account will be set to a restricted user account when your contract ends, a #### :material-information-outline:{ .pg-blue } Fungsionalitas Tambahan -You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. -All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org memiliki fitur warisan digital untuk semua paket. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Domain dan Alias Khusus -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [mengaudit](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io pada September 2023 dan tidak ada kerentanan signifikan [yang teridentifikasi](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Kriteria @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum untuk Memenuhi Syarat:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Program bug-bounty dan/atau proses pengungkapan kerentanan yang terkoordinasi. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Kepercayaan diff --git a/i18n/id/encryption.md b/i18n/id/encryption.md index f11440ac..c7230df5 100644 --- a/i18n/id/encryption.md +++ b/i18n/id/encryption.md @@ -22,15 +22,15 @@ Opsi yang tercantum di sini adalah multi-platform dan sangat bagus untuk membuat [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ Untuk mengenkripsi kandar tempat sistem operasi Anda melakukan but, kami umumnya ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. Alasan utama kami merekomendasikannya untuk mengenkripsi kandar but Anda adalah karena [penggunaan TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, sebuah perusahaan forensik, telah menulis tentang fitur ini di [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/id/file-sharing.md b/i18n/id/file-sharing.md index 9312f608..90cc1255 100644 --- a/i18n/id/file-sharing.md +++ b/i18n/id/file-sharing.md @@ -15,7 +15,7 @@ Temukan cara berbagi file secara pribadi di antara perangkat Anda, dengan teman ![Logo Send](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** adalah cabang dari layanan Firefox Send yang sudah tidak digunakan lagi oleh Mozilla yang memungkinkan Anda untuk mengirim berkas kepada orang lain dengan sebuah tautan. File dienkripsi di perangkat Anda sehingga tidak dapat dibaca oleh server, dan secara opsional juga dapat dilindungi dengan kata sandi. Pengelola Send menghosting sebuah [server publik](https://send.vis.ee/). Anda bisa menggunakan server publik lainnya, atau Anda bisa meng-host Send sendiri. +**Send** adalah cabang dari layanan Firefox Send yang sudah tidak digunakan lagi oleh Mozilla yang memungkinkan Anda untuk mengirim berkas kepada orang lain dengan sebuah tautan. File dienkripsi di perangkat Anda sehingga tidak dapat dibaca oleh server, dan secara opsional juga dapat dilindungi dengan kata sandi. The maintainer of Send hosts a [public instance](https://send.vis.ee). Anda bisa menggunakan server publik lainnya, atau Anda bisa meng-host Send sendiri. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -81,9 +81,9 @@ Kami sedang berupaya menetapkan kriteria yang jelas untuk setiap bagian dari sit **FreedomBox** adalah sistem operasi yang dirancang untuk dijalankan pada [komputer papan tunggal (SBC)] (https://en.wikipedia.org/wiki/Single-board_computer). Tujuannya adalah untuk memudahkan pengaturan aplikasi server yang mungkin ingin Anda hosting sendiri. [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Dokumentasi} -[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Kode Sumber" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Kontribusi } +[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} +[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ Kami sedang berupaya menetapkan kriteria yang jelas untuk setiap bagian dari sit [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/id/financial-services.md b/i18n/id/financial-services.md index 9a42a652..01cc287a 100644 --- a/i18n/id/financial-services.md +++ b/i18n/id/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/id/frontends.md b/i18n/id/frontends.md index 14e5ba16..ab343679 100644 --- a/i18n/id/frontends.md +++ b/i18n/id/frontends.md @@ -17,9 +17,9 @@ When you are using an instance run by someone else, make sure to read the privac
-![Logo ProxiTok](assets/img/frontends/proxitok.svg){ align=right } +![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** adalah sebuah "bagian depan" bersumber terbuka untuk situs web [TikTok](https://www.tiktok.com) yang juga dapat dihos sendiri. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device.
-1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/id/index.md b/i18n/id/index.md index d41057fa..797af536 100644 --- a/i18n/id/index.md +++ b/i18n/id/index.md @@ -62,12 +62,12 @@ Mencoba untuk melindungi semua data Anda dari semua orang setiap saat tidaklah p ## Kami membutuhkan Anda! Berikut adalah cara untuk terlibat: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Bergabung dengan Forum kami" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Ikuti kami di Mastodon" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Berkontribusi ke situs web ini" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Bantu menerjemahkan situs web ini" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Obrol dengan kami di Matrix" } -[:material-information-outline:](about/index.md){ title="Pelajari lebih lanjut tentang kami" } -[:material-hand-coin-outline:](about/donate.md){ title="Dukung proyek ini" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } Ini penting bagi situs web seperti Privacy Guides untuk selalu mendapatkan informasi yang terbaru. Kami membutuhkan audiens kami untuk mengawasi pembaruan perangkat lunak untuk aplikasi yang terdaftar di situs kami dan mengikuti berita terbaru tentang penyedia yang kami rekomendasikan. Memang sulit untuk mengimbangi kecepatan internet yang begitu cepat, tetapi kami berusaha sebaik mungkin. Jika Anda menemukan kesalahan, merasa bahwa sebuah penyedia tidak seharusnya terdaftar, melihat penyedia yang memenuhi syarat tidak ada, merasa plugin peramban tidak lagi menjadi pilihan terbaik, atau menemukan masalah lain, silakan beri tahu kami. diff --git a/i18n/id/kb-archive.md b/i18n/id/kb-archive.md index 0759938b..ec4d74c0 100644 --- a/i18n/id/kb-archive.md +++ b/i18n/id/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Pengerasan Konfigurasi Signal](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - Pengerasan Sistem](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Kotak Pasir Aplikasi](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Penghapusan Data Aman](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Mengintegrasikan Penghapusan Metadata](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [Panduan Konfigurasi iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Pengerasan Konfigurasi Signal](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - Pengerasan Sistem](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Kotak Pasir Aplikasi](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Penghapusan Data Aman](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Mengintegrasikan Penghapusan Metadata](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [Panduan Konfigurasi iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/id/meta/admonitions.md b/i18n/id/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/id/meta/admonitions.md +++ b/i18n/id/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/id/meta/translations.md b/i18n/id/meta/translations.md index a43e39d7..215224cd 100644 --- a/i18n/id/meta/translations.md +++ b/i18n/id/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/id/meta/uploading-images.md b/i18n/id/meta/uploading-images.md index 5a84e3b2..7b261b89 100644 --- a/i18n/id/meta/uploading-images.md +++ b/i18n/id/meta/uploading-images.md @@ -17,7 +17,7 @@ Logo perusahaan memiliki ukuran kanvas: ### PNG -Gunakan [OptiPNG](https://sourceforge.net/projects/optipng/) untuk mengoptimalkan gambar PNG: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/id/meta/writing-style.md b/i18n/id/meta/writing-style.md index 4e68d568..30785e64 100644 --- a/i18n/id/meta/writing-style.md +++ b/i18n/id/meta/writing-style.md @@ -4,11 +4,11 @@ title: Gaya Penulisan Privacy Guides ditulis dalam bahasa Inggris Amerika, dan Anda harus merujuk ke [pedoman Gaya APA](https://apastyle.apa.org/style-grammar-guidelines/grammar) jika ragu. -Secara umum, [pedoman bahasa sederhana federal Amerika Serikat](https://www.plainlanguage.gov/guidelines/) memberikan gambaran umum yang baik tentang cara menulis dengan jelas dan ringkas. Kami menyoroti beberapa catatan penting dari panduan ini di bawah ini. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. Kami menyoroti beberapa catatan penting dari panduan ini di bawah ini. ## Menulis untuk audiens kami -[Audiens](https://www.plainlanguage.gov/guidelines/audience/) yang dituju oleh Privacy Guides terutama adalah orang dewasa yang menggunakan teknologi. Jangan membuat konten yang bodoh seolah-olah Anda sedang berbicara kepada kelas sekolah menengah, tetapi jangan terlalu sering menggunakan terminologi yang rumit tentang konsep yang tidak dipahami oleh pengguna komputer pada umumnya. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Jangan membuat konten yang bodoh seolah-olah Anda sedang berbicara kepada kelas sekolah menengah, tetapi jangan terlalu sering menggunakan terminologi yang rumit tentang konsep yang tidak dipahami oleh pengguna komputer pada umumnya. ### Sampaikan hanya apa yang ingin diketahui oleh orang lain @@ -24,7 +24,7 @@ Kami menulis *untuk* berbagai macam orang, tetapi kami menulis *untuk* orang yan > > Ketika Anda menggunakan kata "Anda" untuk menyapa pengguna, mereka akan lebih mudah memahami apa yang menjadi tanggung jawab mereka. -Sumber: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Hindari "pengguna" @@ -37,7 +37,7 @@ Organisasi adalah kuncinya. Konten harus mengalir dari informasi yang paling pen - Batasi dokumen menjadi sekitar lima atau enam bagian. Dokumen panjang mungkin harus dipecah menjadi halaman terpisah. - Tandai ide-ide penting dengan **cetak tebal** atau *cetak miring*. -Sumber: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Mulailah dengan kalimat topik @@ -45,7 +45,7 @@ Sumber: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > Kita sering menulis sesuai dengan cara kita berpikir, dengan mengutamakan premis-premis kita terlebih dahulu, baru kemudian kesimpulan. Ini mungkin cara alami untuk mengembangkan pikiran, tetapi kita berakhir dengan kalimat topik di akhir paragraf. Pindahkan ke depan dan beri tahu pengguna ke mana tujuan Anda. Jangan membuat pembaca menyimpan banyak informasi di kepala mereka sebelum sampai ke intinya. -Sumber: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Pilih kata-kata Anda dengan hati-hati @@ -65,7 +65,7 @@ Kita harus mencoba menghindari singkatan jika memungkinkan, tetapi teknologi pen > Kata-kata yang tidak perlu akan membuang waktu audiens Anda. Tulisan yang bagus itu seperti sebuah percakapan. Hilangkan informasi yang tidak perlu diketahui oleh audiens. Hal ini bisa menjadi sulit sebagai seorang ahli materi, jadi penting untuk memiliki seseorang yang melihat informasi dari sudut pandang audiens. -Sumber: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Buat teks seperti percakapan @@ -77,7 +77,7 @@ Sumber: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Suara aktif memperjelas siapa yang seharusnya melakukan apa. Hal ini menghilangkan ambiguitas tentang tanggung jawab. Bukan "Ini harus dilakukan," tetapi "Anda harus melakukannya." -Sumber: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Gunakan "harus" untuk persyaratan diff --git a/i18n/id/mobile-browsers.md b/i18n/id/mobile-browsers.md index 7f1c1487..472b3821 100644 --- a/i18n/id/mobile-browsers.md +++ b/i18n/id/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ Berikut ini adalah peramban web seluler yang kami rekomendasikan saat ini besert ## Android -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave dibuat berdasarkan proyek peramban web Chromium, sehingga seharusnya terasa familier dan memiliki masalah kompatibilitas situs web yang minimal. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ Opsi-opsi ini dapat ditemukan di :material-menu: → **Pengaturan** → **Perisa ##### Perisai -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/id/multi-factor-authentication.md b/i18n/id/multi-factor-authentication.md index fd50e906..60158406 100644 --- a/i18n/id/multi-factor-authentication.md +++ b/i18n/id/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). Semua klien Yubico bersumber terbuka. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). Semua klien Yubico bersumber terbuka. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Firmware Nitrokey bersumber terbuka, tidak seperti YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/id/news-aggregators.md b/i18n/id/news-aggregators.md index f2b204fd..050ce984 100644 --- a/i18n/id/news-aggregators.md +++ b/i18n/id/news-aggregators.md @@ -21,7 +21,7 @@ cover: news-aggregators.webp [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ cover: news-aggregators.webp [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ cover: news-aggregators.webp **NetNewsWire** adalah pembaca berita gratis dan bersumber terbuka untuk macOS dan iOS dengan fokus pada desain dan fitur asli. Ini mendukung format feed yang umum di samping dukungan bawaan untuk feed Reddit. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit memungkinkan Anda untuk berlangganan subreddit melalui RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ Anda dapat berlangganan saluran YouTube tanpa masuk dan mengaitkan informasi pen Untuk berlangganan saluran YouTube dengan klien RSS, pertama-tama cari [kode saluran](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/id/notebooks.md b/i18n/id/notebooks.md index eb71fbb5..84741127 100644 --- a/i18n/id/notebooks.md +++ b/i18n/id/notebooks.md @@ -34,7 +34,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ If you are currently using an application like Evernote, Google Keep, or Microso Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/id/os/android-overview.md b/i18n/id/os/android-overview.md index 73695b08..9ef43ea1 100644 --- a/i18n/id/os/android-overview.md +++ b/i18n/id/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEM memiliki perjanjian dukungan dengan mitra mereka untuk menyediakan komponen sumber tertutup untuk periode dukungan terbatas. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Oleh karena itu, penting bagi Anda untuk membeli perangkat dalam siklus dukungan yang aktif. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) dan [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) mendukung perangkat mereka selama 4 tahun, sementara produk yang lebih murah sering kali memiliki siklus dukungan yang lebih pendek. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Oleh karena itu, penting bagi Anda untuk membeli perangkat dalam siklus dukungan yang aktif. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. Ini berarti bahwa masalah keamanan pada perangkat tersebut akan tetap tidak diperbaiki. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-Jika sebuah aplikasi sebagian besar merupakan layanan berbasis web, pelacakan dapat terjadi di sisi server. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) menunjukkan "tidak ada pelacak" tetapi tentu saja melacak minat dan perilaku pengguna di seluruh situs. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +Jika sebuah aplikasi sebagian besar merupakan layanan berbasis web, pelacakan dapat terjadi di sisi server. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Aplikasi ramah privasi seperti [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) dapat menampilkan beberapa pelacak seperti [Google Firebase Analytics] (https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. Ini [adalah kasus] (https://fosstodon.org/@bitwarden/109636825700482007) dengan Bitwarden. Itu tidak berarti bahwa Bitwarden menggunakan semua fitur analisis yang disediakan oleh Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. Ini [adalah kasus] (https://fosstodon.org/@bitwarden/109636825700482007) dengan Bitwarden. Itu tidak berarti bahwa Bitwarden menggunakan semua fitur analisis yang disediakan oleh Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Program Perlindungan Lanjutan -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### ID Iklan -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/id/os/ios-overview.md b/i18n/id/os/ios-overview.md index f31aecda..2cbabfa1 100644 --- a/i18n/id/os/ios-overview.md +++ b/i18n/id/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/id/os/linux-overview.md b/i18n/id/os/linux-overview.md index 9d05c2d5..1354559d 100644 --- a/i18n/id/os/linux-overview.md +++ b/i18n/id/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Keamanan Sumber Terbuka -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/id/os/macos-overview.md b/i18n/id/os/macos-overview.md index af821840..209d36c3 100644 --- a/i18n/id/os/macos-overview.md +++ b/i18n/id/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Konfigurasi yang Disarankan Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Klik **Nyalakan** diff --git a/i18n/id/os/qubes-overview.md b/i18n/id/os/qubes-overview.md index e809b07a..b065b317 100644 --- a/i18n/id/os/qubes-overview.md +++ b/i18n/id/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes adalah sistem operasi yang dibangun dengan mengisolasi aplikasi di dalam *qubes* (sebelumnya disebut "VM") untuk meningkatkan keamanan. --- -[**Qubes OS**](../desktop.md#qubes-os) adalah sistem operasi sumber terbuka yang menggunakan hypervisor [Xen](https://en.wikipedia.org/wiki/Xen) untuk memberikan keamanan yang kuat untuk komputasi desktop melalui *qubes*yang terisolasi, (yang merupakan Mesin Virtual). Anda dapat menetapkan setiap *qube* tingkat kepercayaan berdasarkan tujuannya. Qubes OS menyediakan keamanan dengan menggunakan isolasi. Ini hanya mengizinkan tindakan berdasarkan basis per kasus dan oleh karena itu merupakan kebalikan dari [enumerasi keburukan](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) adalah sistem operasi sumber terbuka yang menggunakan hypervisor [Xen](https://en.wikipedia.org/wiki/Xen) untuk memberikan keamanan yang kuat untuk komputasi desktop melalui *qubes*yang terisolasi, (yang merupakan Mesin Virtual). Anda dapat menetapkan setiap *qube* tingkat kepercayaan berdasarkan tujuannya. Qubes OS menyediakan keamanan dengan menggunakan isolasi. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## Bagaimana cara kerja Qubes OS? -Qubes menggunakan kompartementalisasi [](https://www.qubes-os.org/intro/) untuk menjaga sistem tetap aman. Qubes dibuat dari beberapa template, umumnya untuk Fedora, Debian dan [Whonix](../desktop.md#whonix). Qubes OS juga memungkinkan Anda untuk membuat [sekali pakai](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes sekali pakai*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes dibuat dari beberapa template, umumnya untuk Fedora, Debian dan [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Beberapa informasi di sini dan di dokumentasi Qubes OS mungkin mengandung bahasa ![Arsitektur Qubes](../assets/img/qubes/qubes-trust-level-architecture.png)
Arsitektur Qubes, Kredit: Apa itu Qubes OS Intro
-Setiap aplikasi Qubes memiliki [batas berwarna](https://www.qubes-os.org/screenshots/) yang dapat membantu Anda melacak mesin virtual yang sedang berjalan. Anda dapat menggunakan warna tertentu di peramban khusus untuk perbankan, sementara menggunakan warna yang berbeda untuk peramban umum yang tidak terpercaya. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. Anda dapat menggunakan warna tertentu di peramban khusus untuk perbankan, sementara menggunakan warna yang berbeda untuk peramban umum yang tidak terpercaya. ![Pembatas berwarna](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Batas jendela Qubes, Kredit: Tangkapan Layar Qubes
@@ -33,7 +33,7 @@ Qubes OS menggunakan [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM untuk ### Menyalin dan Menempel Teks -Anda dapat [menyalin dan menempelkan teks](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) menggunakan `qvm-copy-to-vm` atau dengan petunjuk di bawah ini: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Tekan **Ctrl+C** untuk memberi tahu *qube* yang Anda masuki bahwa Anda ingin menyalin sesuatu. 2. Tekan **Ctrl+Shift+C** untuk memberi tahu qube ** agar buffer ini tersedia di papan klip global. @@ -47,13 +47,13 @@ Untuk menyalin dan menempelkan file dan direktori (folder) dari satu *qube* ke *
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. Ketika melakukan hal tersebut, perubahan tidak langsung dilakukan dan dapat dengan mudah dibatalkan jika terjadi kecelakaan. When you run a *qube*, it does not have a persistent filesystem. Anda dapat membuat dan menghapus file, tetapi perubahan ini bersifat sementara. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. Ketika melakukan hal tersebut, perubahan tidak langsung dilakukan dan dapat dengan mudah dibatalkan jika terjadi kecelakaan. When you run a *qube*, it does not have a persistent filesystem. Anda dapat membuat dan menghapus file, tetapi perubahan ini bersifat sementara.
### Interaksi Antar-VM -[Kerangka kerja qrexec](https://www.qubes-os.org/doc/qrexec/) adalah bagian inti dari Qubes yang memungkinkan komunikasi antar domain. Ini dibangun di atas pustaka Xen *vchan*, yang memfasilitasi [isolasi melalui kebijakan](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Sumber Daya Tambahan -Untuk informasi tambahan, kami menganjurkan Anda untuk membaca halaman dokumentasi Qubes OS yang luas yang terletak di [Situs Web Qubes OS](https://www.qubes-os.org/doc/). Salinan offline dapat diunduh dari [repositori dokumentasi](https://github.com/QubesOS/qubes-doc) Qubes OS. +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Salinan offline dapat diunduh dari [repositori dokumentasi](https://github.com/QubesOS/qubes-doc) Qubes OS. -- [Sistem operasi paling aman di dunia](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Artikel Terkait](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/id/passwords.md b/i18n/id/passwords.md index 60d4a225..6726f8f7 100644 --- a/i18n/id/passwords.md +++ b/i18n/id/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Pengelola Kata Sandi operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Pengelola Kata Sandi operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Pengelola Kata Sandi operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Pengelola Kata Sandi operatingSystem: - Windows @@ -127,7 +127,7 @@ Pengelola kata sandi memungkinkan Anda menyimpan dan mengelola kata sandi dan kr Pengelola kata sandi bawaan pada perangkat lunak seperti peramban dan sistem operasi terkadang tidak sebaik perangkat lunak pengelola kata sandi khusus. Keuntungan dari pengelola kata sandi bawaan adalah integrasi yang baik dengan perangkat lunak, tetapi sering kali sangat sederhana dan tidak memiliki fitur privasi dan keamanan seperti yang dimiliki oleh penawaran mandiri. -Sebagai contoh, pengelola kata sandi di Microsoft Edge sama sekali tidak menawarkan E2EE. Pengelola kata sandi Google memiliki [optional](https://support.google.com/accounts/answer/11350823) E2EE, dan [Apple] (https://support.apple.com/en-us/HT202303) menawarkan E2EE secara default. +Sebagai contoh, pengelola kata sandi di Microsoft Edge sama sekali tidak menawarkan E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ Pengelola kata sandi ini menyinkronkan kata sandi Anda ke server cloud untuk kem [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ Pengelola kata sandi ini menyinkronkan kata sandi Anda ke server cloud untuk kem -Bitwarden juga memiliki fitur [Bitwarden Send](https://bitwarden.com/products/send/), yang memungkinkan Anda untuk berbagi teks dan file dengan aman dengan [ enkripsi end-to-end](https://bitwarden.com/help/send-encryption). [Kata sandi](https://bitwarden.com/help/send-privacy/#send-passwords) dapat diminta bersama dengan tautan kirim. Bitwarden Send juga memiliki fitur [penghapusan otomatis](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). [Kata sandi](https://bitwarden.com/help/send-privacy/#send-passwords) dapat diminta bersama dengan tautan kirim. Bitwarden Send juga memiliki fitur [penghapusan otomatis](https://bitwarden.com/help/send-lifespan). Anda memerlukan [Paket Premium](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) untuk dapat berbagi file. Paket yang gratis hanya bisa berbagi teks saja. @@ -183,20 +183,20 @@ Kode sisi server Bitwarden [bersumber terbuka](https://github.com/bitwarden/serv ![Logo 1Password](assets/img/password-management/1password.svg){ align=right } -**1Password** adalah pengelola kata sandi dengan fokus yang kuat pada keamanan dan kemudahan penggunaan, yang memungkinkan Anda menyimpan kata sandi, kartu kredit, lisensi perangkat lunak, dan informasi sensitif lainnya dalam brankas digital yang aman. Brankas Anda di-host di server 1Password dengan biaya [biaya bulanan] (https://1password.com/sign-up/). 1Password sudah [teraudit](https://support.1password.com/security-assessments/) secara teratur dan menyediakan dukungan pelanggan yang bagus. 1Password memiliki sumber yang tertutup; namun, keamanan produk didokumentasikan secara menyeluruh dalam [laporan resmi keamanan] (https://1passwordstatic.com/files/security/1password-white-paper.pdf) mereka. +**1Password** adalah pengelola kata sandi dengan fokus yang kuat pada keamanan dan kemudahan penggunaan, yang memungkinkan Anda menyimpan kata sandi, kartu kredit, lisensi perangkat lunak, dan informasi sensitif lainnya dalam brankas digital yang aman. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password memiliki sumber yang tertutup; namun, keamanan produk didokumentasikan secara menyeluruh dalam [laporan resmi keamanan] (https://1passwordstatic.com/files/security/1password-white-paper.pdf) mereka. -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ Satu keunggulan yang dimiliki 1Password dibandingkan Bitwarden adalah dukungan k Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ Opsi ini memungkinkan Anda untuk mengelola basis data kata sandi terenkripsi sec [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC menyimpan data ekspornya sebagai file [CSV](https://en.wikipedia.org/w **KeePassDX** adalah pengelola kata sandi yang ringan untuk Android, memungkinkan pengeditan data terenkripsi dalam satu file dalam format KeePass dan dapat mengisi formulir dengan cara yang aman. [Contributor Pro] (https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) memungkinkan untuk membuka konten kosmetik dan fitur protokol non-standar, tetapi yang lebih penting lagi, ini membantu dan mendorong pengembangan. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC menyimpan data ekspornya sebagai file [CSV](https://en.wikipedia.org/w ![Logo Strongbox](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** adalah pengelola kata sandi sumber terbuka untuk iOS dan macOS. Mendukung format KeePass dan Password Safe, Strongbox bisa digunakan bersamaan dengan pengelola kata sandi lainnya, seperti KeePassXC, pada platform non-Apple. Dengan menggunakan [model freemium] (https://strongboxsafe.com/pricing/), Strongbox menawarkan sebagian besar fitur di bawah tingkat gratisnya dengan lebih berorientasi pada kenyamanan [features](https://strongboxsafe.com/comparison/) - seperti otentikasi biometrik - yang terkunci di balik langganan atau lisensi abadi. +**Strongbox** adalah pengelola kata sandi sumber terbuka untuk iOS dan macOS. Mendukung format KeePass dan Password Safe, Strongbox bisa digunakan bersamaan dengan pengelola kata sandi lainnya, seperti KeePassXC, pada platform non-Apple. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Selain itu, ada versi khusus offline yang ditawarkan: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). Versi ini sudah diminimalkan dalam upaya untuk mengurangi permukaan serangan. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Versi ini sudah diminimalkan dalam upaya untuk mengurangi permukaan serangan. ### Baris perintah @@ -356,7 +356,7 @@ Produk-produk ini adalah pengelola kata sandi minimal yang dapat digunakan dalam **gopass** adalah pengelola kata sandi untuk baris perintah yang ditulis dalam Go. Aplikasi ini bekerja pada semua sistem operasi desktop dan server utama (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ Produk-produk ini adalah pengelola kata sandi minimal yang dapat digunakan dalam
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/id/photo-management.md b/i18n/id/photo-management.md index df68b58b..01ac39fc 100644 --- a/i18n/id/photo-management.md +++ b/i18n/id/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/id/productivity.md b/i18n/id/productivity.md index cd390f20..612fb036 100644 --- a/i18n/id/productivity.md +++ b/i18n/id/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Kriteria kasus terbaik kami mewakili apa yang ingin kami lihat dari proyek yang **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Kriteria kasus terbaik kami mewakili apa yang ingin kami lihat dari proyek yang **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Kriteria kasus terbaik kami mewakili apa yang ingin kami lihat dari proyek yang - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/id/real-time-communication.md b/i18n/id/real-time-communication.md index d419e9a0..004a96dd 100644 --- a/i18n/id/real-time-communication.md +++ b/i18n/id/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/id/router.md b/i18n/id/router.md index 5d62defa..3ebbcb5b 100644 --- a/i18n/id/router.md +++ b/i18n/id/router.md @@ -35,10 +35,10 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to **OPNsense** adalah platform tembok api dan perutean berbasis FreeBSD yang bersumber terbuka, yang menggabungkan banyak fitur canggih seperti pembentukan lalu lintas internet, penyeimbangan beban, dan kemampuan VPN, dengan banyak fitur lain yang tersedia dalam bentuk plugin. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/id/search-engines.md b/i18n/id/search-engines.md index b41658b0..b5e7aa37 100644 --- a/i18n/id/search-engines.md +++ b/i18n/id/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Kriteria diff --git a/i18n/id/tools.md b/i18n/id/tools.md index a8e0df84..29295479 100644 --- a/i18n/id/tools.md +++ b/i18n/id/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides adalah situs web yang paling transparan dan dapat di Jika Anda mencari solusi spesifik untuk sesuatu, berikut ini adalah perangkat keras dan perangkat lunak yang kami rekomendasikan dalam berbagai kategori. Perangkat privasi yang kami rekomendasikan terutama dipilih berdasarkan fitur keamanan, dengan penekanan tambahan pada perangkat yang terdesentralisasi dan bersumber terbuka. Mereka dapat diterapkan pada berbagai model ancaman mulai dari perlindungan terhadap program pengawasan massal global dan menghindari perusahaan teknologi besar hingga memitigasi serangan, tetapi hanya Anda yang dapat menentukan mana yang paling sesuai dengan kebutuhan Anda. -Jika Anda ingin mendapatkan bantuan untuk mengetahui alat privasi terbaik dan program alternatif untuk kebutuhan Anda, mulailah berdiskusi di [forum](https://discuss.privacyguides.net/) atau komunitas [Matrix](https://matrix.to/#/#privacyguides:matrix.org) kami! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! Untuk detail lebih lanjut tentang setiap proyek, mengapa proyek tersebut dipilih, dan tips atau trik tambahan yang kami rekomendasikan, klik tautan "Pelajari lebih lanjut" di setiap bagian, atau klik rekomendasi itu sendiri untuk dibawa ke bagian halaman tertentu. @@ -89,7 +89,7 @@ Untuk detail lebih lanjut tentang setiap proyek, mengapa proyek tersebut dipilih #### Penyedia DNS -Kami [merekomendasikan](dns.md#recommended-providers) sejumlah server DNS terenkripsi berdasarkan berbagai kriteria, seperti [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) dan [Quad9](https://quad9.net/). Kami menyarankan Anda untuk membaca halaman kami tentang DNS sebelum memilih penyedia. Dalam banyak kasus, menggunakan penyedia DNS alternatif tidak disarankan. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. Kami menyarankan Anda untuk membaca halaman kami tentang DNS sebelum memilih penyedia. Dalam banyak kasus, menggunakan penyedia DNS alternatif tidak disarankan. [Pelajari lebih lanjut :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/id/tor.md b/i18n/id/tor.md index af124d1f..c7d14c21 100644 --- a/i18n/id/tor.md +++ b/i18n/id/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: Jaringan **Tor** adalah sekelompok server yang dioperasikan secara sukarela yang memungkinkan Anda terhubung secara gratis dan meningkatkan privasi dan keamanan Anda di Internet. Individu dan organisasi juga dapat berbagi informasi melalui jaringan Tor dengan "layanan tersembunyi .onion" tanpa mengorbankan privasi mereka. Karena lalu lintas Tor sulit diblokir dan dilacak, Tor merupakan alat pengelabuan sensor yang efektif. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor bekerja dengan merutekan lalu lintas internet Anda melalui server yang dioperasikan secara sukarela, daripada membuat koneksi langsung ke situs yang Anda coba kunjungi. Hal ini mengaburkan dari mana lalu lintas berasal, dan tidak ada server di jalur koneksi yang dapat melihat jalur penuh dari mana lalu lintas berasal dan pergi, yang berarti bahkan server yang Anda gunakan untuk terhubung tidak dapat merusak anonimitas Anda. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** adalah pilihan jika Anda membutuhkan anonimitas, dengan menyediakan akses ke jaringan dan jembatan Tor, dan termasuk pengaturan dan ekstensi bawaan yang secara otomatis dikonfigurasikan oleh tingkat keamanan bawaan: *Standar*, *Lebih Aman* dan *Paling Aman*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ Anda sebaiknya **jangan pernah** memasang ekstensi tambahan apa pun pada Tor Bro -Tor Browser dirancang untuk mencegah sidik jari, atau mengidentifikasi Anda berdasarkan konfigurasi peramban Anda. Oleh karena itu, sangat penting bagi Anda untuk tidak **tidak** memodifikasi peramban di luar [tingkat keamanan](https://tb-manual.torproject.org/security-settings/) bawaan. +Tor Browser dirancang untuk mencegah sidik jari, atau mengidentifikasi Anda berdasarkan konfigurasi peramban Anda. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** adalah VPN Tor gratis untuk ponsel pintar yang merutekan lalu lintas dari aplikasi apa pun pada perangkat Anda melalui jaringan Tor. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) @@ -134,7 +134,7 @@ Semua versi ditandatangani menggunakan tanda tangan yang sama sehingga seharusny ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** adalah peramban bersumber terbuka yang memungkinkan Anda menjelajah web secara anonim melalui jaringan Tor di perangkat-perangkat iOS, dan didukung oleh [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ Semua versi ditandatangani menggunakan tanda tangan yang sama sehingga seharusny Orang-orang yang disensor bisa menggunakan proksi Snowflake untuk menyambung ke jaringan Tor. Snowflake adalah cara yang bagus untuk berkontribusi pada jaringan bahkan jika Anda tidak memiliki pengetahuan teknis untuk menjalankan relai atau jembatan Tor. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake tidak meningkatkan privasi Anda dengan cara apa pun, juga tidak diguna Menjalankan proksi Snowflake berisiko rendah, bahkan lebih rendah daripada menjalankan relai Tor atau jembatan yang sudah tidak terlalu berisiko. Namun, itu masih memproksi lalu lintas melalui jaringan Anda yang dapat berdampak pada beberapa hal, terutama jika jaringan Anda memiliki bandwidth terbatas. Pastikan Anda memahami [cara kerja Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) sebelum memutuskan apakah akan menjalankan proksi. -[^1]: Pengaturan `IsolateDestAddr` dibahas di [milis Tor](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) dan [dokumentasi Stream Isolation Whonix](https://www.whonix.org/wiki/Stream_Isolation); kedua proyek ini menyarankan bahwa isolasi alamat tujuan biasanya bukan pendekatan yang baik untuk kebanyakan orang. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/id/vpn.md b/i18n/id/vpn.md index 7a57824a..41d5597e 100644 --- a/i18n/id/vpn.md +++ b/i18n/id/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. Jika Anda membutuhkan **keamanan** tambahan, Anda harus selalu memastikan bahwa Anda terhubung ke situs web menggunakan HTTPS. VPN bukanlah pengganti praktik keamanan yang baik. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Penyedia yang kami rekomendasikan menggunakan enkripsi, menerima Monero, menduku **Proton VPN** adalah pesaing kuat dalam bidang VPN, dan mereka telah beroperasi sejak 2016. Proton AG berbasis di Swiss dan menawarkan tingkat gratis terbatas, serta opsi premium yang lebih berfitur. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ Kami juga berpikir akan lebih baik untuk keamanan kunci pribadi penyedia VPN jik #### :material-check:{ .pg-green } Diaudit Secara Independen -Pada Januari 2020, Proton VPN telah menjalani audit independen oleh SEC Consult. SEC Consult menemukan beberapa kerentanan berisiko sedang dan rendah di aplikasi Proton VPN di Windows, Android, dan iOS, yang semuanya telah "diperbaiki dengan benar" oleh Proton VPN sebelum laporan diterbitkan. Tidak satu pun dari masalah yang diidentifikasi akan memberikan penyerang akses jarak jauh ke perangkat atau lalu lintas Anda. Anda dapat melihat laporan individual untuk setiap platform di [protonvpn.com](https://protonvpn.com/blog/open-source/). Pada bulan April 2022, Proton VPN menjalani [audit lagi](https://protonvpn.com/blog/no-logs-audit/) dan laporannya [dibuat oleh Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). [Surat pengesahan ](https://proton.me/blog/security-audit-all-proton-apps) diberikan untuk aplikasi Proton VPN pada tanggal 9 November 2021 oleh [Securitum](https://research.securitum.com). +Pada Januari 2020, Proton VPN telah menjalani audit independen oleh SEC Consult. SEC Consult menemukan beberapa kerentanan berisiko sedang dan rendah di aplikasi Proton VPN di Windows, Android, dan iOS, yang semuanya telah "diperbaiki dengan benar" oleh Proton VPN sebelum laporan diterbitkan. Tidak satu pun dari masalah yang diidentifikasi akan memberikan penyerang akses jarak jauh ke perangkat atau lalu lintas Anda. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). [Surat pengesahan ](https://proton.me/blog/security-audit-all-proton-apps) diberikan untuk aplikasi Proton VPN pada tanggal 9 November 2021 oleh [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Klien Sumber Terbuka @@ -84,31 +84,31 @@ Proton VPN, selain menerima kartu kredit/debit, PayPal, dan [Bitcoin](advanced/p #### :material-check:{ .pg-green } Dukungan WireGuard -Proton VPN sebagian besar mendukung protokol WireGuard®. [WireGuard](https://www.wireguard.com) adalah protokol yang lebih baru yang menggunakan kriptografi [yang canggih](https://www.wireguard.com/protocol/). Selain itu, WireGuard bertujuan untuk menjadi lebih sederhana dan lebih berkinerja. +Proton VPN sebagian besar mendukung protokol WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Selain itu, WireGuard bertujuan untuk menjadi lebih sederhana dan lebih berkinerja. -Proton VPN [merekomendasikan](https://protonvpn.com/blog/wireguard/) penggunaan WireGuard dengan layanan mereka. Pada aplikasi Proton VPN di Windows, macOS, iOS, Android, Android, ChromeOS, dan Android TV, WireGuard merupakan protokol bawaan; namun, [dukungan](https://protonvpn.com/support/how-to-change-vpn-protocols/) untuk protokol ini tidak ada pada aplikasi Linux mereka. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Penerusan Porta Jarak Jauh -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Klien Ponsel -Selain menyediakan file konfigurasi OpenVPN standar, Proton VPN memiliki klien seluler untuk [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), dan [GitHub](https://github.com/ProtonVPN/android-app/releases) yang memungkinkan koneksi yang mudah ke server mereka. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Fungsionalitas Tambahan -Klien Proton VPN mendukung autentikasi dua faktor di semua platform kecuali Linux saat ini. Proton VPN memiliki server dan pusat data mereka sendiri di Swiss, Islandia, dan Swedia. They offer content blocking and known-malware blocking with their DNS service. Selain itu, Proton VPN juga menawarkan server "Tor" yang memungkinkan Anda untuk dengan mudah terhubung ke situs-situs onion, tetapi kami masih sangat menyarankan untuk menggunakan [Tor Browser resmi](https://www.torproject.org/) untuk tujuan ini. +Klien Proton VPN mendukung autentikasi dua faktor di semua platform kecuali Linux saat ini. Proton VPN memiliki server dan pusat data mereka sendiri di Swiss, Islandia, dan Swedia. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Fitur killswitch rusak pada Mac berbasis Intel -Kerusakan sistem [dapat terjadi](https://protonvpn.com/support/macos-t2-chip-kill-switch/) pada Mac berbasis Intel saat menggunakan killswitch VPN. Jika Anda memerlukan fitur ini, dan Anda menggunakan Mac dengan chipset Intel, Anda sebaiknya mempertimbangkan untuk menggunakan layanan VPN lain. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. Jika Anda memerlukan fitur ini, dan Anda menggunakan Mac dengan chipset Intel, Anda sebaiknya mempertimbangkan untuk menggunakan layanan VPN lain. ### IVPN @@ -118,9 +118,9 @@ Kerusakan sistem [dapat terjadi](https://protonvpn.com/support/macos-t2-chip-kil **IVPN** adalah penyedia VPN premium, dan mereka telah beroperasi sejak 2009. IVPN berbasis di Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ Kerusakan sistem [dapat terjadi](https://protonvpn.com/support/macos-t2-chip-kil - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ Kerusakan sistem [dapat terjadi](https://protonvpn.com/support/macos-t2-chip-kil #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Ini karena rute yang lebih pendek (lebih sedikit loncatan) ke tempat tujuan. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Ini karena rute yang lebih pendek (lebih sedikit loncatan) ke tempat tujuan. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ Kami juga berpikir akan lebih baik untuk keamanan kunci pribadi penyedia VPN jik #### :material-check:{ .pg-green } Diaudit Secara Independen -IVPN telah menjalani [audit tanpa pencatatan dari Cure53](https://cure53.de/audit-report_ivpn.pdf) yang menyimpulkan bahwa klaim tanpa pencatatan dari IVPN disetujui. IVPN juga telah menyelesaikan [laporan pentest komprehensif Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) pada Januari 2020. IVPN juga mengatakan bahwa mereka berencana untuk memiliki [laporan tahunan](https://www.ivpn.net/blog/independent-security-audit-concluded) di masa depan. Tinjauan lebih lanjut dilakukan [pada bulan April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) dan diproduksi oleh Cure53 [di situs web mereka](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN telah menjalani [audit tanpa pencatatan dari Cure53](https://cure53.de/audit-report_ivpn.pdf) yang menyimpulkan bahwa klaim tanpa pencatatan dari IVPN disetujui. IVPN juga telah menyelesaikan [laporan pentest komprehensif Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) pada Januari 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Klien Sumber Terbuka -Sejak Februari 2020 [aplikasi IVPN menjadi sumber terbuka](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Kode sumber dapat diperoleh dari [organisasi GitHub](https://github.com/ivpn) mereka. +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Kode sumber dapat diperoleh dari [organisasi GitHub](https://github.com/ivpn) mereka. #### :material-check:{ .pg-green } Menerima Uang Tunai dan Monero @@ -160,25 +160,25 @@ Selain menerima kartu kredit/debit dan PayPal, IVPN menerima Bitcoin, **Monero** #### :material-check:{ .pg-green } Dukungan WireGuard -IVPN mendukung protokol WireGuard®. [WireGuard](https://www.wireguard.com) adalah protokol yang lebih baru yang menggunakan kriptografi [yang canggih](https://www.wireguard.com/protocol/). Selain itu, WireGuard bertujuan untuk menjadi lebih sederhana dan lebih berkinerja. +IVPN mendukung protokol WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Selain itu, WireGuard bertujuan untuk menjadi lebih sederhana dan lebih berkinerja. -IVPN [merekomendasikan](https://www.ivpn.net/wireguard/) penggunaan WireGuard dengan layanan mereka dan, dengan demikian, protokol ini merupakan standar pada semua aplikasi IVPN. IVPN juga menawarkan generator konfigurasi WireGuard untuk digunakan dengan [aplikasi resmi](https://www.wireguard.com/install/) WireGuard. +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Penerusan Porta Jarak Jauh -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Klien Ponsel -Selain menyediakan berkas konfigurasi OpenVPN standar, IVPN memiliki klien ponsel untuk [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), dan [GitHub](https://github.com/ivpn/android-app/releases) yang memungkinkan koneksi yang mudah ke server mereka. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Fungsionalitas Tambahan -Klien IVPN mendukung autentikasi dua faktor (klien Mullvad tidak). IVPN juga menyediakan fungsionalitas "[AntiTracker](https://www.ivpn.net/antitracker)", yang memblokir jaringan iklan dan pelacak dari tingkat jaringan. +Klien IVPN mendukung autentikasi dua faktor (klien Mullvad tidak). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ Klien IVPN mendukung autentikasi dua faktor (klien Mullvad tidak). IVPN juga men [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ Klien IVPN mendukung autentikasi dua faktor (klien Mullvad tidak). IVPN juga men #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Ini karena rute yang lebih pendek (lebih sedikit loncatan) ke tempat tujuan. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Ini karena rute yang lebih pendek (lebih sedikit loncatan) ke tempat tujuan. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Klien VPN Mullvad telah diaudit oleh Cure53 dan Assured AB dalam laporan pentest > Cure53 dan Assured AB senang dengan hasil audit dan perangkat lunak ini meninggalkan kesan positif secara keseluruhan. Dengan dedikasi keamanan dari tim internal di kompleks VPN Mullvad, para penguji tidak meragukan proyek ini berada di jalur yang benar dari sudut pandang keamanan. -Pada tahun 2020, audit kedua [diumumkan](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) dan laporan audit akhir [](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) tersedia di situs web Cure53: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > Hasil dari proyek Mei-Juni 2020 yang menargetkan kompleks Mullvad ini cukup positif. [...] Keseluruhan ekosistem aplikasi yang digunakan oleh Mullvad meninggalkan kesan yang baik dan terstruktur. Struktur keseluruhan aplikasi memudahkan untuk meluncurkan patch dan perbaikan secara terstruktur. Lebih dari segalanya, temuan yang ditemukan oleh Cure53 menunjukkan pentingnya untuk terus mengaudit dan menilai ulang vektor kebocoran saat ini, untuk selalu memastikan privasi pengguna akhir. Dengan demikian, Mullvad melakukan pekerjaan yang sangat baik dalam melindungi pengguna akhir dari kebocoran PII yang umum terjadi dan risiko terkait privasi. -Pada tahun 2021, audit kedua [diumumkan](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) dan laporan audit akhir [](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) tersedia di situs web Cure53. Laporan lain ditugaskan [pada bulan Juni 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) dan tersedia di situs web [Assured](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Klien Sumber Terbuka @@ -239,17 +239,17 @@ Mullvad, selain menerima kartu kredit/debit dan PayPal, juga menerima Bitcoin, B #### :material-check:{ .pg-green } Dukungan WireGuard -Mullvad mendukung protokol WireGuard®. [WireGuard](https://www.wireguard.com) adalah protokol yang lebih baru yang menggunakan kriptografi [yang canggih](https://www.wireguard.com/protocol/). Selain itu, WireGuard bertujuan untuk menjadi lebih sederhana dan lebih berkinerja. +Mullvad mendukung protokol WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Selain itu, WireGuard bertujuan untuk menjadi lebih sederhana dan lebih berkinerja. -Mullvad [merekomendasikan](https://mullvad.net/en/help/why-wireguard/) penggunaan WireGuard dengan layanan mereka. Ini adalah protokol default atau satu-satunya protokol pada aplikasi Mullvad di Android, iOS, macOS, dan Linux, tetapi pada Windows Anda harus [secara manual mengaktifkan](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad juga menawarkan generator konfigurasi WireGuard untuk digunakan dengan [aplikasi resmi](https://www.wireguard.com/install/) WireGuard. +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } Dukungan IPv6 -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Penerusan Porta Jarak Jauh -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Klien Ponsel -Mullvad telah menerbitkan klien [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) dan [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn), keduanya mendukung antarmuka yang mudah digunakan dan tidak mengharuskan Anda untuk mengkonfigurasi koneksi WireGuard secara manual. Klien Android juga tersedia di [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. Klien Android juga tersedia di [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Fungsionalitas Tambahan -Mullvad sangat transparan tentang node mana yang mereka [miliki atau sewa](https://mullvad.net/en/servers/). Mereka menggunakan [ShadowSocks](https://shadowsocks.org/) dalam konfigurasi ShadowSocks + OpenVPN mereka, membuat mereka lebih tahan terhadap tembok api dengan [Inspeksi Paket Dalam](https://en.wikipedia.org/wiki/Deep_packet_inspection) yang mencoba memblokir VPN. Seharusnya, [Cina harus menggunakan metode yang berbeda untuk memblokir server ShadowSocks](https://github.com/net4people/bbs/issues/22). Situs web Mullvad juga dapat diakses melalui Tor di [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Seharusnya, [Cina harus menggunakan metode yang berbeda untuk memblokir server ShadowSocks](https://github.com/net4people/bbs/issues/22). Situs web Mullvad juga dapat diakses melalui Tor di [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Kriteria diff --git a/i18n/it/CODE_OF_CONDUCT.md b/i18n/it/CODE_OF_CONDUCT.md index 13fc41e7..4a066d5e 100644 --- a/i18n/it/CODE_OF_CONDUCT.md +++ b/i18n/it/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ Cosa ci aspettiamo dai membri delle nostre community: 2. **Non abusare della nostra disponibilità ad aiutare** - I membri della nostra community non sono supporto tecnico gratuito. Siamo lieti di aiutare con passi specifici per il viaggio individuale sulla privacy, se sono disposti a impegnarsi. Non siamo obbligati a rispondere a domande infinite, ripetitive su problemi informatici generali risolvibili con una semplice ricerca su Internet. **Non** diventare un [vampiro dell'aiuto](https://slash7.com/2006/12/22/vampires/). + I membri della nostra community non sono supporto tecnico gratuito. Siamo lieti di aiutare con passi specifici per il viaggio individuale sulla privacy, se sono disposti a impegnarsi. Non siamo obbligati a rispondere a domande infinite, ripetitive su problemi informatici generali risolvibili con una semplice ricerca su Internet. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Comportarsi in modo positivo e costruttivo** diff --git a/i18n/it/about/index.md b/i18n/it/about/index.md index 136daf77..0568191f 100644 --- a/i18n/it/about/index.md +++ b/i18n/it/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** è un sito web a motivazione sociale che fornisce [informazioni](/kb) per proteggere la sicurezza e la privacy dei tuoi dati. La nostra missione è informare il pubblico sul valore della privacy digitale e sulle iniziative governative globali che mirano a monitorare la tua attività online. Siamo un collettivo senza scopo di lucro, operato interamente da [membri del team](https://discuss.privacyguides.net/g/team) di volontari e collaboratori. Il nostro sito web è libero di inserzionisti e non affiliato con alcuno dei fornitori elencati. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Home } -[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](donate.md){ .card-link title=Contribuisci } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } +[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } +[:octicons-heart-16:](donate.md){ .card-link title=Contribute } > Per trovare app [alternative incentrate sulla privacy], consulta siti come Good Reports e **Privacy Guides**, che elencano app incentrate sulla privacy in svariate categorie, tra cui, notevolmente, i fornitori email (solitamente su piani a pagamento), non gestiti da grandi aziende tecnologiche. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > Se stai cercando una nuova VPN, puoi utilizzare il codice sconto di praticamente qualsiasi podcast. Se stai cercando una **buona** VPN, necessiti di aiuto da parte dei professionisti. Lo stesso vale per i client email, browser, sistemi operativi e gestori di password. Come fate a sapere qual è l'opzione migliore e più rispettosa della privacy? Per questo c'è **Privacy Guides**, una piattaforma su cui tantissimi volontari ricercano i migliori strumenti rispettosi della privacy, da utilizzare su Internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Tradotto dall'olandese] -In evidenza anche su: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), e [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## Storia @@ -41,7 +41,7 @@ Privacy Guides è stato lanciato a settembre 2021, come continuazione del proget Nel 2022, abbiamo completato la transizione del quadro del nostro sito web principale da Jekyll a MkDocs, utilizzando il software di documentazione `mkdocs-material`. Questo cambiamento ha reso significativamente più facili i contributi open source al nostro sito per gli esterni, poiché, invece di necessitare di conoscere una complessa sintassi per scrivere efficientemente i post, contribuire è ora facile quanto scrivere un documento standard in Markdown. -Inoltre, abbiamo lanciato il nostro nuovo forum di discussione a [discuss.privacyguides.net](https://discuss.privacyguides.net/), come una piattaforma della community per condividere idee e porre domande sulla nostra missione. Ciò estende la nostra community esistente su Matrix e ha sostituito la nostra precedente piattaforma di GitHub Discussions, riducendo la nostra dipendenza dalle piattaforme di discussione proprietarie. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. Ciò estende la nostra community esistente su Matrix e ha sostituito la nostra precedente piattaforma di GitHub Discussions, riducendo la nostra dipendenza dalle piattaforme di discussione proprietarie. Finora, nel 2023, abbiamo lanciato le traduzioni internazionali del nostro sito web in [francese](/fr/), [ebraico](/he/) e [olandese](/nl/), con altre lingue in arrivo, rese possibili dal nostro eccellente team di traduzione, su [Crowdin](https://crowdin.com/project/privacyguides). Pianifichiamo di continuare a portare avanti la nostra missione di sensibilizzazione ed educazione, e di trovare modi per evidenziare più chiaramente i pericoli della mancanza di consapevolezza sulla privacy nell'era digitale moderna, nonché la prevalenza e i danni delle violazioni di sicurezza nel settore tecnologico. diff --git a/i18n/it/about/notices.md b/i18n/it/about/notices.md index cde6ff90..a775ca51 100644 --- a/i18n/it/about/notices.md +++ b/i18n/it/about/notices.md @@ -29,7 +29,7 @@ Ciò non include il codice di terze parti incorporato in questo repository, o il Ciò significa che puoi utilizzare i contenuti leggibili dall'uomo in questo repository per il tuo progetto, secondo i termini delineati nel testo della Licenza Pubblica Internazionale Creative Commons Attribution-NoDerivatives 4.0. Puoi farlo in qualsiasi modo ragionevole, ma non in alcun modo che suggerisca che Privacy Guides promuova te o il tuo utilizzo. **Non puoi** utilizzare i marchi di Privacy Guides nel tuo progetto, senza l'espressa approvazione da parte di questo progetto. I marchi registrati di Privacy Guides includono il marchio "Privacy Guides" e il logo dello scudo. -Crediamo che i loghi e altre immagini in `assets`, ottenute da fornitori di terze parti, siano nel dominio pubblico o dell'**utilizzo equo e solidale**. In breve, la [dottrina dell'utilizzo equo e solidale](https://www.copyright.gov/fair-use/more-info.html) legale, consente l'utilizzo di immagini protette da copyright, per poter identificare la materia del soggetto, per gli scopi di commento pubblico. Tuttavia, questi loghi e altre immagini potrebbero ancora essere soggetti a leggi sui marchi, in una o più giurisdizioni. Prima di utilizzare tali contenuti, ti preghiamo di assicurarti che sia utilizzato per identificare l'entità o l'organizzazione che possiede il marchio registrato, e che tu abbia il diritto a utilizzarlo, sotto le leggi che si applicano nelle circostanze del tuo utilizzo previsto. *Copiando i contenuti da questo sito web, sei l'unico responsabile della garanzia di non violare il marchio o copyright altrui.* +Crediamo che i loghi e altre immagini in `assets`, ottenute da fornitori di terze parti, siano nel dominio pubblico o dell'**utilizzo equo e solidale**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. Tuttavia, questi loghi e altre immagini potrebbero ancora essere soggetti a leggi sui marchi, in una o più giurisdizioni. Prima di utilizzare tali contenuti, ti preghiamo di assicurarti che sia utilizzato per identificare l'entità o l'organizzazione che possiede il marchio registrato, e che tu abbia il diritto a utilizzarlo, sotto le leggi che si applicano nelle circostanze del tuo utilizzo previsto. *Copiando i contenuti da questo sito web, sei l'unico responsabile della garanzia di non violare il marchio o copyright altrui.* Contribuendo al nostro sito web, lo fai secondo le licenze suddette, concedendo a Privacy Guides una licenza perpetua, globale, non esclusiva, trasferibile, esente da royalty e irrevocabile, con il diritto di sublicenziare tali diritti, tramite più livelli di sublicenze, per riprodurre, modificare, mostrare, eseguire e distribuire il tuo contributo, come parte del nostro progetto. @@ -47,4 +47,4 @@ Non devi condurre alcuna attività di raccolta dei dati sistematica o automatizz --- -*Porzioni di questo stesso avviso sono stati adottati da [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md), su GitHub. Tale risorsa e questa stessa pagina, sono rilasciate sotto [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Porzioni di questo stesso avviso sono stati adottati da [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md), su GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/it/about/privacytools.md b/i18n/it/about/privacytools.md index 0f465b16..2177a263 100644 --- a/i18n/it/about/privacytools.md +++ b/i18n/it/about/privacytools.md @@ -14,13 +14,13 @@ Dopo il completamento della transizione, il fondatore di PrivacyTools è tornato PrivacyTools è stato creato nel 2015 da "BurungHantu", che voleva creare una risorsa di informazione sulla privacy e sugli utili strumenti, in seguito alle rivelazioni di Snowden. Il sito è cresciuto in un fiorente progetto open source, con [molti collaboratori](https://github.com/privacytools/privacytools.io/graphs/contributors), ad alcuni dei quali sono state poi affidate varie responsabilità organizzative, come la gestione dei servizi online come Matrix e Mastodon, gestione e revisione delle modifiche al sito su GitHub, ricerca di sponsor per il progetto, scrittura di post del blog e operzione delle piattaforme di sensibilizzazione social, come Twitter, etc. -A partire dal 2019, BurungHantu si è allontanato sempre di più dallo sviluppo attivo del sito web e delle community e ha iniziato a ritardare i pagamenti di cui era responsabile, relativamente ai server che gestivamo. Per evitare che il nostro amministratore di sistema pagasse di tasca propria i costi del server, abbiamo modificato i metodi di donazione elencati sul sito dal PayPal e conti di criptovalute personali di BurungHantu, a una nuova pagina di OpenCollective, il [31 ottobre 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). Questo ha comportato i benefici ulteriori del rendere le nostre finanze interamente trasparenti, un valore in cui crediamo fermamente, e detraibili fiscalmente negli Stati Uniti, poiché gestite dalla Open Collective Foundation 501(c)3. Questa modifica è stata approvata unanimamente dal team e non è stata contestata. +A partire dal 2019, BurungHantu si è allontanato sempre di più dallo sviluppo attivo del sito web e delle community e ha iniziato a ritardare i pagamenti di cui era responsabile, relativamente ai server che gestivamo. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). Questo ha comportato i benefici ulteriori del rendere le nostre finanze interamente trasparenti, un valore in cui crediamo fermamente, e detraibili fiscalmente negli Stati Uniti, poiché gestite dalla Open Collective Foundation 501(c)3. Questa modifica è stata approvata unanimamente dal team e non è stata contestata. ## Perché ci siamo trasferiti Nel 2020, l'assenza di BurungHantu è diventata molto più evidente. A un certo punto, abbiamo richiesto la modifica dei server del nome del dominio, a quelli controllati dal nostro amministratore di sistema, per evitare future interruzioni e, questa modifica, non è stata completata per oltre un mese dalla richiesta iniziale. Scompriva dalle stanze di chat pubbliche e private del team su Matrix per mesi, tornando occasionalmente per fornire qualche piccolo feedback o promettere di essere più attivo, prima di scomparire nuovamente. -A ottobre 2020, l'amministratore di sistema di PrivacyTools (Jonah) [ha abbandonato](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) il progetto a causa di tali difficoltà, passando il controllo a un altro collaboratore di lunga data. Jonah ha gestito quasi ogni servizio di PrivacyTools e ha agito da responsabile *de facto* del progetto per lo sviluppo del sito web, durante l'assenza di BurungHantu, dunque, la sua partenza ha rappresentato un cambiamento significativo per l'organizzazione. All'epoca, a causa di questi significativi cambiamenti organizzativi, BurungHantu ha promesso al team rimanente che sarebbe ritornato, per assumere il controllo del progetto in futuro. ==Il team di PrivacyTools lo ha contattato tramite svariati metodi comunicativi nei mesi successivi, ma non ha ricevuto alcuna risposta.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah ha gestito quasi ogni servizio di PrivacyTools e ha agito da responsabile *de facto* del progetto per lo sviluppo del sito web, durante l'assenza di BurungHantu, dunque, la sua partenza ha rappresentato un cambiamento significativo per l'organizzazione. All'epoca, a causa di questi significativi cambiamenti organizzativi, BurungHantu ha promesso al team rimanente che sarebbe ritornato, per assumere il controllo del progetto in futuro. ==Il team di PrivacyTools lo ha contattato tramite svariati metodi comunicativi nei mesi successivi, ma non ha ricevuto alcuna risposta.== ## Dipendenza dal Nome di Dominio @@ -34,25 +34,25 @@ A metà 2021, il team di PrivacyTools ha contattato Jonah, che ha acconsentito a ## Invito ad Agire della community -Alla fine di luglio 2021, abbiamo [informato](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) la community di PrivacyTools della nostra intenzione di scegliere un nuovo nome, e continuare il progetto su un nuovo dominio, da [scegliersi](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) in data 2 agosto 2022. Alla fine, "Privacy Guides" è stato scelto, con il dominio `privacyguides.org` già posseduto da Jonah per un progetto secondario dal 2020, e mai sviluppato. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. Alla fine, "Privacy Guides" è stato scelto, con il dominio `privacyguides.org` già posseduto da Jonah per un progetto secondario dal 2020, e mai sviluppato. ## Controllo di r/privacytoolsIO -Simultaneamente ai problemi relativi al sito web di privacytools.io, il team di moderazione di r/privacytoolsIO stava affrontando problemi con la gestione del subreddit. Il subreddit è stato sempre operato per lo più in modo indipendente dallo sviluppo del sito web, ma BurungHantu era il moderatore principale del subreddit, nonché l'unico moderatore con privilegi di "Pieno Controllo". u/trai_dep era il solo moderatore attivo al tempo, e [ha pubblicato](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) una richiesta agli amministratori di Reddit il 28 giugno 2021, chiedendo di poter ottenere la posizione di moderatore principale, con privilegi di pieno controllo, per poter apportare le modifiche necessarie al Subreddit. +Simultaneamente ai problemi relativi al sito web di privacytools.io, il team di moderazione di r/privacytoolsIO stava affrontando problemi con la gestione del subreddit. Il subreddit è stato sempre operato per lo più in modo indipendente dallo sviluppo del sito web, ma BurungHantu era il moderatore principale del subreddit, nonché l'unico moderatore con privilegi di "Pieno Controllo". u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit richiede che i subreddit abbiano dei moderatori attivi. Se il moderatore principale è inattivo per un lungo periodo di tempo (come un anno), la posizione di moderazione principale è riassegnabile, al moderatore successivo in lista. Affinché la richiesta venisse accolta, BurungHantu sarebbe dovuto essere completamente assente da qualsiasi attività di Reddit per un lungo periodo di tempo, cosa coerente con i suoi comportamenti su altre piattaforme. > Se sei stato rimosso come moderatore da un subreddit, tramite la richiesta di Reddit, è perché la tua mancanza di risposta e di attività, ha qualificato il subreddit per un trasferimento r/redditrequest. > -> r/redditrequest è il metodo di Reddit di assicurarsi che le community abbiano moderatori attivi, come parte del [Codice di Condotta dei Moderatori](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Inizio della transizione -Il 14 settembre 2021, abbiamo [annunciato](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) l'inizio della nostra migrazione a questo nuovo dominio: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] abbiamo ritenuto necessario effettuare questo passaggio prima, piuttosto che dopo, per assicurarci che le persone ne venisseero a conoscenza il prima possibile. Ciò ci concede un tempo adeguato per passare al nome di dominio, che reindirizza al momento a www.privacyguides.org, nella speranza che tutti abbiano abbastanza tempo per notare il cambiamento, aggiornare segnalibri e siti web, etc. -Questo cambiamento [ha comportato:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Il reindirizzamento di www.privacytools.io a [www.privacyguides.org](https://www.privacyguides.org). - L'archiviazione del codice sorgente su GitHub per preservare il nostro lvoro precedente e tracciatore dei problemi, che abbiamo continuato a utilizzare per mesi di sviluppo futuro di questo sito. @@ -63,11 +63,11 @@ Tutto sembrava andare bene e, gran parte della nostra community attiva, ha effet ## Eventi successivi -Approssimativamente una settimana dopo la transizione, BurungHantu è tornato online per la prima volta dopo quasi un anno, tuttaavia, nessuno nel nostro team era desideroso di tornare a PrivacyTools, a causa della sua storica inaffidabilità. Piuttosto che scusarsi per la propria assenza prolungata, è passato immediatamente all'offensiva, definendo la transizione a Privacy Guides come un attacco contro di lui e il suo progetto. Successivamente, ha [eliminato](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) molti di questi post, quando la community gli ha fatto notare che è stato assente e ha abbandonato il progetto. +Approssimativamente una settimana dopo la transizione, BurungHantu è tornato online per la prima volta dopo quasi un anno, tuttaavia, nessuno nel nostro team era desideroso di tornare a PrivacyTools, a causa della sua storica inaffidabilità. Piuttosto che scusarsi per la propria assenza prolungata, è passato immediatamente all'offensiva, definendo la transizione a Privacy Guides come un attacco contro di lui e il suo progetto. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. A questo punto, BurungHantu ha dichiarato di voler continuare a lavorare a privacytools.io per conto proprio, richiedendoci di rimuovere il reindirizzamento da www.privacytools.io a [www.privacyguides.org](https://www.privacyguides.org). Abbiamo accettato e richiesto che mantenesse i sottodomini per Matrix, Mastodon e PeerTube, attivi, perché gestissimo un servizio pubblico alla nostra community, per almeno qualche mese, per consentire agli utenti di tali piattaforme di migrare facilmente ad altri profili. A causa della natura federata dei servizi che fornivamo, erano legati a nomi di dominio specifici, complicando la migrazione (e, in alcuni casi, rendendola impossibile). -Sfortunatamente, poiché il controllo del subreddit r/privacytoolsIO non è stato restituito a BurungHantu su sua richiesta (ulteriori informazioni in seguito), questi sottodomini sono stati [tagliati fuori](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) all'inizio di ottobre, ponendo fine a qualsiasi possibilità di migrazione per qualsiasi utente utilizzasse ancora tali servizi. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Successivamente, BurungHantu ha accusato Jonah di aver rubato le donazioni dal progetto. BurungHantu ha avuto oltre un anno da quando il presunto incidente si sarebbe verificato, tuttavia, non ha mai informato nessuno fino in seguito alla migrazione a Privacy Guides. A BurungHantu è stato chiesto ripetutamente di fornire prove e di commentare sul motivo del proprio silenzio dal team [e dalla community](https://twitter.com/TommyTran732/status/1526153536962281474), cosa che non ha fatto. @@ -77,11 +77,11 @@ Inoltre, BurungHntu ha pubblicato un [post di Twitter](https://twitter.com/priva Dal 25 settembre 2022, stiamo vedendo i piani generali di BurungHantu realizzarsi su privacytools.io, ed è proprio per questo che abbiamo deciso di creare questa pagina esplicativa, oggi. Il sito web che sta gestendo sembra essere una versione fortemente ottimizzata per il SEO del sito, che consiglia strumenti, in cambio di compenso monetario. Molto di recente, IVPN e Mullvad, due fornitori VPN [consigliati](../vpn.md) quasi universamente dalla community sulla privacy e noti per la propria posizione contro i programmi d'affiliazione, sono stati rimossi da PrivacyTools. Al loro posto? NordVPN, Surfshark, ExpressVPN e hide.me; enormi società di VPN con piattaforme e pratiche aziendli non affidabili, note per il proprio marketing aggressivo e i propri programmi d'affiliazione. -==**PrivacyTools è diventato esattamente la tipologia di sito che abbiamo [sconsigliato](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) sul blog di PrivacyTools nel 2019.**== Abbiamo provato a mantenere le distanze da PrivacyTools dalla transizione, ma le loro continue molestie nei confronti del nostro progetto e, adesso, il loro assurdo abuso della credibilità del proprio marchio, ottenuta in oltre 6 anni di contributi open source, ci sta preoccupando estremamente. Coloro che, tra noi, lottano realmente per la privacy, non stanno lottando gli uni contro gli altri, e non si fanno consigliare dal migliore offerente. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Coloro che, tra noi, lottano realmente per la privacy, non stanno lottando gli uni contro gli altri, e non si fanno consigliare dal migliore offerente. ## r/privacytoolsIO ora -Dopo il lancio di [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), era improponibile per u/trai_dep continuare a moderare entrambi i subreddit, e con la community d'accordo con la transizione, r/privacytoolsIO è [stato reso](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) un sub limitato, in un post del primo novembre 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] La crescita di questo subreddit è stata la conseguenza di un grande sforzo, durato diversi anni, da parte del team di PrivacyGuides.org. E da ognuno di voi. > @@ -89,7 +89,7 @@ Dopo il lancio di [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), era I subreddit non appartengono a nessuno e, specialmente, non ai titolari dei marchi. Appartengono alle proprie community, che, insieme ai propri moderatori hanno preso la decisione di supportare la transizione a r/PrivacyGuides. -Nei mesi successivi, BurungHantu ha minacciato e implorato di restituire il controllo del subreddit al suo profilo, in [violazione](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) delle regole di Reddit: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Le ritorsioni da qualsiasi moderatore relativamente alle richieste di rimozione, sono vietate. @@ -107,12 +107,12 @@ Pertanto, i fondi di OpenCollective appartengono a Privacy Guides, sono stati da Questo argomento è stato discusso ampiamente nelle nostre community, in varie sedi, e sembra probabile che gran parte delle persone che leggeranno questa pagina saranno già a conoscenza degli eventi che hanno portato alla transizione a Privacy Guides. Alcuni dei nostri precedenti post sulla questione, potrebbero contenere ulteriori dettagli, omessi qui per brevità. I link sono riportati qui sotto per completezza. -- [28 giugno 2021, richiesta di controllo di r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [27 luglio 2021, annuncio delle nostre intenzioni di abbandonare il blog di PrivacyTools, scritto dal team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [13 settembre 2021, annuncio dell'inizio della nostra transizione a Privacy Guides, su r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [28 giugno 2021, richiesta di controllo di r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [27 luglio 2021, annuncio delle nostre intenzioni di abbandonare il blog di PrivacyTools, scritto dal team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [13 settembre 2021, annuncio dell'inizio della nostra transizione a Privacy Guides, su r/privacytoolsIO](https://reddit.com/pnql46) - [17 settembre 2021, annuncio su OpenCollective, da Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [30 settembre 2021, thread di Twitter che spiega nel dettaglio gran parte degli eventi, ora descritti su questa pagina](https://twitter.com/privacy_guides/status/1443633412800225280) -- [1 ottobre 2021, post di u/dng99, di segnalazione di guasto al sottodominio](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [2 aprile 2022, risposta di u/dng99 ai post del blog accusatori di PrivacyTools](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [1 ottobre 2021, post di u/dng99, di segnalazione di guasto al sottodominio](https://reddit.com/comments/pymthv/comment/hexwrps) +- [2 aprile 2022, risposta di u/dng99 ai post del blog accusatori di PrivacyTools](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [16 maggio 2022, risposta da @TommyTran732 su Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [3 settembre 2022, post sul forum di Techlore, di @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/it/advanced/communication-network-types.md b/i18n/it/advanced/communication-network-types.md index f2659655..478564d4 100644 --- a/i18n/it/advanced/communication-network-types.md +++ b/i18n/it/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Alcuni servizi di messaggistica ospitati autonomamente, ti consentono di configu - Possono includere [controllo o accesso limitato](https://drewdevault.com/2018/08/08/Signal.html). Questo può includere cose come: - [Divieto di connettere client di terze parti](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) alla rete centralizzata, che potrebbero fornire una maggiore personalizzazione o una migliore esperienza. Spesso definito nei Termini e Condizioni di utilizzo. - Documentazione scarsa o assente per gli sviluppatori di terze parti. -- La [proprietà](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), politica sulla privacy e le operazioni del servizio possono cambiare facilmente quando una singola entità lo controlla, potenzialmente compromettendo il servizio in seguito. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - L'hosting autonomo richiede sforzi e conoscenze sulla configurazione di un servizio. ## Reti Federate @@ -60,7 +60,7 @@ Quando ospitati autonomamente, i membri di un server federato possono scoprire e La messaggistica P2P si connette a una [rete distribuita](https://en.wikipedia.org/wiki/Distributed_networking) di noti per trasmettere un messaggio al destinatario, senza un server di terze parti. -I client (pari), solitamente, si trovano utilizzando una rete di [calcolo distribuita](https://en.wikipedia.org/wiki/Distributed_computing). Esempi di ciò includono le [Tabelle di Hash Distribuite](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), utilizzate ad esempio dai [torrent](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) e da [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System). Un altro approccio sono le reti basate sulla prossimità, dove una connessione è stabilita via WiFi o Bluetooth (ad esempio, Briar o il protocollo di rete sociale [Scuttlebutt](https://www.scuttlebutt.nz)). +I client (pari), solitamente, si trovano utilizzando una rete di [calcolo distribuita](https://en.wikipedia.org/wiki/Distributed_computing). Esempi di ciò includono le [Tabelle di Hash Distribuite](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), utilizzate ad esempio dai [torrent](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) e da [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Una volta che un paro ha trovato un percorso al suo contatto tramite uno di questi metodi, una connessione diretta tra di essi è creata. Sebbene i messaggi siano solitamente crittografati, un osservatore potrà comunque dedurre la posizione e l'identità del mittente e del destinatario. diff --git a/i18n/it/advanced/dns-overview.md b/i18n/it/advanced/dns-overview.md index 362fd22d..5a26e55e 100644 --- a/i18n/it/advanced/dns-overview.md +++ b/i18n/it/advanced/dns-overview.md @@ -18,7 +18,7 @@ Di seguito, discutiamo e forniamo un tutorial per provare ciò che un osservator ### DNS non crittografato -1. Utilizzando [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (parte del progetto di [Wireshark](https://en.wikipedia.org/wiki/Wireshark)), possiamo monitorare e registrare il flusso di pacchetti di Internet. Il comando registra i pacchetti che soddisfano le regole specificate: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. Il comando registra i pacchetti che soddisfano le regole specificate: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Di seguito, discutiamo e forniamo un tutorial per provare ciò che un osservator nslookup privacyguides.org 8.8.8.8 ``` -3. Successivamente, vogliamo [analizzare](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) i risultati: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Il DNS crittografato può riferirsi a uno dei numerosi protocolli, i più comuni ### DNS-over-TLS (DoT) -[**DNS-over-TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) è un altro metodo per crittografare le comunicazioni DNS, definito in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Il supporto è stato implementato per la prima volta in Android 9, iOS 14 e su Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=), nella versione 237. La preferenza nel settore è stata allontanarsi dal DoT al DoH negli ultimi anni, poiché DoT è un [protocollo complesso](https://dnscrypt.info/faq/), avente una conformità variabile al RFC tra le implementazioni che esistono. Inoltre, DoT opera su una porta 853 dedicata, facilmente bloccabile dai firewall restrittivi. +[**DNS-over-TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) è un altro metodo per crittografare le comunicazioni DNS, definito in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. Inoltre, DoT opera su una porta 853 dedicata, facilmente bloccabile dai firewall restrittivi. ### DNS-over-HTTPS (DoH) @@ -106,7 +106,7 @@ In questo esempio registreremo cosa si verifica quando effettuiamo una richiesta wireshark -r /tmp/dns_doh.pcap ``` -Possiamo vedere l'[instaurazione della connessione](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) e l'[handshake TLS](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/), che si verificano con qualsiasi connessione crittografata. Osservando i successivi pacchetti di "dati dell'applicazione", nessuno di essi contiene il dominio richiesto o l'indirizzo IP restituito. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. Osservando i successivi pacchetti di "dati dell'applicazione", nessuno di essi contiene il dominio richiesto o l'indirizzo IP restituito. ## Perché **non dovrei** utilizzare il DNS crittografato? @@ -158,9 +158,9 @@ L'Indicazione del Nome del Server è tipicamente utilizzata quando un indirizzo tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -Ciò significa che, anche se stiamo utilizzando dei server "DNS Crittografati", il dominio sarà probabilmente divulgato tramite SNI. Il protocollo [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) porta con sé [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), che impedisce questo tipo di fuga d'informazioni. +Ciò significa che, anche se stiamo utilizzando dei server "DNS Crittografati", il dominio sarà probabilmente divulgato tramite SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -I governi, in particolare la [Cina](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) e la [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), hanno già [iniziato a bloccarlo](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) o espresso il desiderio di volerlo fare. Di recente, la Russia ha [iniziato a bloccare i siti web stranieri](https://github.com/net4people/bbs/issues/108), che utilizzano lo standard [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3). Questo perché il protocollo [QUIC](https://en.wikipedia.org/wiki/QUIC), parte di HTTP/3, richiede che anche `ClientHello` sia crittografato. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Di recente, la Russia ha [iniziato a bloccare i siti web stranieri](https://github.com/net4people/bbs/issues/108), che utilizzano lo standard [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3). Questo perché il protocollo [QUIC](https://en.wikipedia.org/wiki/QUIC), parte di HTTP/3, richiede che anche `ClientHello` sia crittografato. ### Protocollo di Stato del Certificato Online (OCSP) @@ -289,7 +289,7 @@ Il processo di firma delle DNSSEC è simile a quello di firma di un documento le Le DNSSEC implementano una politica di firma digitale gerarchica, tra tutti i livelli del DNS. Ad esempio, nel caso di una ricerca di `privacyguides.org`, un server DNS di radice firmerebbe una chiave per il nome del server `.org`, e il nome del server `.org`, dunque, firmerebbe un chiave per quello autoritativo di `privacyguides.org`. -Adattato dalla [panoramica sulle Estensioni di Sicurezza DNS (DNSSEC)](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: Un'introduzione](https://blog.cloudflare.com/dnssec-an-introduction/), di Cloudflare, entrambi sotto licenza [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## Cos'è la minimizzazione dei QNAME? diff --git a/i18n/it/advanced/payments.md b/i18n/it/advanced/payments.md index 6503316d..a9ed2d39 100644 --- a/i18n/it/advanced/payments.md +++ b/i18n/it/advanced/payments.md @@ -9,7 +9,7 @@ C'è un motivo per cui i dati sulle tue abitudini d'acquisto siano considerati i Per secoli, **il contante** ha rappresentato la forma principale di pagamento privato. Il contante presenta eccellenti proprietà di privacy in gran parte dei casi, è ampiamente accettato in gran parte dei paesi ed è **fungibile**, a significare che non è unico ed è interamente intercambiabile. -Le leggi sul pagamento in contanti variano a seconda del paese. Negli Stati Uniti, per i pagamenti in contanti superiori ai $10.000, è richiesta una comunicazione speciale all'IRS sul [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). L'azienda ricevente deve verificare l'ID del nome, l'indirizzo, l'occupazione, la data di nascita e il Numero di Sicurezza Sociale o altro TIN (con alcune eccezioni), del pagatore. Esistono dei limiti inferiori senza ID, per $3.000 o inferiori, per i cambi e i trasferimenti di denaro. Inoltre, i contanti contengono dei numeri di serie. Questi non sono quasi mai tracciati dai venditori, ma sono utilizzabili dalle autorità nelle indagini mirate. +Le leggi sul pagamento in contanti variano a seconda del paese. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). L'azienda ricevente deve verificare l'ID del nome, l'indirizzo, l'occupazione, la data di nascita e il Numero di Sicurezza Sociale o altro TIN (con alcune eccezioni), del pagatore. Esistono dei limiti inferiori senza ID, per $3.000 o inferiori, per i cambi e i trasferimenti di denaro. Inoltre, i contanti contengono dei numeri di serie. Questi non sono quasi mai tracciati dai venditori, ma sono utilizzabili dalle autorità nelle indagini mirate. Nonostante ciò, è tipicamente l'opzione migliore. @@ -60,7 +60,7 @@ Esistono numerosi progetti di criptovalute che pretendono di garantire la privac - [Criptovalute consigliate :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Le Privacy Coins sono state oggetto di un crescente controllo da parte delle agenzie governative. Nel 2020, [l'IRS ha pubblicato una taglia di $625.000](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) per gli strumenti in grado di violare la Rete Lightning di Bitcoin e/o la privacy delle transazioni di Monero. Infine, [hanno pagato due aziende](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chinalysis e Integra Fec), per un totale di $1,25 milioni per strumenti che pretendono di farlo (non si sa quale rete di criptovalute sia mirata da tali strumenti). A causa della segretezza che circonda strumenti come questi, ==nessuno di questi metodi di tracciamento delle criptovalute è stato confermato indipendentemente.== Tuttavia, è molto probabile che esistano strumenti che aiutano le indagini mirate sulle transazioni di monete private, e che le monete private riescano solo a contrastare la sorveglianza di massa. +Le Privacy Coins sono state oggetto di un crescente controllo da parte delle agenzie governative. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. Infine, [hanno pagato due aziende](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chinalysis e Integra Fec), per un totale di $1,25 milioni per strumenti che pretendono di farlo (non si sa quale rete di criptovalute sia mirata da tali strumenti). A causa della segretezza che circonda strumenti come questi, ==nessuno di questi metodi di tracciamento delle criptovalute è stato confermato indipendentemente.== Tuttavia, è molto probabile che esistano strumenti che aiutano le indagini mirate sulle transazioni di monete private, e che le monete private riescano solo a contrastare la sorveglianza di massa. ### Altre Valute (Bitcoin, Ethereum, ecc.) @@ -76,7 +76,7 @@ Per le criptovalute esistono due forme di portafogli: custodiali e non custodial ### Acquisizione -Acquisire [criptovalute](../cryptocurrency.md) come Monero in modo privato, può essere difficile. I mercati P2P come [LocalMonero](https://localmonero.co/), una piattaforma che facilita gli scambi tra persone, sono possibili opzioni. Se l'utilizzo di una piattaforma di scambio che richiede il KYC è un rischio accettabile per te, finché le transazioni successive non sono tracciabili, un'opzione molto più facile è acquistare Monero su una piattaforma come [Kraken](https://kraken.com/), o acquistare Bitcoin/Litecoin da una piattaforma KYC, poi scambiabili per Monero. Quindi, potrai prelevare i Monero acquistati sul tuo portafoglio non custodiale, per utilizzarli privatamente in seguito. +Acquisire [criptovalute](../cryptocurrency.md) come Monero in modo privato, può essere difficile. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Quindi, potrai prelevare i Monero acquistati sul tuo portafoglio non custodiale, per utilizzarli privatamente in seguito. Se scegli di procedere così, assicurati di acquistare Monero in momenti differenti e in importi differenti, rispetto a dove li spenderai. Se acquisti $5000 Monero su una piattaforma di scambio ed effettui un acquisto di $5000 in Monero un'ora dopo, queste azioni potrebbero potenzialmente essere correlate a un osservatore esterno, indipendentemente dal percorso intrapreso dai Monero. Frammentare gli acquisti e acquistare importi maggiori di Monero in anticipo, per poi spenderli su più transazioni di piccole dimensioni, può evitare tale insidia. diff --git a/i18n/it/advanced/tor-overview.md b/i18n/it/advanced/tor-overview.md index d267db45..801f39ad 100644 --- a/i18n/it/advanced/tor-overview.md +++ b/i18n/it/advanced/tor-overview.md @@ -21,7 +21,7 @@ Se hai la possibilità di accedere a un provider VPN affidabile e **qualsiasi** Poiché abbiamo già [raccomandato in generale](../basics/vpn-overview.md) che la stragrande maggioranza delle persone utilizzi un provider VPN affidabile per una serie di motivi, la seguente raccomandazione sulla connessione a Tor tramite una VPN probabilmente si applica anche a te. Non è necessario disattivare la VPN prima di connettersi a Tor, come alcune risorse online potrebbero farti credere. -Collegandosi direttamente a Tor, la tua connessione si farà notare dagli amministratori della rete locale o dal tuo ISP. Il rilevamento e la correlazione di questo traffico [è stato fatto](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in passato dagli amministratori di rete per identificare e deanonimizzare specifici utenti Tor sulla loro rete. D'altra parte, la connessione a una VPN è quasi sempre meno sospetta, perché i fornitori VPN commerciali sono utilizzati dai consumatori di tutti i giorni per una serie di attività banali come l'aggiramento delle geo-restrizioni, anche in Paesi con forti restrizioni su Internet. +Collegandosi direttamente a Tor, la tua connessione si farà notare dagli amministratori della rete locale o dal tuo ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. D'altra parte, la connessione a una VPN è quasi sempre meno sospetta, perché i fornitori VPN commerciali sono utilizzati dai consumatori di tutti i giorni per una serie di attività banali come l'aggiramento delle geo-restrizioni, anche in Paesi con forti restrizioni su Internet. Pertanto, dovresti fare uno sforzo per nascondere il tuo indirizzo IP **prima di** connetterti alla rete Tor. Puoi farlo semplicemente collegandoti a una VPN (tramite un client installato sul tuo computer) e poi accedere a [Tor](../tor.md) come di consueto, ad esempio tramite il Tor Browser. In questo modo si crea una catena di connessioni del tipo: @@ -72,7 +72,7 @@ Come abbiamo già accennato, Tor è anche facilmente identificabile sulla rete. ### L'utilizzo di Tor non è irrilevabile -**Anche se utilizzi ponti e trasporti collegabili**, Tor Project non fornisce alcuno strumento per nascondere che tu stia utilizzando Tor dal tuo ISP. Nemmeno l'utilizzo di "trasporti collegabili" o di ponti non pubblici, nasconde il fatto che tu stia utilizzando un canale privato di comunicazione. I trasporti collegabili più popolari, come obfs4 (che offusca il tuo traffico affinché "non sembri niente") e meek (che utilizza la falsificazione del dominio per camuffare il tuo traffico), sono [rilevabili](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) con tecniche di analisi del traffico abbastanza standard. Snowflake ha problemi simili ed è [facilmente rilevabile](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html), persino *prima* che una connessione a Tor sia stabilita. +**Anche se utilizzi ponti e trasporti collegabili**, Tor Project non fornisce alcuno strumento per nascondere che tu stia utilizzando Tor dal tuo ISP. Nemmeno l'utilizzo di "trasporti collegabili" o di ponti non pubblici, nasconde il fatto che tu stia utilizzando un canale privato di comunicazione. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Esistono altri trasporti collegabili oltre questi tre, ma si affidano tipicamente alla sicurezza tramite l'oscuramento per eludere il rilevamento. Non sono impossibili da rilevare, sono semplicemente utilizzati da così poche persone, che non vale la pena creare dei rilevatori specifici. Non ci si dovrebbe affidare, specificamente se si è monitorati. @@ -193,6 +193,6 @@ Se pensi che un ponte possa aiutare a difendere dal rilevamento o altre analisi - [Come funziona Tor - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Servizi Onion di Tor - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: Il primo relay nel tuo circuito è detto "guardia d'accesso" o "guardia". È un relay veloce e stabile che rimane il primo nel tuo circuito per 2-3 mesi, per proteggerti da attacchi di deanonimizzazione noti. Il resto del tuo circuito cambia a ogni nuovo sito web che visiti e, tutti insieme, questi relay, forniscono la completa protezione della privacy di Tor. Per ulteriori informazioni sul funzionamento dei relay di guardia, consulta questo [post del blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) e il [documento](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sulle guardie d'accesso. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: Il primo relay nel tuo circuito è detto "guardia d'accesso" o "guardia". È un relay veloce e stabile che rimane il primo nel tuo circuito per 2-3 mesi, per proteggerti da attacchi di deanonimizzazione noti. Il resto del tuo circuito cambia a ogni nuovo sito web che visiti e, tutti insieme, questi relay, forniscono la completa protezione della privacy di Tor. Per ulteriori informazioni sul funzionamento dei relay di guardia, consulta questo [post del blog](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) e il [documento](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sulle guardie d'accesso. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Flag dei relay: una (s-)qualificazione speciale per le posizioni dei circuiti (ad esempio, "Guardia", "Uscita", "BadExit"), proprietà dei circuiti (ad esempio, "Veloce", "Stabile"), o ruoli (ad esempio, "Autorità", "HSDir"), come assegnato dalle autorità direttorie, e ulteriormente definito nelle specifiche del protocollo direttorio. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/it/android.md b/i18n/it/android.md index ede1e6a7..45babbe7 100644 --- a/i18n/it/android.md +++ b/i18n/it/android.md @@ -83,9 +83,9 @@ schema: Il **Progetto Open Source di Android** è un sistema operativo mobile e open source sviluppato da Google, utilizzato da gran parte dei dispositivi mobili al mondo. Gran parte dei telefonini venduti con Android sono modificati per includere integrazioni e app invasive come Google Play Services, quindi, puoi migliorare significativamente la tua privacy sul tuo dispositivo mobile, sostituendo l'installazione predefinita del tuo telefono con una versione di Android priva di tali funzionalità invasive. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Home } -[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentazione} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Codice Sorgente" } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } +[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } Questi sono i sistemi operativi, i dispositivi e le app Android che consigliamo, per massimizzare la sicurezza e la privacy del tuo dispositivo mobile. Per scoprire di più su Android: @@ -113,19 +113,19 @@ I dispositivi al termine della propria vita (come i dispositivi a "supporto este GrapheneOS fornisce maggiore [sicurezza] (https://it.wikipedia.org/wiki/Hardening) e miglioramenti della privacy. Dispone di un [allocatore di memoria rafforzato](https://github.com/GrapheneOS/hardened_malloc), autorizzazioni di rete e dei sensori e varie altre [funzionalità di sicurezza](https://grapheneos.org/features). Inoltre, dispone di aggiornamenti completi del firmware e build firmate, quindi, l'avvio verificato è pienamente supportato. -[:octicons-home-16: Home](https://grapheneos.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentazione} -[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } -GrapheneOS supporta [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), che esegue [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) in piena modalità sandbox, come ogni altra app regolare. Ciò significa che puoi sfruttare gran parte dei Google Play Services, come le [notifiche push](https://firebase.google.com/docs/cloud-messaging/), pur avendo il pieno controllo sui suoi accessi e autorizzazioni, e contenendoli in un [profilo di lavoro](os/android-overview.md#work-profile) o [profilo dell'utente](os/android-overview.md#user-profiles) specifico e di tua scelta. +GrapheneOS supporta [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), che esegue [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) in piena modalità sandbox, come ogni altra app regolare. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. I telefoni Google Pixel sono i soli dispositivi che, al momento, soddisfano i [requisiti di sicurezza hardware](https://grapheneos.org/faq#device-support) di GrapheneOS. -[Perché consigliamo GrapheneOS, rispetto a CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Perché consigliamo GrapheneOS, rispetto a CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ I telefoni Google Pixel sono i soli dispositivi che, al momento, soddisfano i [r ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** è un soft-fork di [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS eredita molti [dispositivi supportati](https://divestos.org/index.php?page=devices&base=LineageOS) da LineageOS. Dispone di build firmate, rendendo possibile l'[avvio verificato](https://source.android.com/security/verifiedboot) su alcuni dispositivi non Pixel. [:octicons-home-16: Home](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS eredita molti [dispositivi supportati](https://divestos.org/index.php?p -DivestOS offre [correzioni](https://gitlab.com/divested-mobile/cve_checker) automatizzate delle vulnerabilità del kernel (CVE), minori blob proprietari e un file degli [host](https://divested.dev/index.php?page=dnsbl) personalizzato. La sua WebView rafforzata, [Mulch](https://gitlab.com/divested-mobile/mulch), consente la [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) per tutte le architetture e il [partizionamento dello stato di rete](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), ricevendo aggiornamenti fuori programma. Inoltre, DivestOS include delle correzioni del kernel da GrapheneOS e consente tutte le funzionalità di sicurezza del kernel disponibili, tramite il [rafforzamento di defconfig](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). Tutti i kernel più recenti della versione 3.4 includono la [sanificazione](https://lwn.net/Articles/334747/) completa delle pagine e tutti i circa 22 kernel compilati in Cleng, dispongono di [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471). +DivestOS offre [correzioni](https://gitlab.com/divested-mobile/cve_checker) automatizzate delle vulnerabilità del kernel (CVE), minori blob proprietari e un file degli [host](https://divested.dev/index.php?page=dnsbl) personalizzato. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. Inoltre, DivestOS include delle correzioni del kernel da GrapheneOS e consente tutte le funzionalità di sicurezza del kernel disponibili, tramite il [rafforzamento di defconfig](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implementa alcune correzioni di rafforzamento del sistema, sviluppate in origine per GrapheneOS. DivestOS 16.0 e superiori implementano l'interruttore delle autorizzazioni [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) e SENSORS, l'[allocatore di memoria rafforzato](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constificato](https://en.wikipedia.org/wiki/Const_(computer_programming)) e serie di correzioni di rafforzamento [bionico](https://en.wikipedia.org/wiki/Bionic_(software)). Le versioni 17.1 e superiori presentano l'opzione di [casualizzazione del MAC](https://en.wikipedia.org/wiki/MAC_address#Randomization) completa per rete di GrapheneOS, il controllo di [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) e le [opzioni di timeout](https://grapheneos.org/features) di riavvio/Wi-Fi/Bluetooth automatiche. +DivestOS implementa alcune correzioni di rafforzamento del sistema, sviluppate in origine per GrapheneOS. DivestOS 16.0 e superiori implementano l'interruttore delle autorizzazioni [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) e SENSORS, l'[allocatore di memoria rafforzato](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constificato](https://en.wikipedia.org/wiki/Const_(computer_programming)) e serie di correzioni di rafforzamento [bionico](https://en.wikipedia.org/wiki/Bionic_(software)). 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS utilizza F-Droid come app store predefinito. Normalmente [consigliamo di evitare F-Droid](#f-droid), ma su DivestOS non è possibile farlo; gli sviluppatori aggiornano le loro applicazioni tramite i propri repository di F-Droid ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) e [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). Consigliamo di disabilitare l'applicazione ufficiale F-Droid e di utilizzare [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **con i repository di DivestOS abilitati** per mantenere questi componenti aggiornati. Per le altre app, sono ancora validi i nostri metodi consigliati per ottenerle. +DivestOS utilizza F-Droid come app store predefinito. Normalmente [consigliamo di evitare F-Droid](#f-droid), ma su DivestOS non è possibile farlo; gli sviluppatori aggiornano le loro applicazioni tramite i propri repository di F-Droid ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) e [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. Per le altre app, sono ancora validi i nostri metodi consigliati per ottenerle.

Avviso

@@ -166,13 +166,13 @@ Acquistando un dispositivo, consigliamo di prenderne uno il più recente possibi Evita di acquistare telefoni dagli operatori di rete mobile. Questi, spesso, dispongono di un **bootloader bloccato** e non supportano lo [sblocco dell'OEM](https://source.android.com/devices/bootloader/locking_unlocking). Queste varianti ti impediranno di installare alcun tipo di distribuzione alternativa di Android. -Presta molta **attenzione** all'acquisto di telefoni di seconda mano dai mercati online. Controlla sempre la reputazione del venditore. Se il dispositivo viene rubato, c'è la possibilità che venga inserito nel [database IMEI](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). Esiste anche il rischio di essere associati all'attività del proprietario precedente. +Presta molta **attenzione** all'acquisto di telefoni di seconda mano dai mercati online. Controlla sempre la reputazione del venditore. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). Esiste anche il rischio di essere associati all'attività del proprietario precedente. Altri consigli sui dispositivi Android e sulla compatibilità del sistema operativo: - Non acquistare dispositivi che hanno raggiunto o sono prossimi al termine della propria vita, gli aggiornamenti del firmware aggiuntivi devono essere forniti dal produttore. - Non acquistare telefoni con LineageOS o /e/ OS preinstallati o qualsiasi dispositivo Android privo dell'adeguato supporto all'[Avvio Verificato](https://source.android.com/security/verifiedboot) e degli aggiornamenti del firmware. Inoltre, questi dispositivi non ti consentono di verificare se sono stati manomessi. -- In breve, se un dispositivo o una distribuzione Android non sono elencati qui, probabilmente c'è una buona ragione. Visita il nostro [forum](https://discuss.privacyguides.net/) per ulteriori dettagli! +- In breve, se un dispositivo o una distribuzione Android non sono elencati qui, probabilmente c'è una buona ragione. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Gli Elementi Sicuri come Titan M2 sono più limitati dell'Ambiente d'Esecuzione I telefoni Google Pixel utilizzano un SO TEE detto Trusty, che è [open source](https://source.android.com/security/trusty#whyTrusty), a differenza di molti altri dispositivi. -L'installazione di GrapheneOS su un telefono Pixel è facile grazie all'[installatore web](https://grapheneos.org/install/web). Se non ti senti a tuo agio a farlo da solo e desideri spendere un po' di denaro in più, consulta il [NitroPhone](https://shop.nitrokey.com/shop), preinstallato con GrapheneOS dalla rispettabile azienda [Nitrokey](https://www.nitrokey.com/about). +L'installazione di GrapheneOS su un telefono Pixel è facile grazie all'[installatore web](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. Altri suggerimenti per l'acquisto di un Google Pixel: @@ -219,15 +219,15 @@ Consigliamo un'ampia gamma di app di Android, tramite questo sito. Le app qui el Shelter supporta il blocco della ricerca dei contatti tra profili e la condivisione di file tra profili tramite il gestore dei file predefinito ([DocumentsUI](https://source.android.com/devices/architecture/modular-system/documentsui)). [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } -[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribuisci } +[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Avviso

-Shelter è consigliato rispetto a [Insular](https://secure-system.gitlab.io/Insular/) e [Island](https://github.com/oasisfeng/island), poiché supporta il [blocco della ricerca dei contatti](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). Utilizzando Shelter, ti affidi interamente al suo sviluppatore, poiché Shelter agisce da [Admin del Dispositivo](https://developer.android.com/guide/topics/admin/device-admin?hl=it) per creare il Profilo di Lavoro, e ha ampio accesso ai dati memorizzati nel Profilo di Lavoro. @@ -322,11 +322,11 @@ La [Politica sulla Sicurezza dei Contenuti](https://en.wikipedia.org/wiki/Conten
-Obtainium ti consente di scaricare file di installazione APK da un'ampia varietà di fonti, ed è compito tuo assicurarti che tali fonti e applicazioni siano legittime. Ad esempio, utilizzare Obtainium per installare Signal dalla [pagina APK di Signal](https://signal.org/android/apk/) dovrebbe andare bene, ma l'installazione da repository APK di terze parti come Aptoide o APKPure potrebbe comportare ulteriori rischi. Il rischio di installare un *aggiornamento* dannoso è minore, poiché Android stesso verifica che tutti gli aggiornamenti delle app siano firmati dallo stesso sviluppatore dell'app esistente sul tuo telefono prima di installarli. +Obtainium ti consente di scaricare file di installazione APK da un'ampia varietà di fonti, ed è compito tuo assicurarti che tali fonti e applicazioni siano legittime. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. Il rischio di installare un *aggiornamento* dannoso è minore, poiché Android stesso verifica che tutti gli aggiornamenti delle app siano firmati dallo stesso sviluppatore dell'app esistente sul tuo telefono prima di installarli. ### App Store di GrapheneOS -L'app store di GrapheneOS è disponibile su [GitHub](https://github.com/GrapheneOS/Apps/releases). Supporta Android 12 e versioni successive ed è in grado di aggiornarsi da solo. L'app store contiene applicazioni indipendenti basate sul progetto di GrapheneOS, come [Auditor](https://attestation.app/), [Fotocamera](https://github.com/GrapheneOS/Camera) e [Visualizzatore PDF](https://github.com/GrapheneOS/PdfViewer). Se stai cercando queste app, consigliamo vivamente di ottenere l'app store di GrapheneOS del Play Store, poiché le app sul loro store sono firmate dalla firma dello stesso progetto di GrapheneOS, a cui Google non ha accesso. +L'app store di GrapheneOS è disponibile su [GitHub](https://github.com/GrapheneOS/Apps/releases). Supporta Android 12 e versioni successive ed è in grado di aggiornarsi da solo. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). Se stai cercando queste app, consigliamo vivamente di ottenere l'app store di GrapheneOS del Play Store, poiché le app sul loro store sono firmate dalla firma dello stesso progetto di GrapheneOS, a cui Google non ha accesso. ### Aurora Store @@ -338,9 +338,9 @@ Il Google Play Store richiede un profilo Google per l'accesso, il che non è un **Aurora Store** è un client di Google Play Store che non richiede un profilo di Google, Google Play Services o microG per scaricare le app. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Informativa sulla Privacy" } -[:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } +[:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" }
Downloads @@ -375,7 +375,7 @@ Su GitLab, utilizzando come esempio [Aurora Store](#aurora-store), dovresti navi Se scarichi i file APK da installare manualmente, puoi verificarne la firma con lo strumento [`apksigner`](https://developer.android.com/studio/command-line/apksigner), parte degli [strumenti di creazione](https://developer.android.com/studio/releases/build-tools) di Android. -1. Installa [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Scarica gli [strumenti della riga di comando di Android Studio](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ Se scarichi i file APK da installare manualmente, puoi verificarne la firma con ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. Gli hash risultanti possono poi esser confrontati con un'altra fonte. Alcuni sviluppatori, come per Signal, [mostrano le impronte digitali](https://signal.org/android/apk/) sul proprio sito web. +5. Gli hash risultanti possono poi esser confrontati con un'altra fonte. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ Se scarichi i file APK da installare manualmente, puoi verificarne la firma con ![Logo di F-Droid](assets/img/android/f-droid.svg){ align=right width=120px } -==Consigliamo F-Droid solo come mezzo per ottenere le applicazioni che non possono essere ottenute con i mezzi riportati sopra.== F-Droid è spesso raccomandato come alternativa a Google Play, in particolare nella community della privacy. La possibilità di aggiungere repository di terze parti e di non essere confinati a Google, ne ha determinato la popolarità. F-Droid dispone inoltre di [build riproducibili](https://f-droid.org/en/docs/Reproducible_Builds/) per alcune applicazioni ed è dedicato a software liberi e open source. Tuttavia, il modo in cui F-Droid costruisce, firma e consegna i pacchetti presenta alcuni aspetti negativi legati alla sicurezza: +==Consigliamo F-Droid solo come mezzo per ottenere le applicazioni che non possono essere ottenute con i mezzi riportati sopra.== F-Droid è spesso raccomandato come alternativa a Google Play, in particolare nella community della privacy. La possibilità di aggiungere repository di terze parti e di non essere confinati a Google, ne ha determinato la popolarità. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. Tuttavia, il modo in cui F-Droid costruisce, firma e consegna i pacchetti presenta alcuni aspetti negativi legati alla sicurezza: A causa del loro processo di creazione delle app, quelle presenti nel repository ufficiale di F-Droid sono spesso in ritardo con gli aggiornamenti. Inoltre, i manutentori di F-Droid riutilizzano gli ID dei pacchetti firmando le app con le proprie chiavi, il che non è ideale, poiché conferisce al team di F-Droid la massima fiducia. Inoltre, i requisiti per l'inclusione di un'applicazione nel repo ufficiale di F-Droid sono meno rigidi rispetto ad altri app store come Google Play, il che significa che F-Droid tende ad ospitare molte applicazioni più vecchie, non mantenute o che comunque non soddisfano più [i standard moderni di sicurezza](https://developer.android.com/google/play/requirements/target-sdk). -Altri repository popolari di terze parti per F-Droid, come [IzzyOnDroid](https://apt.izzysoft.de/fdroid/), alleviano alcune di queste preoccupazioni. Il repository IzzyOnDroid estrae le build direttamente da GitHub ed è la seconda scelta migliore dopo i repository degli sviluppatori. Tuttavia, non è un'opzione che possiamo consigliare pienamente, poiché le applicazioni vengono tipicamente [rimosse](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) da questo repository se in seguito vengono aggiunte al repository principale di F-Droid. Sebbene ciò abbia senso (dato che l'obiettivo di questo particolare repository è ospitare le app prima che vengano accettate nel repository principale di F-Droid), ti può lasciare con le app installate senza ricevere più aggiornamenti. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. Il repository IzzyOnDroid estrae le build direttamente da GitHub ed è la seconda scelta migliore dopo i repository degli sviluppatori. Tuttavia, non è un'opzione che possiamo consigliare pienamente, poiché le applicazioni vengono tipicamente [rimosse](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) da questo repository se in seguito vengono aggiunte al repository principale di F-Droid. Sebbene ciò abbia senso (dato che l'obiettivo di questo particolare repository è ospitare le app prima che vengano accettate nel repository principale di F-Droid), ti può lasciare con le app installate senza ricevere più aggiornamenti. -Detto questo, i repository [F-Droid](https://f-droid.org/en/packages/) e [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) ospitano innumerevoli applicazioni, quindi possono essere uno strumento utile per cercare e scoprire applicazioni open source che si possono poi scaricare attraverso altri mezzi come Play Store, Aurora Store o ottenendo l'APK direttamente dallo sviluppatore. Quando cerchi nuove applicazioni attraverso questo metodo, dovresti usare il tuo miglior giudizio e tenere d'occhio la frequenza con cui l'applicazione viene aggiornata. Le applicazioni obsolete possono fare affidamento su librerie non supportate, tra le altre cose, comportando un potenziale rischio per la sicurezza. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. Quando cerchi nuove applicazioni attraverso questo metodo, dovresti usare il tuo miglior giudizio e tenere d'occhio la frequenza con cui l'applicazione viene aggiornata. Le applicazioni obsolete possono fare affidamento su librerie non supportate, tra le altre cose, comportando un potenziale rischio per la sicurezza.

F-Droid Basic

-In alcuni rari casi, lo sviluppatore di un'app la distribuirà soltanto tramite F-Droid, ([Gadgetbridge](https://gadgetbridge.org/) ne è un esempio). Se hai davvero bisogno di un'applicazione del genere, ti consigliamo di utilizzare il nuovo client [F-Droid Basic](https://f-droid.org/it/packages/org.fdroid.basic/) invece dell'applicazione originale F-Droid per ottenerla. F-Droid Basic può eseguire aggiornamenti incustoditi senza estensioni privilegiate o root, inoltre ha un set di funzionalità ridotto (limitando la superficie di attacco). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic può eseguire aggiornamenti incustoditi senza estensioni privilegiate o root, inoltre ha un set di funzionalità ridotto (limitando la superficie di attacco).
diff --git a/i18n/it/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/it/assets/img/how-tor-works/tor-encryption-dark.svg index e1892b3f..0f1e0716 100644 --- a/i18n/it/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/it/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Il tuo - - Dispositivo - - - - Inviare dati a un sito web - - - - - Ricevere dati da un sito web - - - - - Il tuo - - Dispositivo - - - - Accesso - - - - - Centrale - - - - - Uscita - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Ingresso - - - - - Centrale - - - - - Uscita - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/it/assets/img/how-tor-works/tor-encryption.svg b/i18n/it/assets/img/how-tor-works/tor-encryption.svg index 8538b68f..f954fb0f 100644 --- a/i18n/it/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/it/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Il tuo - - Dispositivo - - - - Inviare dati a un sito web - - - - - Ricevere dati da un sito web - - - - - Il tuo - - Dispositivo - - - - Accesso - - - - - Interrmedio - - - - - Uscita - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Accesso - - - - - Intermedio - - - - - Uscita - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/it/assets/img/how-tor-works/tor-path-dark.svg b/i18n/it/assets/img/how-tor-works/tor-path-dark.svg index 59ffd23b..43d039a5 100644 --- a/i18n/it/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/it/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Il tuo - Dispositivo - - - - Accesso - - - - - Intermedio - - - - - Uscita - - - - - PrivacyGuides.org - - - - - - - - + + + + Il tuo + Dispositivo + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/it/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/it/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index 6e91d0bf..ce51beee 100644 --- a/i18n/it/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/it/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Il tuo - - - Dispositivo - - - - - - Guardia - - - Relay - - - Relay - - - - - nascosto...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Incontro - - - Relay - - - - - Accesso - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/it/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/it/assets/img/how-tor-works/tor-path-hidden-service.svg index d3855226..8d008447 100644 --- a/i18n/it/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/it/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Il tuo - - - Dispositivo - - - - - - Guardia - - - Relay - - - Relay - - - - - nascosto...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Incontro - - - Relay - - - - - Accesso - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/it/assets/img/how-tor-works/tor-path.svg b/i18n/it/assets/img/how-tor-works/tor-path.svg index 41abf2d2..074fbd6c 100644 --- a/i18n/it/assets/img/how-tor-works/tor-path.svg +++ b/i18n/it/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/it/basics/account-deletion.md b/i18n/it/basics/account-deletion.md index f28ad9de..8c61176d 100644 --- a/i18n/it/basics/account-deletion.md +++ b/i18n/it/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: È facile accumulare un numerosi profili su Internet, ecco alcuni consigli su come sfoltirli. --- -Con il tempo, può essere facile accumulare numerosi profili online, molti dei quali non sono più utilizzati. L'eliminazione di tali profili inutilizzati è un passaggio importante per rivendicare la propria privacy, poiché i profili inattivi sono vulnerabili alle violazioni di dati. Una violazione dei dati si verifica quando la sicurezza di un servizio viene compromessa, e le informazioni protette vengono visualizzate, trasmesse o rubate da utenti non autorizzati. Le violazioni dei dati, oggi, sono sfortunatamente tutte [troppo comuni](https://haveibeenpwned.com/PwnedWebsites); quindi, praticare una buona igiene digitale è il metodo migliore per minimizzarne l'impatto sulla tua vita. Lo scopo di questa guida, quindi, è aiutarti a superare il fastidioso processo di eliminazione dei profili, spesso reso difficile dal [design ingannevole](https://www.deceptive.design/), per migliorare la propria presenza online. +Con il tempo, può essere facile accumulare numerosi profili online, molti dei quali non sono più utilizzati. L'eliminazione di tali profili inutilizzati è un passaggio importante per rivendicare la propria privacy, poiché i profili inattivi sono vulnerabili alle violazioni di dati. Una violazione dei dati si verifica quando la sicurezza di un servizio viene compromessa, e le informazioni protette vengono visualizzate, trasmesse o rubate da utenti non autorizzati. Le violazioni dei dati, oggi, sono sfortunatamente tutte [troppo comuni](https://haveibeenpwned.com/PwnedWebsites); quindi, praticare una buona igiene digitale è il metodo migliore per minimizzarne l'impatto sulla tua vita. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Trovare i vecchi account ### Gestore di password -Se hai un gestore di password che hai utilizzato per tutta la tua vita digitale, questa parte sarà molto semplice. Spesso, includono la funzionalità integrata per rilevare se le tue credenziali sono state esposte a violazioni di dati, come il [Rapporto sulle Violazioni dei Dati](https://bitwarden.com/blog/have-you-been-pwned/) di Bitwarden. +Se hai un gestore di password che hai utilizzato per tutta la tua vita digitale, questa parte sarà molto semplice. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Funzionalità di Rapporto sulle Violazioni dei Dati di Bitwarden](../assets/img/account-deletion/exposed_passwords.png)
-Anche se non hai mai utilizzato un gestore di password, è probabile che tu abbia utilizzato quello del tuo browser o del tuo telefono senza nemmeno accorgetene. Ad esempio: [Gestore Password Firefox ](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins),[Gestore Password Google](https://passwords.google.com/intro) e [ Gestore Password Edge ](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Anche se non hai mai utilizzato un gestore di password, è probabile che tu abbia utilizzato quello del tuo browser o del tuo telefono senza nemmeno accorgetene. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Le piattaforme desktop dispongono spesso di un gestore di password che può aiutarvi a recuperare le password dimenticate: -- [Gestione credenziali](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) di Windows -- [Password](https://support.apple.com/en-us/HT211145) di macOS -- [ Password](https://support.apple.com/en-us/HT211146) di iOS +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Gnome Keyring di Linux, accessibile tramite [Seahorse](https://wiki.gnome.org/Apps/Seahorse) o [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ Quando tenti di recuperare l'account, se il sito restituisce un messaggio di err ### GDPR (solo per i residenti nello SEE) -I residenti SEE hanno ulteriori diritti relativi alla cancellazione dei dati, specificati all'[Articolo 17](https://www.gdpr.org/regulation/article-17.html) del RGPD. Se applicabile, leggi la politica sulla privacy per qualsiasi dato servizio, per trovare le informazioni su come esercitare il tuo diritto alla cancellazione. Leggere la politica sulla privacy può rivelarsi importante, poiché alcuni servizi hanno un'opzione "Elimina Profilo" che disabilita il tuo profilo, mentre per l'eliminazione reale devi intraprendere ulteriori azioni. Talvolta, l'eliminazione effettiva potrebbe richiedere la compilazione di sondaggi, il contatto del responsabile della protezione dei dati, o persino la dimostrazione della tua residenza nel SEE. Se intendi procedere in questo modo, **non** sovrascrivere le informazioni del profilo: la tua identità come residente del SEE potrebbe venirti richiesta. Nota che la posizione geografica del servizio non ha alcuna importanza; il RGPD si applica a chiunque serva utenti europei. Se il servizio non rispetta il tuo diritto alla cancellazione, puoi contattare l'[Autorità di Protezione dei Dati](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) nazionale, e potresti anche avere diritto a un risarcimento in denaro. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. Se applicabile, leggi la politica sulla privacy per qualsiasi dato servizio, per trovare le informazioni su come esercitare il tuo diritto alla cancellazione. Leggere la politica sulla privacy può rivelarsi importante, poiché alcuni servizi hanno un'opzione "Elimina Profilo" che disabilita il tuo profilo, mentre per l'eliminazione reale devi intraprendere ulteriori azioni. Talvolta, l'eliminazione effettiva potrebbe richiedere la compilazione di sondaggi, il contatto del responsabile della protezione dei dati, o persino la dimostrazione della tua residenza nel SEE. Se intendi procedere in questo modo, **non** sovrascrivere le informazioni del profilo: la tua identità come residente del SEE potrebbe venirti richiesta. Nota che la posizione geografica del servizio non ha alcuna importanza; il RGPD si applica a chiunque serva utenti europei. Se il servizio non rispetta il tuo diritto alla cancellazione, puoi contattare l'[Autorità di Protezione dei Dati](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) nazionale, e potresti anche avere diritto a un risarcimento in denaro. ### Sovrascrivere informazioni del profilo @@ -59,4 +59,4 @@ Anche quando riesci a eliminare un profilo, non vi è alcuna garanzia che tutte ## Evita i nuovi profili -Come dice il vecchio detto, "un grammo di prevenzione vale un chilo di cura." Ogni volta che ti senti tentato di registrare un nuovo profilo, chiediti: "Ne ho davvero bisogno? Posso realizzare ciò che mi serve senza un profilo?" Spesso è molto più difficile eliminare un profilo, piuttosto che crearne uno. E anche dopo aver eliminato o modificato le informazioni del tuo account, potrebbe esserci una versione nella cache di qualche sito di terze parti, come [Internet Archive](https://archive.org/). Quando possibile, evita la tentazione: il te stesso del futuro ti ringrazierà! +Come dice il vecchio detto, "un grammo di prevenzione vale un chilo di cura." Ogni volta che ti senti tentato di registrare un nuovo profilo, chiediti: "Ne ho davvero bisogno? Posso realizzare ciò che mi serve senza un profilo?" Spesso è molto più difficile eliminare un profilo, piuttosto che crearne uno. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Quando possibile, evita la tentazione: il te stesso del futuro ti ringrazierà! diff --git a/i18n/it/basics/common-misconceptions.md b/i18n/it/basics/common-misconceptions.md index 85983e13..9a357c55 100644 --- a/i18n/it/basics/common-misconceptions.md +++ b/i18n/it/basics/common-misconceptions.md @@ -88,7 +88,7 @@ Acquistando online, l'utilizzo di un [Paccomat](https://it.wikipedia.org/wiki/Pa 2. **Identità sconosciuta**: Un'identità sconosciuta potrebbe essere uno pseudonimo stabile che utilizzi regolarmente. Non è anonimo perché non cambia. Se fai parte di una community online, potresti voler mantenere un'identità nota ad altri. Questo pseudonimo non è anonimo perché, se monitorato abbastanza a lungo, i dettagli sul proprietario potrebbero rilevare ulteriori informazioni, come il modo in cui scrive, le sue conoscenze generali su argomenti d'interesse, etc. -Potresti voler utilizzare una VPN per questo, per mascherare il tuo indirizzo IP. Le transazioni finanziarie sono più difficili da mascherare: potresti considerare l'utilizzo di criptovalute anonime, come [Monero](https://www.getmonero.org/). L'utilizzo del cambio di criptovalute, inoltre, potrebbe aiutare a distinguere l'origine della valuta. Tipicamente, le piattaforme di scambio richiedono il completamento della KYC (conoscenza del cliente), prima di consentirti di scambiare valuta legale per qualsiasi tipo di criptovaluta. Anche le opzioni di incontro locali potrebbero essere una soluzione; tuttavia, sono spesso più costose e, talvolta, richiedono la KYC. +Potresti voler utilizzare una VPN per questo, per mascherare il tuo indirizzo IP. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). L'utilizzo del cambio di criptovalute, inoltre, potrebbe aiutare a distinguere l'origine della valuta. Tipicamente, le piattaforme di scambio richiedono il completamento della KYC (conoscenza del cliente), prima di consentirti di scambiare valuta legale per qualsiasi tipo di criptovaluta. Anche le opzioni di incontro locali potrebbero essere una soluzione; tuttavia, sono spesso più costose e, talvolta, richiedono la KYC. 3. **Identità anonima**: Anche con l'esperienza, le identità anonime sono difficili da mantenere per lunghi periodi di tempo. Dovrebbero essere identità a breve termine e di breve durata, a rotazione regolare. diff --git a/i18n/it/basics/common-threats.md b/i18n/it/basics/common-threats.md index 7b413539..99793668 100644 --- a/i18n/it/basics/common-threats.md +++ b/i18n/it/basics/common-threats.md @@ -55,7 +55,7 @@ Per loro natura, i **browser web**, i **client email** e le **applicazioni per u -Se temi un **attacco fisico**, dovresti utilizzare un sistema operativo con un'implementazione d'avvio verificata e sicura, come Android, iOS, macOS, o [Windows (con TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). Inoltre, dovresti assicurarti che la tua unità sia crittografata e che il sistema operativo utilizzi un TPM o Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) od [Element](https://developers.google.com/android/security/android-ready-se), per limitare la frequenza dei tentativi di inserire la frase segreta crittografica. Dovresti evitare di condividere il tuo computer con persone di cui non ti fidi, poiché gran parte dei sistemi operativi per desktop non crittografa i dati separatamente, per ogni utente. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). Inoltre, dovresti assicurarti che la tua unità sia crittografata e che il sistema operativo utilizzi un TPM o Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) od [Element](https://developers.google.com/android/security/android-ready-se), per limitare la frequenza dei tentativi di inserire la frase segreta crittografica. Dovresti evitare di condividere il tuo computer con persone di cui non ti fidi, poiché gran parte dei sistemi operativi per desktop non crittografa i dati separatamente, per ogni utente. ## Privacy dai fornitori del servizio @@ -89,16 +89,16 @@ La sorveglianza di massa consiste nell'intricato sforzo di monitorare il "compor

Atlante della sorveglianza

-Se vuoi saperne di più sui metodi di sorveglianza e su come vengono attuati nella tua città, puoi anche dare un'occhiata all'[Atlas of Surveillance](https://atlasofsurveillance.org/) della [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In Francia è possibile consultare il [sito web di Technopolice](https://technopolice.fr/villes/) gestito dall'associazione no-profit La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Spesso, i governi, giustificano i programmi di sorveglianza di massa come mezzi necessari per combattere il terrorismo e prevenire il crimine. Tuttavia, violando i diritti umani, sono spesso utilizzati per colpire in modo sproporzionato gruppi di minoranza e dissidenti politici, tra gli altri.
-

ACLU: La lezione sulla privacy dell'11 settembre: La sorveglianza di massa non è la strada da seguire

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

Di fronte alle [divulgazioni di Edward Snowden dei programmi governativi come [PRISM](https://it.wikipedia.org/wiki/PRISM_(programma_di_sorveglianza)) e [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)]; inoltre, i funzionari dell'intelligence hanno ammesso che l'NSA ha raccolto segretamente per anni i registri su virtualmente ogni chiamata telefonica statunitense: chi chiama chi, quando e quanto durano. Questo tipo di informazioni, accumulate dall'NSA giorno dopo giorno, possono rivelare dettagli incredibilmente sensibili sulle vite delle persone e le associazioni, come se hanno chiamato un prete, una struttura preposta all'aborto, un consulente per le dipendenze o una linea diretta anti-suicidi. @@ -144,7 +144,7 @@ Se hai già inviato le tue informazioni reali ai siti che non dovrebbero possede La censura online è attuabile (in varie misure) da attori tra cui i governi totalitari, gli amministratori di rete e i fornitori dei servizi. Questi sforzi di controllo della comunicazione e di limitazione dell'accesso alle informazioni, saranno sempre incompatibili con il diritto umano alla Libertà d'Espressione.[^5] -La censura sulle piattaforme aziendali è sempre più comune, in quanto piattaforme come Twitter e Facebook cedono alle richieste del pubblico, alle pressioni di mercato e alle pressioni dalle agenzie governative. Le pressioni governative possono essere richieste segrete alle aziende, come la [richiesta di rimozione](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) della Casa Bianca di un video YouTube provocativo, o palesi, come il governo cinese che richiede alle aziende di aderire a un rigido regime di censura. +La censura sulle piattaforme aziendali è sempre più comune, in quanto piattaforme come Twitter e Facebook cedono alle richieste del pubblico, alle pressioni di mercato e alle pressioni dalle agenzie governative. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. Le persone preoccupate dalla minaccia della censura possono utilizzare tecnologie come [Tor](../advanced/tor-overview.md) per aggirarla, e supportare le piattaforme di comunicazione resistenti alla censura come [Matrix](../real-time-communication.md#element), prive di autorità centralizzata che possa chiudere arbitrariamente i profili. @@ -162,5 +162,5 @@ Devi sempre considerare i rischi di provare a eludere la censura, le potenziali [^1]: Wikipedia: [*Sorveglianza di massa*](https://en.wikipedia.org/wiki/Mass_surveillance) e [*Sorveglianza*](https://en.wikipedia.org/wiki/Surveillance). [^2]: Comitato di Supervisione delle Libertà Civili e della Privacy degli Stati Uniti: [*Rapporto sul Programma dei registri telefonici condotto ai sensi della Sezione 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Capitalismo di sorveglianza*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (o, "elencare tutte le cose cattive che conosciamo"), come molti blocker di contenuti e programmi antivirus fanno, non riesce a proteggerti adeguatamente da minacce nuove e sconosciute perché non sono ancora state aggiunte alla lista dei filtri. Inoltre, dovresti utilizzare altre tecniche di mitigazione. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Inoltre, dovresti utilizzare altre tecniche di mitigazione. [^5]: Nazioni Unite: [*Dichiarazione Universale dei Diritti dell'Uomo*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/it/basics/email-security.md b/i18n/it/basics/email-security.md index a7155d5f..f62a0575 100644 --- a/i18n/it/basics/email-security.md +++ b/i18n/it/basics/email-security.md @@ -13,7 +13,7 @@ Di conseguenza, l'email è utilizzata meglio per ricevere email di transazione ( Il metodo standard per aggiungere l'E2EE alle email tra diversi fornitori email è utilizzando OpenPGP. Esistono svariate implementazioni dello standard OpenPGP; le più comuni sono [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) e [OpenPGP.js](https://openpgpjs.org). -Esiste un altro standard popolare tra le aziende, detto [S/MIME](https://en.wikipedia.org/wiki/S/MIME), tuttavia, richiede un certificato emesso da un'[Autorità di Certificazione](https://en.wikipedia.org/wiki/Certificate_authority) (non tutte emettono certificati S/MIME). Inoltre, è supportato su [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) e su [Outlook per Web o Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +Esiste un altro standard popolare tra le aziende, detto [S/MIME](https://en.wikipedia.org/wiki/S/MIME), tuttavia, richiede un certificato emesso da un'[Autorità di Certificazione](https://en.wikipedia.org/wiki/Certificate_authority) (non tutte emettono certificati S/MIME). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Anche se utilizzi OpenPGP, non supporta la [segretezza in avanti](https://en.wikipedia.org/wiki/Forward_secrecy), il che significa che se la chiave privata tua o del destinatario viene rubata, tutti i messaggi precedentemente crittografati saranno esposti. Ecco perché consigliamo la [messaggistica istantanea](../real-time-communication.md), che implementa la segretezza in avanti via email, per le comunicazioni personali, quando possibile. @@ -23,7 +23,7 @@ Lo standard Web Key Directory (WKD) consente ai client di posta elettronica di s Oltre ai [client di posta elettronica che consigliamo](../email-clients.md) e che supportano WKD, anche alcuni provider di webmail supportano WKD. Se *la propria chiave* viene pubblicata su WKD per essere utilizzata da altri dipende dalla configurazione del dominio. Se utilizzi un [provider di posta elettronica](../email.md#openpgp-compatible-services) che supporta WKD, come Proton Mail o Mailbox.org, possono pubblicare la tua chiave OpenPGP sul loro dominio per te. -Se si utilizza un dominio personalizzato, è necessario configurare il WKD separatamente. Se si controlla il proprio nome di dominio, è possibile impostare il WKD indipendentemente dal provider di posta elettronica. Un modo semplice per farlo è utilizzare la funzione "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" di keys.openpgp.org, impostando un record CNAME sul sottodominio `openpgpkey` del tuo dominio che punta a `wkd.keys.openpgp.org`, quindi caricando la tua chiave su [keys.openpgp.org](https://keys.openpgp.org/). In alternativa, è possibile effettuare il [self-host del WKD sul proprio server web](https://wiki.gnupg.org/WKDHosting). +Se si utilizza un dominio personalizzato, è necessario configurare il WKD separatamente. Se si controlla il proprio nome di dominio, è possibile impostare il WKD indipendentemente dal provider di posta elettronica. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). In alternativa, è possibile effettuare il [self-host del WKD sul proprio server web](https://wiki.gnupg.org/WKDHosting). Se utilizzi un dominio condiviso da un fornitore che non supporta WKD, come @gmail.com, non sarai in grado di condividere la tua chiave OpenPGP con altri tramite questo metodo. @@ -33,7 +33,7 @@ I fornitori email che ti consentono di utilizzare i protocolli d'accesso standar ### Come proteggo le mie chiavi private? -Una smartcard (come [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) o [Nitrokey](https://www.nitrokey.com)) opera ricevendo un messaggio email crittografato da un dispositivo (telefono, tablet, computer, etc.), che esegue un client email/webmail. Il messaggio viene quindi decifrato dalla smartcard e il contenuto decifrato viene inviato al dispositivo. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Il messaggio viene quindi decifrato dalla smartcard e il contenuto decifrato viene inviato al dispositivo. È preferibile che la decodifica avvenga sulla smartcard per evitare di esporre la tua chiave privata a un dispositivo compromesso. diff --git a/i18n/it/basics/multi-factor-authentication.md b/i18n/it/basics/multi-factor-authentication.md index 7adcaa89..0e0e013c 100644 --- a/i18n/it/basics/multi-factor-authentication.md +++ b/i18n/it/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ La TOTP è una delle forme di AFM più comuni disponibili. Quando configuri la T Il codice a tempo limitato deriva dal codice segreto e dall'ora corrente. Poiché il codice è valido soltanto per un breve periodo di tempo, senza l'accesso al codice segreto condiviso, un avversario non può generare nuovi codici. -Se possiedi una chiave di sicurezza hardware con supporto a TOTP (come una YubiKey con [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), consigliamo di conservare i tuoi "codici segreti condivisi" sul hardware. Gli hardware come la YubiKey sono stati sviluppato con l'intento di rendere difficile l'estrazione e la copia del "codice segreto condiviso". Inoltre, una YubiKey non è connessa a Internet, a differenza di un telefono con un'app di TOTP. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Gli hardware come la YubiKey sono stati sviluppato con l'intento di rendere difficile l'estrazione e la copia del "codice segreto condiviso". Inoltre, una YubiKey non è connessa a Internet, a differenza di un telefono con un'app di TOTP. A differenza di [WebAuthn](#fido-fast-identity-online), TOTP non offre alcuna protezione dal [phishing](https://en.wikipedia.org/wiki/Phishing) o dagli attacchi di riutilizzo. Se un malitenzionato ottiene un codice valido da te, potrebbe utilizzarlo quante volte preferisce, fino alla sua scadenza (generalmente 60 secondi). @@ -122,13 +122,13 @@ Oltre a proteggere i tuoi accessi ai siti web, l'autenticazione a più fattori ### Windows -Yubico ha un [Fornitore di Credenziali](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) dedicato, che aggiunge l'autenticazione Contestazione-Risposta al flusso d'accesso con nome utente + password, per i profili locali di Windows. Se possiedi una YubiKey con supporto all'autenticazione Contestazione-Risposta, consulta la [Guida di Configurazione dell'Accesso per Windows di Yubico](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), che ti consentirà di configurare l'AFM sul tuo computer Windows. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS [supporta nativamente](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) l'autenticazione con smart card (PIV). Se possiedi una smartcard o una chiave di sicurezza hardware che supporta l'interfaccia PIV, come YubiKey, consigliamo di seguire la documentazione del tuo fornitore di sicurezza con smartcard/hardware e di configurare l'autenticazione a due fattori per il tuo computer macOS. -Yubico ha una guida all'[Utilizzo della tua YubiKey come Smart Card su macOS](https://support.yubico.com/hc/en-us/articles/360016649059), che può aiutarti a configurarla su macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. Dopo aver configurato la tua smartcard/chiave di sicurezza, consigliamo di eseguire questo comando nel Terminale: @@ -147,22 +147,22 @@ Se il nome del host del tuo sistema cambia (ad esempio, a causa del DHCP), non p
-Il modulo `pam_u2f` su Linux può fornire l'autenticazione a due fattori per accedere alle distribuzioni più popolari di Linux. Se possiedi una chiave di sicurezza hardware che supporta U2F, puoi configurare l'autenticazione AFM per il tuo accesso. Yubico dispone della [Guida di Accesso a Linux Ubuntu - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F), che dovrebbe funzionare su qualsiasi distribuzione. I comandi del gestore di pacchetti, come `apt-get` e i nomi dei pacchetti, tuttavia, potrebbero variare. Questa guida **non** si applica a Qubes OS. +Il modulo `pam_u2f` su Linux può fornire l'autenticazione a due fattori per accedere alle distribuzioni più popolari di Linux. Se possiedi una chiave di sicurezza hardware che supporta U2F, puoi configurare l'autenticazione AFM per il tuo accesso. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. I comandi del gestore di pacchetti, come `apt-get` e i nomi dei pacchetti, tuttavia, potrebbero variare. Questa guida **non** si applica a Qubes OS. ### Qubes OS -Qubes OS supporta l'autenticazione Contestazione-Risposta con le YubiKey. Se possiedi una YubiKey con supporto all'autenticazione Contestazione-Risposta, consulta la [documentazione di YubiKey](https://www.qubes-os.org/doc/yubikey/) per Qubes OS, se vorresti configurarvi l'AFM. +Qubes OS supporta l'autenticazione Contestazione-Risposta con le YubiKey. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Chiavi di Sicurezza Hardware -L'AFM SSH potrebbe essere configurata utilizzando svariati metodi d'autenticazione differenti, popolari con le chiavi di sicurezza hardware. Ti consigliamo di consultare la [documentazione](https://developers.yubico.com/SSH/) su come configurarli. +L'AFM SSH potrebbe essere configurata utilizzando svariati metodi d'autenticazione differenti, popolari con le chiavi di sicurezza hardware. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Password Monouso basata sul Tempo (TOTP) -L'AFM SSH può anche essere configurata utilizzando TOTP. DigitalOcean ha fornito il tutorial "[Come Configurare l'Autenticazione a Più Fattori per SSH su Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Gran parte delle cose dovrebbe essere le stesse indipendentemente dalla distribuzione, tuttavia, i comandi del gestore di pacchetti, come `apt-get`, e i nomi dei pacchetti, potrebbero variare. +L'AFM SSH può anche essere configurata utilizzando TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Gran parte delle cose dovrebbe essere le stesse indipendentemente dalla distribuzione, tuttavia, i comandi del gestore di pacchetti, come `apt-get`, e i nomi dei pacchetti, potrebbero variare. ### KeePass (e KeePassXC) -I database di KeePass e KeePassXC possono essere protetti utilizzando la Challenge-Response o HOTP come autenticazione di secondo fattore. Yubico ha fornito della documentazione per l'[Utilizzo della tua YubiKey con KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass), nonché un documento sul sito web di [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa). +I database di KeePass e KeePassXC possono essere protetti utilizzando la Challenge-Response o HOTP come autenticazione di secondo fattore. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/it/basics/passwords-overview.md b/i18n/it/basics/passwords-overview.md index ad52a382..00ece23a 100644 --- a/i18n/it/basics/passwords-overview.md +++ b/i18n/it/basics/passwords-overview.md @@ -54,13 +54,13 @@ Per generare una passphrase diceware utilizzando un vero dado, segui questi pass

Nota

-Queste istruzioni presuppongono l'utilizzo del [grande elenco di parole di EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) per generare la passphrase, che richiede cinque lanci di dadi per parola. Altri elenchi di parole potrebbero richiedere maggiori o minori lanci per parola e potrebbero richiedere una quantità di parole differenti, per ottenere la stessa entropia. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Altri elenchi di parole potrebbero richiedere maggiori o minori lanci per parola e potrebbero richiedere una quantità di parole differenti, per ottenere la stessa entropia.
1. Lancia un dado a sei facce per cinque volte, annotando il numero dopo ogni lancio. -2. Ad esempio, supponiamo tu abbia ottenuto `2-5-2-6-6`. Consulta il [grande elenco di parole di EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) per trovare la parola corrispondente a `25266`. +2. Ad esempio, supponiamo tu abbia ottenuto `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. Troverai la parola `encrypt`. Annotala. @@ -75,20 +75,20 @@ Queste istruzioni presuppongono l'utilizzo del [grande elenco di parole di EFF]( Se non hai accesso a dadi reali o preferiresti non utilizzarli, puoi utilizzare il generatore di password integrato del gestore di password, poiché molti di essi offrono l'opzione di generare frasi segrete Diceware, oltre alle password regolari. -Consigliamo di utilizzare il [grande elenco di parole di EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) per generare le tue frasi segrete Diceware, poiché offre la stessa sicurezza dell'elenco originale, contenendo parole più facili da memorizzare. Esistono anche [altri elenchi di parole in lingue differenti](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), se non desideri che la tua frase segreta sia in inglese. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. Esistono anche [altri elenchi di parole in lingue differenti](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), se non desideri che la tua frase segreta sia in inglese.
Spiegazione dell'entropia e della forza delle passphrase diceware -Per dimostrare quanto siano forti le passphrase diceware, useremo la già citata passphrase di sette parole (`viewable fastness reluctant squishy seventeen shown pencil`) ed il [grande elenco di parole EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) come esempio. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. Un parametro per determinare la forza di una passphrase diceware è la sua entropia. L'entropia per parola in una frase segreta Diceware è calcolata come $\text{log}_2(\text{WordsInList})$ e l'entropia complessiva della frase segreta è calcolata come $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Dunque, ogni parola nell'elenco suddetto risulta in circa 12,9 bit di entropia ($\text{log}_2(7776)$), e una frase segreta di sette parole da esso derivaata contiene circa 90,47 bit di entropia ($\text{log}_2(7776^7)$). -L'[EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contiene 7776 parole uniche. Per calcolare la quantità di frasi segrete possibili, tutto ciò che dobbiamo fare è $\text{WordsInList}^\text{WordsInPhrase}$ o, nel nostro caso, $ 7776^7 $. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. Per calcolare la quantità di frasi segrete possibili, tutto ciò che dobbiamo fare è $\text{WordsInList}^\text{WordsInPhrase}$ o, nel nostro caso, $ 7776^7 $. -Mettiamo tutto questo in prospettiva: una passphrase di sette parole che utilizza il [grande elenco di parole EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) è una delle possibili ~1.719.070.799.748.422.500.000.000.000.000 passphrase. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. In media, è necessario tentare il 50% di tutte le combinazioni possibili per indovinare la tua frase segreta. Tenendo ciò a mente, anche se il malintenzionato è capace di circa 1.000.000.000.000 tentativi al secondo, gli ci vorrebbero comunque circa 27.255.689 aanni per indovinare la tua frase segreta. Questo vale solo se le seguenti cose sono vere: diff --git a/i18n/it/basics/vpn-overview.md b/i18n/it/basics/vpn-overview.md index 07b06292..a710bff5 100644 --- a/i18n/it/basics/vpn-overview.md +++ b/i18n/it/basics/vpn-overview.md @@ -69,13 +69,13 @@ Se utilizzi Tor, *probabilmente* faresti meglio a connetterti alla rete Tor tram Non dovresti utilizzare quella funzionalità. Il vantaggio principale dell'utilizzo di Tor è che non devi affidarti al fornitore della tua VPN, il che è negato utilizzando i nodi di Tor ospitati dalla tua VPN, invece di connettersi direttamente a Tor dal proprio computer. -Al momento, Tor supporta soltanto il protocollo TCP. UDP (utilizzato da [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), e altri protocolli), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) e altri pacchetti, saranno rilasciati. Per compensare questa situazione, i fornitori di VPN di solito instradano tutti i pacchetti non-TCP attraverso il loro server VPN (il primo hop). Questo è il caso di [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Inoltre, quando si utilizza questa configurazione di Tor su VPN, non si ha il controllo su altre importanti funzionalità di Tor come [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (utilizzo di un circuito Tor diverso per ogni dominio visitato). +Al momento, Tor supporta soltanto il protocollo TCP. UDP (utilizzato da [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), e altri protocolli), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) e altri pacchetti, saranno rilasciati. Per compensare questa situazione, i fornitori di VPN di solito instradano tutti i pacchetti non-TCP attraverso il loro server VPN (il primo hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). La funzionalità dovrebbe esser vista come un *comodo* metodo per accedere ai servizi nascosti su Tor, non per rimanere anonimi. Per un anonimato adeguato, utilizza [Tor Browser](../tor.md). ## Proprietà delle VPN commerciali -Gran parte dei servizi VPN sono posseduti dalle stesse [poche aziende](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). Queste losche aziende gestiscono molti piccoli servizi VPN per creare l'illusione di avere una maggiore scelta e massimizzare i profitti. Tipicamente, questi fornitori che si nutrono nella propria società di comodo, prevedono politiche sulla privacy terribili e non gli dovrebbe essere affidato il tuo traffico Internet. Dovresti essere molto rigido su quale fornitore decidi di utilizzare. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). Queste losche aziende gestiscono molti piccoli servizi VPN per creare l'illusione di avere una maggiore scelta e massimizzare i profitti. Tipicamente, questi fornitori che si nutrono nella propria società di comodo, prevedono politiche sulla privacy terribili e non gli dovrebbe essere affidato il tuo traffico Internet. Dovresti essere molto rigido su quale fornitore decidi di utilizzare. Dovresti anche essere consapevole del fatto che molti siti di recensioni delle VPN, sono meeri veicoli pubblicitari, aperti al maggior offerente. ==Privacy Guides non riceve denaro consigliando prodotti esterni, e non utilizza mai programmi d'affiliazione.== @@ -111,8 +111,8 @@ Molte dVPN sono utilizzate per spingere una criptovaluta, piuttosto che per offr ## Informazioni correlate alle VPN -- [The Trouble with VPN and Privacy Review Sites (Il problema dei siti di recensioni di VPN e privacy)](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation (Indagine sulle app di VPN gratuite)](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies (Svelati i proprietari segreti delle VPN: 101 prodotti per VPN gestiti da sole 23 aziende)](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions (Questa azienda cinese è segretamente dietro 24 app popolari che cercano autorizzazioni pericolose)](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative (VPN - una narrazione molto precaria)](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) di Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites (Il problema dei siti di recensioni di VPN e privacy)](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation (Indagine sulle app di VPN gratuite)](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies (Svelati i proprietari segreti delle VPN: 101 prodotti per VPN gestiti da sole 23 aziende)](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions (Questa azienda cinese è segretamente dietro 24 app popolari che cercano autorizzazioni pericolose)](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/it/basics/why-privacy-matters.md b/i18n/it/basics/why-privacy-matters.md index 31cfe08f..618dcecd 100644 --- a/i18n/it/basics/why-privacy-matters.md +++ b/i18n/it/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ La privacy dev'essere integrata nei [software e servizi](../tools.md) che utiliz ## Fonti -- [Perchè la Privacy è importante](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) di Neil Richards -- [Il nuovo petrolio: Perchè la privacy e la sicurezza contano](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [Il nuovo petrolio: Perchè la privacy e la sicurezza contano](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants su Anonimato vs Privacy vs Sicurezza](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/it/calendar.md b/i18n/it/calendar.md index faafed94..51175611 100644 --- a/i18n/it/calendar.md +++ b/i18n/it/calendar.md @@ -13,26 +13,26 @@ I calendari contengono alcuni dei tuoi dati più sensibili; utilizza prodotti ch ![Logo di Tuta](assets/img/calendario/tuta.svg){ align=right } -**Tuta** offre un calendario gratuito e criptato su tutte le loro piattaforme supportate. Le funzionalità includono: E2EE automatico di tutti i dati, funzionalità di condivisione, importazione/esportazione, autenticazione a più fattori e [more](https://tuta.com/it/calendar-app-comparison). +**Tuta** offre un calendario gratuito e criptato su tutte le loro piattaforme supportate. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Calendari multipli e funzionalità di condivisione estese sono limitate agli abbonati a pagamento. [:octicons-home-16: Homepage](https://tuta.com/calendar){ .md-button .md-button--primary } -[:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribuisci } +[:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -52,10 +52,10 @@ Calendari multipli e funzionalità di condivisione estese sono limitate agli abb [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Codice sorgente" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/it/cloud.md b/i18n/it/cloud.md index 5eaedf0b..715dd71c 100644 --- a/i18n/it/cloud.md +++ b/i18n/it/cloud.md @@ -56,15 +56,15 @@ I nuovi client mobile di Proton Drive non sono ancora stati controllati pubblica **Tresorit** è un fornitore svizzero-ungherese di archiviazione crittografata su cloud, fondato nel 2011. Tresorit è di proprietà di Swiss Post, il servizio postale nazionale della Svizzera. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } -[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } +[:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ I nuovi client mobile di Proton Drive non sono ancora stati controllati pubblica Tresorit ha ricevuto una serie di controlli di sicurezza indipendenti: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] [Certificato](https://www.certipedia.com/quality_marks/9108644476) di Conformità da TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Test di penetrazione da Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - Questa revisione ha valutato la sicurezza del client web di Tresorit, dell'app Android, dell'applicazione di Windows e della relativa infrastruttura. - Computest ha scoperto due vulnerabilità, successivamente risolte. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Test di Penetrazione da Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - Questa revisione ha analizzato il codice sorgente completo di Tresorit e ha convalidato che l'implementazione corrisponde ai concetti descritti [nel white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf) di Tresorit. - Ernst & Young ha inoltre testato i client web, mobile e desktop: "I risultati dei test non hanno rilevato alcuna deviazione dalle dichiarazioni di Tresorit sulla confidenzialità dei dati." -Hanno anche ricevuto l'Etichetta di Affidabilità Digitale, una certificazione della [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) che richiede il superamento di [35 criteri](https://digitaltrust-label.swiss/criteria/) relativi a sicurezza, privacy e affidabilità. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteri diff --git a/i18n/it/cryptocurrency.md b/i18n/it/cryptocurrency.md index 8615edb1..4c401c05 100644 --- a/i18n/it/cryptocurrency.md +++ b/i18n/it/cryptocurrency.md @@ -24,10 +24,10 @@ Molte, se non la gran parte delle criptovalute sono delle truffe. Effettua atten **Monero** utilizza una blockchain con tecnologie che migliorano la privacy e offuscano le transazioni per ottenere l'anonimato. Ogni transazione di Monero nasconde l'importo della transazione, gli indirizzi di invio e ricezione e la fonte dei fondi senza dover fare i salti mortali, il che la rende una scelta ideale per i neofiti delle criptovalute. -[:octicons-home-16: Home](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ Con Monero, gli osservatori esterni non possono decifrare gli indirizzi che scam Per una privacy ottimale, assicurati di utilizzare un portafoglio non custodiale in cui la chiave di visualizzazione del portafoglio resta sul dispositivo. Ciò significa che soltanto tu potrai spendere i tuoi fondi e visualizzare le transazioni in entrata e in uscita. Se utilizzi un portafoglio custodiale, il fornitore può vedere **tutto** ciò che fai; se utilizzi un portafoglio "leggero" in cui il fornitore conserva la chiave di visualizzazione privata, questi può vedere quasi tutto ciò che fai. Alcuni portafogli non custodiali sono: - [Client ufficiale Monero ](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supporta più criptovalute. Una versione soltanto con Monero del Cake Wallet è disponibile all'indirizzo [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supporta più criptovalute. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) Per ottenere la massima privacy (anche con un portafoglio non custodiale), dovresti operare il tuo nodo di Monero. Utilizzare il nodo di un'altra persona espone loro alcune informazioni, come l'indirizzo IP da cui ti connetti, le marche orarie di sincronizzazione del tuo portafoglio e le transazioni inviate da esso (ma nessun altro dettaglio su tali transazioni). Altrimenti, puoi collegarti a un nodo altrui di Monero, tramite Tor o i2p. -Ad agosto 2021, CipherTrace [ha annunciato](https://ciphertrace.com/enhanced-monero-tracing/) migliori capacità di tracciamento di Monero per le agenzie governative. I post pubblici mostrano che la Rete di Controllo dei Crimini Finanziari del Dipartimento del Tesoro degli USA [ha concesso una licenza ](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) per il "Modulo Monero" di CipherTrace, alla fine del 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. I post pubblici mostrano che la Rete di Controllo dei Crimini Finanziari del Dipartimento del Tesoro degli USA [ha concesso una licenza ](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) per il "Modulo Monero" di CipherTrace, alla fine del 2022. -La privacy del grafico delle transazioni di Monero è limitata da firme ad anello relativamente piccole, soprattutto contro gli attacchi mirati. Anche le funzionalità per la privacy di Monero sono state [discusse](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) da alcuni ricercatori sulla sicurezza e, numerose vulnerabilità severe sono state trovate e corrette in passato, quindi, le affermazioni di organizzazioni come CiperTrace non sono fuori discussione. Sebbene sia improbabile che esistano strumenti di sorveglianza di massa di Monero, come quelli per Bitcoin e altri, è certo che gli strumenti di tracciamento assistano con le indagini mirate. +La privacy del grafico delle transazioni di Monero è limitata da firme ad anello relativamente piccole, soprattutto contro gli attacchi mirati. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. Sebbene sia improbabile che esistano strumenti di sorveglianza di massa di Monero, come quelli per Bitcoin e altri, è certo che gli strumenti di tracciamento assistano con le indagini mirate. Infine, Monero è il contenendente più forte per una criptovaluta rispettosa della privacy, ma le sue affermazioni sulla privacy **non** sono state dimostrate definitivamente, in un modo o nell'altro. Più tempo e ricerca sono necessari per valutare se Monero sia abbastanza resiliente agli attacchi, da fornire sempre una privacy adeguata. diff --git a/i18n/it/data-redaction.md b/i18n/it/data-redaction.md index 131ab69e..9bd287ef 100644 --- a/i18n/it/data-redaction.md +++ b/i18n/it/data-redaction.md @@ -88,12 +88,12 @@ L'applicazione offre diversi modi per cancellare i metadati dalle immagini. Nell **Metapho** è un visualizzatore semplice e pulito per i metadati delle foto, quali data, nome del file, dimensioni, modello della fotocamera, velocità dell'otturatore e posizione. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Informativa sulla Privacy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
-Scarica +Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,16 +107,16 @@ L'applicazione offre diversi modi per cancellare i metadati dalle immagini. Nell **PrivacyBlur** è un'app gratuita che consente di sfocare le parti sensibili delle immagini, prima di condividerle online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106)
diff --git a/i18n/it/desktop-browsers.md b/i18n/it/desktop-browsers.md index 52cba792..b5240a6a 100644 --- a/i18n/it/desktop-browsers.md +++ b/i18n/it/desktop-browsers.md @@ -70,9 +70,9 @@ Invece, se necessiti di navigare anonimamente su Internet, dovresti utilizzare [ **Mullvad Browser** è una versione di [Tor Browser](tor.md#tor-browser) con le integrazioni della rete Tor rimosse, con l'obiettivo di fornire le tecnologie anti-fingerprinting di Tor Browser agli utenti che usano una VPN. Sviluppato dal Tor Project e distribuito da [Mullvad](vpn.md#mullvad), **non** richiede l'utilizzo della VPN di Mullvad. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentazione} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Codice sorgente" } +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
Scarica @@ -85,7 +85,7 @@ Invece, se necessiti di navigare anonimamente su Internet, dovresti utilizzare [ -Come [Tor Browser](tor.md), Mullvad Browser è progettato per impedire il fingerprinting, rendendo l'impronta digitale del tuo browser identica a quella di tutti gli altri suoi utenti, e include impostazioni ed estensioni predefinite, configurate automaticamente dai livelli di sicurezza predefiniti: *Standard*, *Safer* e *Safest*. Dunque, è essenziale che tu non modifichi affatto il browser, tranne che per regolare i [livelli di sicurezza](https://tb-manual.torproject.org/security-settings/) predefiniti. Altre modifiche renderebbero la tua impronta digitale univoca, vanificando lo scopo di utilizzare tale browser. Se desideri configurare il tuo browser in modo più completo e il fingerprinting non ti preoccupa, consigliamo invece [Firefox](#firefox). +Come [Tor Browser](tor.md), Mullvad Browser è progettato per impedire il fingerprinting, rendendo l'impronta digitale del tuo browser identica a quella di tutti gli altri suoi utenti, e include impostazioni ed estensioni predefinite, configurate automaticamente dai livelli di sicurezza predefiniti: *Standard*, *Safer* e *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Altre modifiche renderebbero la tua impronta digitale univoca, vanificando lo scopo di utilizzare tale browser. Se desideri configurare il tuo browser in modo più completo e il fingerprinting non ti preoccupa, consigliamo invece [Firefox](#firefox). ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser integra DuckDuckGo come [motore di ricerca](search-engines.md) p **Firefox** offre robuste impostazioni di privacy, come la [protezione antitracciamento avanzata](https://support.mozilla.org/it/kb/protezione-antitracciamento-avanzata-firefox-desktop), che aiuta a bloccare varie [tipologie di tracciamento](https://support.mozilla.org/it/kb/protezione-antitracciamento-avanzata-firefox-desktop#w_che-cosa-viene-bloccato-con-la-protezione-antitracciamento-avanzata). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentazione} -[:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribuisci } +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} +[:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
-Scarica +Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser integra DuckDuckGo come [motore di ricerca](search-engines.md) p

Avviso

-Firefox include un [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) unico nei download dal sito web di Mozilla e utilizza la telemetria di Firefox per inviare il token. Il token **non** è incluso nelle versioni di [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox include un [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) unico nei download dal sito web di Mozilla e utilizza la telemetria di Firefox per inviare il token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Questo ti protegge bloccando i tracciatori dei social, gli script di fingerprint ##### Firefox Suggest (solo USA) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) è una funzionalità simile ai suggerimenti di ricerca, disponibile soltanto negli USA. Consigliamo di disabilitarla per le stesse motivazioni per cui consigliamo di disabilitare i suggerimenti di ricerca. Se non vedi queste opzioni sotto l'intestazione della **Barra degli Indirizzi**, non disponi della nuova esperienza e puoi ignorare tali modifiche. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. Consigliamo di disabilitarla per le stesse motivazioni per cui consigliamo di disabilitare i suggerimenti di ricerca. Se non vedi queste opzioni sotto l'intestazione della **Barra degli Indirizzi**, non disponi della nuova esperienza e puoi ignorare tali modifiche. - [ ] Rimuovi la spunta **Suggestions from the web** - [ ] Rimuovi la spunta da **Suggestions from sponsors** @@ -183,7 +183,7 @@ Ciò ti protegge dai cookie persistenti, ma non da quelli acquisiti durante ogni > Firefox ci invia i dati sulla tua versione e lingua di Firefox; sistema operativo del dispositivo e configurazione hardware; memoria, informazioni essenziali su arresti anomali ed errori; risultati di processi automatizzati quali aggiornamenti, navigazione sicura e attivazione. Quando Firefox ci invia i dati, il tuo indirizzo IP è raccolto temporaneamente come parte dei registri del nostro server. -Inoltre, il servizio Firefox Accounts raccoglie [alcuni dati tecnici](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). Se utilizzi un Profilo di Firefox, puoi disattivarlo: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). Se utilizzi un Profilo di Firefox, puoi disattivarlo: 1. Apri le [impostazioni del tuo profilo su accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Deseleziona ** Raccolta e utilizzo dati ** > **Aiutaci a migliorare gli ⁨account Firefox⁩** @@ -204,7 +204,7 @@ La Protezione Massima impone l'utilizzo di DNS su HTTPS; un avviso di sicurezza #### Sincronizzazione -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) consente ai tuoi dati di navigazione (cronologia, segnalibri, etc.) di essere accessibili su tutti i tuoi dispositivi e di proteggerli con E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (avanzato) @@ -215,7 +215,7 @@ La Protezione Massima impone l'utilizzo di DNS su HTTPS; un avviso di sicurezza -Il [progetto Arkenfox](https://github.com/arkenfox/user.js) fornisce una serie di opzioni attentamente selezionate per Firefox. Se [decidi](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) di utilizzarlo, [alcune opzioni](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) sono soggettivamente più stringenti di altre e/o potrrebbero causare il malfunzionamento di alcuni siti web, [che puoi modificare facilmente](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) affinché si adeguino alle tue esigenze. **Consigliamo vivamente** di leggere la loro [wiki](https://github.com/arkenfox/user.js/wiki) completa. Inoltre, Arkenfox consente il supporto ai [contenitori](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users). +Il [progetto Arkenfox](https://github.com/arkenfox/user.js) fornisce una serie di opzioni attentamente selezionate per Firefox. Se [decidi](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) di utilizzarlo, [alcune opzioni](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) sono soggettivamente più stringenti di altre e/o potrrebbero causare il malfunzionamento di alcuni siti web, [che puoi modificare facilmente](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) affinché si adeguino alle tue esigenze. **Consigliamo vivamente** di leggere la loro [wiki](https://github.com/arkenfox/user.js/wiki) completa. Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox mira soltanto a contrastare gli script di tracciamento di base o semplici, tramite la casualizzazione dei canva e le impostazioni di configurazione della resistenza al fingerprint integrata di Firefox. Non mira a confondere il tuo browser con una grande folla di altri utenti di Arkenfox come Mullvad Browser o Tor Browser, che è il solo modo per contrastare gli script di tracciamento di fingerprint avanzati. Ricordati che puoi sempre utilizzare più browser, ad esempio, potresti considerare di utilizzare Firefox+Arkenfox per alcuni siti cui desideri rimanere connesso o, altrimenti fidarti, e Mullvad Browser per la navigazione generale. @@ -225,23 +225,23 @@ Arkenfox mira soltanto a contrastare gli script di tracciamento di base o sempli ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** include un blocco di contenuti integrato e delle [funzionalità per la privacy](https://brave.com/privacy-features/), molte delle quali sono abilitate di default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave è basato sul progetto del browser web di Chromium, quindi, dovrebbe risultare familiare e avere problemi minimi di compatibilità con i siti web. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } -[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Servizio Onion" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ Queste opzioni si possono trovare in :material-menu: → **Impostazioni**. ##### Shields -Brave include alcune misure contro il fingerprinting nella sua funzionalità [Protezioni](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Consigliamo di configurarle [globalmente](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) tra tutte le pagine che visiti. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Le opzioni di Protezioni sono regolabili per ogni sito ma consigliamo di impostarle di default come segue: @@ -290,23 +290,23 @@ Brave consente di selezionare filtri aggiuntivi per i contenuti nella pagina int -1. Quest'opzione fornisce una funzionalità simile alle [modalità di blocco](https://github.com/gorhill/uBlock/wiki/Blocking-mode) avanzate di uBlock Origin o all'estensione [NoScript](https://noscript.net/). +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. Se desideri mantenere l'accesso in un particolare sito che visiti spesso, puoi selezionare le eccezioni per ogni sito cliccando sull'icona dello scudo sulla barra degli indirizzi. ##### Privacy e sicurezza
-- [x] Seleziona **Disabilita UDP senza proxy** in [Gestione politica IP WebRTC](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) -- [ ] Rimuovi la spunta da **Utilizza i servizi Google per la messaggistica push** -- [ ] Rimuovi la spunta da **Acconsenti all'analisi dei prodotti di tutela della privacy (P3A).** -- [ ] Rimuovi la spunta da **Invia automaticamente un ping di utilizzo giornaliero a Brave** -- [ ] Rimuovi la spunta da **Invia automaticamente i rapporti di diagnostica** -- [ ] Rimuovi la spunta da **Finestra in Incognito con Tor** (1) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Use Google services for push messaging** +- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** +- [ ] Uncheck **Automatically send daily usage ping to Brave** +- [ ] Uncheck **Automatically send diagnostic reports** +- [ ] Uncheck **Private window with Tor** (1)
-1. Brave **non è** resistente al fingerprinting come il Tor Browser e molte meno persone utilizzano Brave con Tor, facendoti quindi distinguere. Quando [è necessario un forte anonimato](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) utilizzare il [Tor Browser](tor.md#tor-browser). +1. Brave **non è** resistente al fingerprinting come il Tor Browser e molte meno persone utilizzano Brave con Tor, facendoti quindi distinguere. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizzazione alla chiusura

@@ -343,7 +343,7 @@ Le funzionalità Web3 di Brave possono potenzialmente aumentare il fingerprint d #### Sincronizzazione -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) consente ai tuoi dati di navigazione (cronologia, segnalibri, etc.) di essere accessibili su tutti i tuoi dispositivi, senza richiedere un profilo e li protegge con E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Ricompense e Portafoglio di Brave @@ -369,9 +369,9 @@ In generale, consigliamo di mantenere al minimo le estensioni del tuo browser pe [:octicons-code-16:](https://github.com/gorhill/uBlock){ .card-link title="Codice sorgente" }
-Scarica +Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -406,9 +406,9 @@ uBlock Origin ha anche una versione "Lite" dell'estensione, che offre un set di [:octicons-code-16:](https://github.com/gorhill/uBlock/tree/master/platform/mv3){ .card-link title="Codice sorgente" }
-Scarica +Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ Stiamo lavorando per stabilire i criteri definiti per ogni sezione del nostro si - È disponibile su Linux, macOS e Windows. - Qualsiasi modifica necessaria per rendere il browser più rispettoso della privacy non dovrebbe influenzare negativamente l'esperienza degli utenti. - Blocca i cookie di terze parti di default. -- Supporta la [partizione dello stato](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) per mitigare il tracciamento tra siti.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Miglior Caso I nostri criteri ottimali rappresentano ciò che vorremmo vedere dal progetto perfetto in questa categoria. I nostri consigli potrebbero non includere alcuna o tutte queste funzionalità, ma quelli che le presentano, potrebbero essere meglio classificati di altri su questa pagina. - Include una funzionalità di blocco dei contenuti integrati. -- Supporta la compartimentazione dei cookie (come nei [Contenitori a Profilo Multiplo](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supporta le Applicazioni Web Progressive (PWA). Le PWA consentono di installare determinati siti web come se fossero applicazioni native sul computer. Ciò può comportare vantaggi rispetto all'installazione di app basate su Electron, poiché benefici degli aggiornamenti di sicurezza regolari del tuo browser. - Non include funzionalità aggiuntive (bloatware) che non influiscono sulla privacy dell'utente. - Non raccoglie la telemetria di default. @@ -462,4 +462,4 @@ I nostri criteri ottimali rappresentano ciò che vorremmo vedere dal progetto pe - Deve influenzare direttamente la privacy dell'utente, cioè non deve semplicemente fornire informazioni. [^1]: uBlock Origin Lite *stesso* non consumerà risorse, perché utilizza API più recenti che permettono al browser di elaborare le liste di filtri in modo nativo, invece di eseguire codice JavaScript all'interno dell'estensione per gestire il filtraggio. Tuttavia, questo vantaggio in termini di risorse è solo [teorico](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), perché è possibile che il codice di filtraggio di uBlock Origin standard sia più efficiente del codice di filtraggio nativo del tuo browser. Ciò non è stato ancora sottoposto a benchmark. -[^2]: L'implementazione di Brave è descritta nei dettagli su [Aggiornamenti sulla Privacy di Brave: Partizionamento dello stato di rete per la privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/it/desktop.md b/i18n/it/desktop.md index 3bb2f30e..5781e2d1 100644 --- a/i18n/it/desktop.md +++ b/i18n/it/desktop.md @@ -17,17 +17,17 @@ Le distribuzioni di Linux sono comunemente consigliate per la protezione della p ![Logo Fedora](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** è la nostra distribuzione consigliata per chi si avvicina per la prima volta a Linux. Generalmente, Fedora, adotta le tecnologie più recenti prima delle altre distribuzioni, ad esempio, [Wayland](https://wayland.freedesktop.org/) e [PipeWire](https://pipewire.org). Queste, spesso, comportano miglioramenti alla sicurezza, privacy e utilizzabilità, in generale. +**Fedora Workstation** è la nostra distribuzione consigliata per chi si avvicina per la prima volta a Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). Queste, spesso, comportano miglioramenti alla sicurezza, privacy e utilizzabilità, in generale. -[:octicons-home-16: Home](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentazione} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora ha un ciclo di rilascio semi continuo. Mentre alcuni pacchetti come [GNOME](https://www.gnome.org) sono ibernati fino alla versione successiva di Fedora, gran parte di essi (incluso il kernel) sono aggiornati frequentemente durante il ciclo di vita della versione. Ogni versione di Fedora è supportata per un anno, con una nuova versione rilasciata ogni 6 mesi. +Fedora ha un ciclo di rilascio semi continuo. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Ogni versione di Fedora è supportata per un anno, con una nuova versione rilasciata ogni 6 mesi. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora ha un ciclo di rilascio semi continuo. Mentre alcuni pacchetti come [GNOM **openSUSE Tumbleweed** è una distribuzione stabile a rilascio continuo. -openSUSE Tumbleweed dispone di un sistema di [aggiornamenti "transazionali"](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) che utilizza [Btrfs](https://it.wikipedia.org/wiki/Btrfs) e [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) per garantire che le istantanee possano essere ripristinate in caso di problemi. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Home](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentazione} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed segue un modello di rilascio continuo in cui ogni aggiornamento è ri **Arch Linux** è una distribuzione leggera e fai-da-te, il che significa che ottieni soltanto ciò che installi. Per ulteriori informazioni visita le loro [Domande Frequenti](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Home](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentazione} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute }
@@ -83,22 +83,22 @@ Gran parte dei [pacchetti di Arch Linux](https://reproducible.archlinux.org) son I **Fedora Atomic Desktops** sono varianti di Fedora che utilizzano il gestore di pacchetti `rpm-ostree` e sono fortemente incentrati sui flussi di lavoro containerizzati e su Flatpak per le applicazioni desktop. Tutte queste varianti seguono lo stesso programma di rilascio di Fedora Workstation, beneficiando degli stessi aggiornamenti veloci e restando molto vicine alla versione a monte. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-I [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) sono disponibili in diverse versioni a seconda dell'ambiente desktop preferito, come **Fedora Silverblue** (che viene fornito con [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (che viene fornito con [KDE](https://kde.org/)), **Fedora Sway Atomic**, o **Fedora Budgie Atomic**. Tuttavia, non consigliamo quest'ultimo come ambiente desktop Budgie [richiede ancora X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. Tuttavia, non consigliamo quest'ultimo come ambiente desktop Budgie [richiede ancora X11](https://buddiesofbudgie.org/blog/wayland). -Questi sistemi operativi differiscono da Fedora Workstation perché sostituiscono il gestore di pacchetti [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) con un'alternativa molto più avanzata chiamata [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). Il gestore dei pacchetti `rpm-ostree` funziona scaricando un'immagine di base per il sistema, poi sovrapponendo i pacchetti su di esso in un [git](https://en.wikipedia.org/wiki/Git)-come albero di commit. Quando il sistema viene aggiornato, viene scaricata una nuova immagine di base e le sovrapposizioni sono applicate a questa nuova immagine. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). Il gestore dei pacchetti `rpm-ostree` funziona scaricando un'immagine di base per il sistema, poi sovrapponendo i pacchetti su di esso in un [git](https://en.wikipedia.org/wiki/Git)-come albero di commit. Quando il sistema viene aggiornato, viene scaricata una nuova immagine di base e le sovrapposizioni sono applicate a questa nuova immagine. Al termine dell'aggiornamento, il sistema sarà riavviato nella nuova versione. `rpm-ostree` mantiene due versioni del sistema, così da poter facilmente essere ripristinato, se qualcosa si rompe nella nuova distribuzione. È inoltre possibile aggiungere più versioni in base alle necessità. -[Flatpak](https://www.flatpak.org) è il metodo principale di installazione dei pacchetti su queste distribuzioni, in quanto `rpm-ostree` è pensato solo per sovrapporre all'immagine di base i pacchetti che non possono stare all'interno di un contenitore. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -Come alternativa ai Flatpaks, esiste l'opzione di [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) per creare contenitori [Podman](https://podman.io) con una cartella home condivisa con il sistema operativo dell'host che imita un ambiente tradizionale di Fedora, un [caratteristica utile](https://containertoolbx.org) per gli sviluppatori esigenti. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,9 +108,9 @@ Come alternativa ai Flatpaks, esiste l'opzione di [Toolbox](https://docs.fedorap NixOS è una distribuzione indipendente basata sul gestore di pacchetti Nix, incentrata sulla riproducibilità e l'affidabilità. -[:octicons-home-16: Home](https://nixos.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentazione} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix è un gestore di pacchetti basato sul codice sorgente; se non ne esiste alcu **Whonix** si basa su [Kicksecure](#kicksecure), una biforcazione incentrata sulla sicurezza di Debian. Mira a fornire privacy, sicurezza e anonimato su Internet. Whonix è meglio utilizzato insieme a [Qubes OS](#qubes-os). -[:octicons-home-16: Home](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Servizio Onion" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentazione} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix è un gestore di pacchetti basato sul codice sorgente; se non ne esiste alcu Whonix è pensato per operare come due macchine virtuali: una "Workstation" e un "Gateway" di Tor Tutte le comunicazioni dalla Workstation devono passare per il gateway di Tor. Ciò significa che, anche se la Workstation fosse compromessa da un malware di qualche tipo, il vero indirizzo IP rimarrebbe nascosto. -Alcune delle sue caratteristiche includono Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [swap crittografato](https://github.com/Whonix/swap-file-creator)e un allocatore di memoria protetto. Le versioni future di Whonix includeranno probabilmente le [politiche di sistema complete di AppArmor](https://github.com/Whonix/apparmor-profile-everything) e un [launcher di app sandbox](https://www.whonix.org/wiki/Sandbox-app-launcher), per confinare interamente tutti i processi sul sistema. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix è utilizzato al meglio [in combinazione con Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). Abbiamo una [guida di consigli](os/qubes-overview.md#connecting-to-tor-via-a-vpn) sulla configurazione di Whonix in combinazione con un ProxyVM della VPN su Qubes, per nascondere le tue attività di Tor dal tuo ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). Abbiamo una [guida di consigli](os/qubes-overview.md#connecting-to-tor-via-a-vpn) sulla configurazione di Whonix in combinazione con un ProxyVM della VPN su Qubes, per nascondere le tue attività di Tor dal tuo ISP. ### Tails @@ -159,9 +159,9 @@ Whonix è utilizzato al meglio [in combinazione con Qubes](https://www.whonix.or **Tails** è un sistema operativo live basato su Debian che instrada tutte le comunicazioni attraverso Tor, che può essere avviato su quasi tutti i computer da un'installazione su DVD, chiavetta USB o scheda SD. Utilizza [Tor](tor.md) per preservare la privacy e l'anonimato, aggirando la censura e non lasciando traccia di sé sul computer utilizzato, una volta spento. -[:octicons-home-16: Home](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentazione} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails è ottimo per contrastare le "ricerche forensi" grazie "all'amnesia" (nel Tails include di default [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser, il che potrebbe semplificare, per gli avversari, il fingerprinting dei suoi utenti. Le macchine virtuali di [Whonix](desktop.md#whonix) potrebbero essere maggiormente a prova di fuga, tuttavia, non sono amnesiche, il che significa che i dati potrebbero essere recuperati dal tuo dispositivo d'archiviazione. -Di design, Tails dovrebbe resettarsi completamente dopo ogni riavvio. L'[archiviazione persistente](https://tails.boum.org/doc/persistent_storage/index.en.html) è configurabile per memorizzare alcuni dati tra i riavvii. +Di design, Tails dovrebbe resettarsi completamente dopo ogni riavvio. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Distribuzioni incentrate sulla sicurezza @@ -190,12 +190,12 @@ Di design, Tails dovrebbe resettarsi completamente dopo ogni riavvio. L'[archivi **Qubes OS** è un sistema operativo open-source progettato per fornire una forte sicurezza per i computer desktop attraverso macchine virtuali sicure (o "qube"). Qubes si basa su Xen, X Window System e Linux. Può eseguire la maggior parte delle applicazioni Linux e utilizzare la maggior parte dei driver Linux. -[:octicons-home-16: Home](https://www.qubes-os.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Servizio Onion" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Codice Sorgente" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentazione } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ Sebbene [sconsigliamo](os/linux-overview.md#release-cycle) le distribuzioni "per **Kicksecure**, in breve, consiste in una serie di script, configurazioni e pacchetti che riducono sostanzialmente la superficie di attacco di Debian. Copre di default molti dei consigli sulla privacy e la sicurezza. Inoltre, serve da OS di base per [Whonix](#whonix). -[:octicons-home-16: Home](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentazione } -[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/it/device-integrity.md b/i18n/it/device-integrity.md index fa6200d9..5519404a 100644 --- a/i18n/it/device-integrity.md +++ b/i18n/it/device-integrity.md @@ -26,7 +26,7 @@ Ciò significa che un aggressore dovrebbe reinfettare regolarmente il dispositiv Se uno dei seguenti strumenti indica una potenziale compromissione da parte di spyware come Pegasus, Predator o KingsPawn, consigliamo di contattare: -- Se ti occupi della difesa dei diritti umani, di giornalismo o fai parte di un'organizzazione della società civile: [Laboratorio sulla sicurezza di Amnesty International](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - Se un dispositivo aziendale o governativo è compromesso: contatta il responsabile della sicurezza della tua azienda, dipartimento o agenzia - Forze dell'ordine locali @@ -54,7 +54,7 @@ Gli indicatori pubblici di compromissione non sono sufficienti a determinare che Un supporto e triage forense digitale affidabile e completo, richiedono l'accesso a indicatori, ricerca e informazioni sulle minacce non pubblici. -Tale supporto è disponibile per società civili attraverso il [Security Lab di Amnesty International] (https\://www\.amnesty.org/en/tech/) o la [Digital Security Helpline di Access Now] (https\://www\.accessnow\.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ Questi strumenti possono causare dei falsi positivi. Se uno di questi strumenti ![Logo MVT](assets/img/device-integrity/mvt.webp){ align=right } -Il **Mobile Verification Toolkit** (**MVT**) è una raccolta di utility che semplifica e automatizza il processo di scansione dei dispositivi mobile alla ricerca di potenziali tracce di bersaglio o di infezione da parte di campagne spyware note. MVT è stato sviluppato da Amnesty International e rilasciato nel 2021 nel contesto del [Progetto Pegasus](https://forbiddenstories.org/about-the-pegasus-project/). +Il **Mobile Verification Toolkit** (**MVT**) è una raccolta di utility che semplifica e automatizza il processo di scansione dei dispositivi mobile alla ricerca di potenziali tracce di bersaglio o di infezione da parte di campagne spyware note. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } -[:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Codice Sorgente" } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } +[:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Download -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,9 +110,9 @@ MVT ti consente di eseguire scansioni/analisi più approfondite, se il tuo dispo **iMazing** fornisce uno strumento di analisi spyware gratuito per dispositivi iOS che funge da interfaccia grafica per [MVT](#mobile-verification-toolkit). Questo può essere molto più semplice da eseguire rispetto allo stesso MVT, che è uno strumento a riga di comando progettato per tecnologi e investigatori forensi. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation}
Download @@ -167,7 +167,7 @@ Auditor non è uno strumento di scansione/analisi come altri elencati su questa Auditor esegue l'attestazione e il rilevamento delle intrusioni con **due** dispositivi, un **controllato** (il dispositivo da verificare) e un **controllore** (il dispositivo che esegue la verifica). Il controllore può essere qualsiasi dispositivo con Android 10+ (o un servizio web da remoto operato da [GrapheneOS](android.md#grapheneos)), mentre il controllato dev'essere, nello specifico, un [dispositivo supportato](https://attestation.app/about#device-support). Auditor opera: -- Utilizzando un modello di [Fiducia al primo uso (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) tra un _controllore_ e un _controllato_; la coppia stabilisce una chiave privata nel [keystore supportato dal hardware](https://source.android.com/docs/security/features/keystore?hl=it) del _Controllore_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - Il _controllore_ può essere un'altra istanza dell'app di Auditor o il [Servizio di Attestazione da Remoto](https://attestation.app). - Il _controllore_ registra lo stato corrente e la configurazione del _controllato_. - Dovesse verificarsi la manomissione del sistema operativo del _controllato_ dopo il completamento dell'associazione, il controllore sarà a conoscenza del cambiamento nello stato e nelle configurazioni del dispositivo. @@ -207,13 +207,13 @@ L'utilizzo di queste app non è sufficiente per determinare che un dispositivo s
Download -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia è particolarmente abile nel rilevare gli stalkerware più comuni: se sospetti di esserne vittima, dovresti [visitare questa pagina](https://stopstalkerware.org/information-for-survivors/) per ricevere consigli a riguardo. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia è particolarmente abile nel rilevare gli stalkerware più comuni: se so **iVerify** è un'applicazione per iOS che esegue una scansione automatica del dispositivo per verificare le impostazioni di configurazione, il livello delle patch e altre aree di sicurezza. Inoltre, controlla il dispositivo alla ricerca di indicatori di compromissione da parte di strumenti di jailbreak o spyware come Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Download -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/it/dns.md b/i18n/it/dns.md index a6960873..94a3d32d 100644 --- a/i18n/it/dns.md +++ b/i18n/it/dns.md @@ -11,14 +11,14 @@ I DNS crittografati con server di terze parti dovrebbero essere utilizzati solta ## Fornitori consigliati -| Fornitore DNS | Politica sulla Privacy | Protocolli | Registrazione | ECS | Filtraggio | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | --------------- | ----------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Parziale[^1] | Sì | Secondo la configurazione personale. L'elenco dei filtri utilizzati è disponibile qui. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Parziale[^2] | No | Secondo la configurazione personale. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Facoltativa[^3] | No | Secondo la configurazione personale. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Secondo la configurazione personale. L'elenco dei filtri utilizzati è disponibile qui. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Facoltativa[^5] | Facoltativa | Secondo la configurazione personale. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Parziale[^6] | Facoltativa | Secondo la configurazione personale, blocco dei malware predefinito. | +| Fornitore DNS | Politica sulla Privacy | Protocolli | Registrazione | ECS | Filtraggio | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | --------------- | ----------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Parziale[^1] | Sì | Secondo la configurazione personale. L'elenco dei filtri utilizzati è disponibile qui. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Parziale[^2] | No | Secondo la configurazione personale. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Facoltativa[^3] | No | Secondo la configurazione personale. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | No[^4] | No | Secondo la configurazione personale. L'elenco dei filtri utilizzati è disponibile qui. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Facoltativa[^5] | Facoltativa | Secondo la configurazione personale. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Parziale[^6] | Facoltativa | Secondo la configurazione personale, blocco dei malware predefinito. | ### Criteri @@ -50,7 +50,7 @@ Dopo l'installazione di un profilo di configurazione o di un'app che utilizza l' #### Profili firmati -Apple non fornisce un'interfaccia nativa per la creazione di profili DNS crittografati. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) è uno strumento non ufficiale per creare i propri profili DNS crittografati, tuttavia, non saranno firmati. I profili firmati sono da preferire; la firma convalida l'origine di un profilo e contribuisce a garantire l'integrità. Un'etichetta verde "Verificato" è data ai profili di configurazione firmati. Per ulteriori informazioni sulla firma del codice, consulta [Informazioni sulla firma del codice](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **I profili firmati** sono offerti da [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io) e [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple non fornisce un'interfaccia nativa per la creazione di profili DNS crittografati. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) è uno strumento non ufficiale per creare i propri profili DNS crittografati, tuttavia, non saranno firmati. I profili firmati sono da preferire; la firma convalida l'origine di un profilo e contribuisce a garantire l'integrità. Un'etichetta verde "Verificato" è data ai profili di configurazione firmati. Per ulteriori informazioni sulla firma del codice, consulta [Informazioni sulla firma del codice](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -73,9 +73,9 @@ I software proxy per il DNS crittografato forniscono un proxy locale a cui inolt **RethinkDNS** è un client Android open-source che supporta [DNS-over-HTTPS](advanced/dns-overview.md#dns-over-https-doh), [DNS-over-TLS](advanced/dns-overview.md#dns-over-tls-dot), [DNSCrypt](advanced/dns-overview.md#dnscrypt) e DNS Proxy, oltre a memorizzare nella cache le risposte DNS, registrare localmente le richieste DNS, nonché utilizzabile come firewall. [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Codice sorgente" } +[:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
Scarica @@ -123,9 +123,9 @@ Una soluzione DNS self-hosted è utile per fornire il filtraggio su piattaforme
-![Logo di AdGuard Home](assets/img/dns/adguard-home.svg){ align=right } +![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** è un [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) open source che utilizza il [filtraggio DNS](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) per bloccare i contenuti web indesiderati, come le inserzioni. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home dispone di un'interfaccia web raffinata per visualizzare i dettagli e gestire i contenuti bloccati. @@ -142,25 +142,25 @@ AdGuard Home dispone di un'interfaccia web raffinata per visualizzare i dettagli
-![Logo di Pi-hole](assets/img/dns/pi-hole.svg){ align=right } +![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** è un [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) open source che utilizza il [filtraggio DNS](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) per bloccare i contenuti web indesiderati, come le inserzioni. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole è stato progettato per essere ospitato su un Raspberry Pi, ma non si limita a tale hardware. Il software dispone di un'interfaccia web intuitiva per visualizzare i dettagli e gestire i contenuti bloccati. -[:octicons-home-16: Home](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
[^1]: AdGuard memorizza le statistiche aggregate sulle prestazioni dei propri server DNS, ossia il numero di richieste complete a un server in particolare, il numero di richieste bloccate e la velocità d'elaborazione delle richieste. Inoltre, conserva e memorizza il database dei domini richiesti nelle ultime 24 ore. "Necessitiamo di queste informazioni per identificare e bloccare i nuovi tracciatori e minacce." "Inoltre, registriamo quante volte un tracciatore è stato bloccato. Necessitiamo di queste informazioni per rimuovere le regole obsolete dai nostri filtri." [https://adguard.com/it/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare raccoglie e memorizza soltanto i dati limitati delle richieste DNS inviate al risolutore 1.1.1.1. Il servizio del risolutore 1.1.1.1 non registra i dati personali e, gran parte dei dati delle richieste limitate e non personalmente identificabili, sono memorizzati soltanto per 25 ore. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare raccoglie e memorizza soltanto i dati limitati delle richieste DNS inviate al risolutore 1.1.1.1. Il servizio del risolutore 1.1.1.1 non registra i dati personali e, gran parte dei dati delle richieste limitate e non personalmente identificabili, sono memorizzati soltanto per 25 ore. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D registra soltanto i risolutori Premium con profili DNS personalizzati. I risolutori gratuiti non registrano dati. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Il servizio DNS di Mullvad è disponibile per tutti, abbonati a Mullvad VPN e non. La loro politica sulla privacy dichiara esplicitamente che non registrano in alcun modo le richieste DNS. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Il servizio DNS di Mullvad è disponibile per tutti, abbonati a Mullvad VPN e non. La loro politica sulla privacy dichiara esplicitamente che non registrano in alcun modo le richieste DNS. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS è in grado di fornire funzioni di approfondimento e di logging su base opt-out. Puoi decidere il tempo di conservazione e la posizione dell'archivio per tutti i dati che decidi di registrare. A meno che non sia richiesto specificamente, nessun dato viene registrato. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 raccoglie alcuni dati per monitorare e rispondere a eventuali minacce. Tali dati potrebbero essere poi rimescolati e condivisi, ad esempio ai fini della ricerca sulla sicurezza. Quad9 non raccoglie o registra gli indirizzi IP o qualsiasi altro dato ritenuto personalmente identificabile. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 raccoglie alcuni dati per monitorare e rispondere a eventuali minacce. Tali dati potrebbero essere poi rimescolati e condivisi, ad esempio ai fini della ricerca sulla sicurezza. Quad9 non raccoglie o registra gli indirizzi IP o qualsiasi altro dato ritenuto personalmente identificabile. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/it/email-clients.md b/i18n/it/email-clients.md index 6be004af..193fb302 100644 --- a/i18n/it/email-clients.md +++ b/i18n/it/email-clients.md @@ -28,17 +28,17 @@ OpenPGP non supporta inoltre la [forward secrecy](https://en.wikipedia.org/wiki/ **Thunderbird** è un client di posta elettronica, newsgroup, news feed e chat (XMPP, IRC, Matrix) gratuito, open-source e multipiattaforma, sviluppato dalla communityThunderbird e precedentemente dalla Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentazione} -[:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} +[:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
-Scarica +Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -74,9 +74,9 @@ Queste opzioni si trovano in :material-menu: → **Impostazioni** → **Privacy **Apple Mail** è incluso in macOS ed è estendibile per supportare OpenPGP con [GPG Suite](encryption.md#gpg-suite), che aggiunge la possibilità di inviare email crittografate in PGP. -[:octicons-home-16: Home](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation}
@@ -93,8 +93,8 @@ Apple Mail può caricare i contenuti da remoto in background o bloccarli interam **Canary Mail** è un client email a pagamento progettato per semplificare la crittografia end-to-end con funzionaalità di sicurezza come il blocco biometrico dell'app. [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentazione} +[:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Scarica @@ -125,10 +125,10 @@ Canary Mail è closed-source. Lo consigliamo a causa di alcune scelte per i clie **FairEmail** è un'app di email minimale e open source che utilizza gli standard apeerti (IMAP, SMTP, OpenPGP), con un basso consumo di dati e batteria. [:octicons-home-16: Homepage](https://email.faircode.eu){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribuisci } +[:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Scarica @@ -146,13 +146,13 @@ Canary Mail è closed-source. Lo consigliamo a causa di alcune scelte per i clie ![Logo di Evolution](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** è un'applicazione per la gestione delle informazioni personali che fornisce funzionalità integrate di email, calendario e rubrica. Evolution dispone di un'ampia [documentazione](https://help.gnome.org/users/evolution/stable/) per aiutarti a iniziare. +**Evolution** è un'applicazione per la gestione delle informazioni personali che fornisce funzionalità integrate di email, calendario e rubrica. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } -[:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentazione} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribuisci } +[:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Scarica @@ -174,10 +174,10 @@ Canary Mail è closed-source. Lo consigliamo a causa di alcune scelte per i clie In futuro, K-9 Mail sarà il client [ufficiale](https://k9mail.app/2022/06/13/K-9-Mail-and-Thunderbird.html) di Thunderbird per Android. [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribuisci } +[:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } +[:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute }
Scarica @@ -205,10 +205,10 @@ Rispondendo a qualcuno in una mailing list, l'opzione "rispondi" potrebbe includ **Kontact** è un'applicazione di gestione delle informazioni personali (PIM), dal progetto [KDE](https://dke.org). Fornisce un client email, rubrica, un'agenda e un client RSS. [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentazione} -[:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribuisci } +[:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} +[:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Scarica @@ -228,10 +228,10 @@ Rispondendo a qualcuno in una mailing list, l'opzione "rispondi" potrebbe includ **Mailvelope** è un'estensione del browser che consente lo scambio di email crittografate secondo lo standard di crittografia OpenPGP. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" }
Scarica @@ -255,9 +255,9 @@ Rispondendo a qualcuno in una mailing list, l'opzione "rispondi" potrebbe includ NeoMutt è un client basato su testo con una curva d'apprendimento molto rapida. Tuttavia, è molto personalizzabile. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Codice sorgente"} -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribuisci } +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Scarica diff --git a/i18n/it/email.md b/i18n/it/email.md index d3f744eb..8911a7b4 100644 --- a/i18n/it/email.md +++ b/i18n/it/email.md @@ -52,10 +52,10 @@ Inoltre, OpenPGP non supporta la Forward Secrecy, ciò significa che se la chiav [:octicons-code-16:](https://github.com/ProtonMail){ .card-link title="Codice sorgente" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail ha dei rapporti sugli arresti anomali interni che **non** condividon #### :material-check:{ .pg-green } Domini e Alias Personalizzati -Gli abbonati a Proton Mail a pagamento possono utilizzare il proprio dominio con il servizio o un indirizzo [catch-all](https://proton.me/support/catch-all). Inoltre, Proton Mail supporta il [sottoindirizzamento](https://proton.me/support/creating-aliases), utile per chi non desidera acquistare un dominio. +Gli abbonati a Proton Mail a pagamento possono utilizzare il proprio dominio con il servizio o un indirizzo [catch-all](https://proton.me/support/catch-all). Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Metodi di pagamento privati @@ -129,7 +129,7 @@ Proton Mail non offre una funzionalità di eredità digitale. #### :material-check:{ .pg-green } Domini e Alias personalizzati -Mailbox.org ti consente di utilizzare il tuo dominio e supporta gli indirizzi [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain). Anche Mailbox.org supporta il [sottoindirizzamento](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), utile se non desideri acquistare un dominio. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Metodi di pagamento privati @@ -137,17 +137,17 @@ Mailbox.org non accetta criptovalute a causa della sospensione delle attività d #### :material-check:{ .pg-green } Sicurezza dell'account -Mailbox.org supporta l'[autenticazione a due fattori](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) solo per la propria webmail. Puoi utilizzare TOTP o una [YubiKey](https://en.wikipedia.org/wiki/YubiKey), tramite [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Gli standard Web come [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) non sono ancora supportati. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Gli standard Web come [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) non sono ancora supportati. #### :material-information-outline:{ .pg-blue } Sicurezza dei dati -Mailbox.org consente la crittografia della posta in arrivo, tramite la loro [casella di posta crittografata](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). I nuovi messaggi ricevuti, saranno immediatamente crittografati con la tua chiave pubblica. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). I nuovi messaggi ricevuti, saranno immediatamente crittografati con la tua chiave pubblica. -Tuttavia, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), la piattaforma software utilizzata da Mailbox.org, [non supporta](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) la crittografia della tua rubrica e del calendario. Un'[opzione indipendente](calendar.md) può essere più appropriata per tali informazioni. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. Un'[opzione indipendente](calendar.md) può essere più appropriata per tali informazioni. #### :material-check:{ .pg-green } Crittografia Email -Mailbox.org presenta una [crittografia integrata](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) nella propria webmail, che semplifica l'invio di messaggi a persone con le chiavi OpenPGP pubbliche. Inoltre, consente ai [destinatari da remoto di decrittografare un'email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) sui server di Mailbox.org. Questa funzionalità è utile quando il destinatario da remoto non ha OpenPGP e non può decrittografare una copia dell'email nella propria casella. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. Questa funzionalità è utile quando il destinatario da remoto non ha OpenPGP e non può decrittografare una copia dell'email nella propria casella. Inoltre, Mailbox.org supporta la scoperta di chiavi pubbliche tramite HTTP dalla loro [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). Questo permette a persone esterne a Mailbox.org di trovare facilmente le chiavi OpenPGP degli account di Mailbox.org, per un E2EE fra provider diversi. Questo vale solo per gli indirizzi e-mail che terminano con uno dei domini di Mailbox.org, come @mailbox.org. Se si utilizza un dominio personalizzato, è necessario [configurare il WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separatamente. @@ -157,9 +157,9 @@ Il tuo profilo sarà impostato come limitato al termine del tuo contratto; dopo #### :material-information-outline:{ .pg-blue } Funzionalità aggiuntive -Puoi accedere al tuo profilo di Mailbox.org tramite IMAP/SMTP, utilizzando il loro [servizio .onion](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). Tuttavia, l'interfaccia webmail non è accessibile tramite il loro servizio .onion e potresti riscontrare errori del certificato TLS. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). Tuttavia, l'interfaccia webmail non è accessibile tramite il loro servizio .onion e potresti riscontrare errori del certificato TLS. -Tutti i profili presentano archiviazione su cloud limitata e [crittografabile](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Inoltre, Mailbox.org offre l'alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), che impone la crittografia TLS sulla connessione tra server email, altrimenti, il messaggio non sarà affatto inviato. Mailbox.org supporta anche [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync), oltre ai protocolli di accesso standard come IMAP e POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org supporta anche [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync), oltre ai protocolli di accesso standard come IMAP e POP3. Mailbox.org dispone di una funzione di eredità digitale per tutti i piani. Puoi scegliere se desideri che i tuoi dati siano passati agli eredi, supponendo che lo richiedano e forniscano il tuo testamento. In alternativa, puoi nominare una persona per nome e indirizzo. @@ -181,22 +181,22 @@ Questi fornitori memorizzano le tue email con la crittografia a conoscenza zero, **Tuta** è un servizio di posta elettronica incentrato sulla sicurezza e sulla privacy attraverso l'uso della crittografia. Tuta è operativo dal **2011** e ha sede ad Hannover, in Germania. I profili partono da 1GB di archiviazione, con il loro piano gratuito. -[:octicons-home-16: Pagina Principale](https://tuta.com/it/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://tuta.com/it/privacy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://tuta.com/it/community/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://tuta.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
-Scarica +Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota&gl=IT) -- [:simple-appstore: App Store](https://apps.apple.com/it/app/tuta-encrypted-email-app/id922429609) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) -- [:simple-windows11: Windows](https://tuta.com/it/#download) -- [:simple-apple: macOS](https://tuta.com/it/#download) -- [:simple-linux: Linux](https://tuta.com/it/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:simple-windows11: Windows](https://tuta.com/#download) +- [:simple-apple: macOS](https://tuta.com/#download) +- [:simple-linux: Linux](https://tuta.com/#download) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta non supporta il [protocollo IMAP](https://tuta.com/faq/#imap) o l'utilizzo #### :material-check:{ .pg-green } Domini e Alias personalizzati -Gli account di Tuta a pagamento possono utilizzare 15 o 30 alias a seconda del piano e alias illimitati sui [domini personalizzati](https://tuta.com/faq#custom-domain). Tuta non consente il [sottoindirizzamento (più indirizzi)](https://tuta.com/faq#plus), ma puoi utilizzare un [catch-all](https://tuta.com/howto#settings-global) con un dominio personalizzato. +Gli account di Tuta a pagamento possono utilizzare 15 o 30 alias a seconda del piano e alias illimitati sui [domini personalizzati](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Metodi di pagamento privati @@ -232,7 +232,7 @@ Tuta [eliminerà gli account gratuiti inattivi](https://tuta.com/faq#inactive-ac Tuta offre la versione aziendale di [Tuta alle organizzazioni non profit](https://tuta.com/blog/posts/secure-email-for-non-profit) gratuitamente o con un ottimo sconto. -Tuta ha anche una funzionalità aziendale, chiamata [Secure Connect](https://tuta.com/secure-connect/). Questa, garantisce che il contatto del cliente con l'azienda utilizzi l'E2EE. La funzionalità costa €240 all'anno. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). Questa, garantisce che il contatto del cliente con l'azienda utilizzi l'E2EE. La funzionalità costa €240 all'anno. Tuta non offre una funzionalità di eredità digitale. @@ -280,18 +280,18 @@ Utilizzare un servizio di alias richiede di affidare i tuoi messaggi crittografa [:octicons-heart-16:](https://addy.io/donate){ .card-link title=Contribuisci }
-Scarica +Downloads - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/it/firefox/addon/addy_io/) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe?hl=it) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-Il numero di alias condivisi (che terminano con un dominio condiviso come @addy.io) che puoi creare è limitato a 10 sul piano gratuito di addy.io, 50 sul piano da €1/mese e illimitato sul piano da €4/mese (fatturato €3 per un anno). Puoi creare un numero illimitato di alias standard (che terminano con un dominio come @[username].addy.io o con un dominio personalizzato nei piani a pagamento), tuttavia, come detto in precedenza, questo può essere dannoso per la privacy poichè le persone possono banalmente collegare i tuoi alias standard basandosi unicamente sul nome del dominio. Sono utili quando un dominio condiviso potrebbe essere bloccato da un servizio. Securitum [ha effettuato un audit](https://addy.io/blog/addy-io-passes-independent-security-audit/) su addy.io nel settembre 2023 e non sono state identificate [vulnerabilità significative](https://addy.io/addy-io-security-audit.pdf). +Il numero di alias condivisi (che terminano con un dominio condiviso come @addy.io) che puoi creare è limitato a 10 sul piano gratuito di addy.io, 50 sul piano da €1/mese e illimitato sul piano da €4/mese (fatturato €3 per un anno). Puoi creare un numero illimitato di alias standard (che terminano con un dominio come @[username].addy.io o con un dominio personalizzato nei piani a pagamento), tuttavia, come detto in precedenza, questo può essere dannoso per la privacy poichè le persone possono banalmente collegare i tuoi alias standard basandosi unicamente sul nome del dominio. Sono utili quando un dominio condiviso potrebbe essere bloccato da un servizio. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Funzionalità gratuite degne di nota: @@ -309,27 +309,27 @@ Funzionalità gratuite degne di nota: **SimpleLogin** è un servizio gratuito che fornisce alias email su numerosi nomi di dominio condivisi e, facoltativamente, fornisce funzionalità a pagamento quali alias illimitati e domini personalizzati. -[:octicons-home-16: Pagina Principale](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/simple-login){ .card-link title="Codice Sorgente" } +[:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
-Scarica +Downloads -- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android&gl=IT) -- [:simple-appstore: App Store](https://apps.apple.com/it/app/simplelogin-email-alias/id1494359858) +- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/it/firefox/addon/simplelogin/) -- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn?hl=it) -- [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff?hl=it-IT&gl=IT) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) +- [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) +- [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin è stata [acquisita da Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) l'8 aprile del 2022. Se utilizzi Proton Mail come tua casella di posta principale, SimpleLogin è un'ottima scelta. Poiché entrambi i prodotti sono ora posseduti dalla stessa azienda, devi ora affidarti a una singola entità. Inoltre, prevediamo che SimpleLogin sarà maggiormente integrato con le offerte future di Proton. SimpleLogin continua a supportare l'inoltro a qualsiasi fornitore di email di tua scelta. Securitum [ha revisionato](https://simplelogin.io/blog/security-audit/) SimpleLogin all'inizio del 2022 e tutti i problemi [sono stati risolti](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin è stata [acquisita da Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) l'8 aprile del 2022. Se utilizzi Proton Mail come tua casella di posta principale, SimpleLogin è un'ottima scelta. Poiché entrambi i prodotti sono ora posseduti dalla stessa azienda, devi ora affidarti a una singola entità. Inoltre, prevediamo che SimpleLogin sarà maggiormente integrato con le offerte future di Proton. SimpleLogin continua a supportare l'inoltro a qualsiasi fornitore di email di tua scelta. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). Puoi collegare il tuo profilo di SimpleLogin con quello di Proton nelle impostazioni. Se hai il Piano Unlimited, Business o Visionary di Proton, avrai SimpleLogin Premium gratuitamente. @@ -351,10 +351,10 @@ Gli amministratori di sistema avanzati potrebbero considerare la configurazione **Mailcow** è un server email più avanzato, perfetto per chi ha un po' più d'esperienza con Linux. Ha tutto il necessario in un contenitore Docker: Un server email con supporto DKIM, antivirus e monitoraggio dello spam, webmail e ActiveSync con SOGo e amministrazione basata sul web con supporto A2F. -[:octicons-home-16: Pagina Principale](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Gli amministratori di sistema avanzati potrebbero considerare la configurazione Per un approccio più manuale, abbiamo scelto questi due articoli: -- [Configurare un server email con OpenSMTPD, Dovecot e Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [Come Gestire il Tuo Server Email](https://www.c0ffee.net/blog/mail-server-guide/) (Agosto 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criteri @@ -386,7 +386,7 @@ Consideriamo queste funzionalità come importanti per poter fornire un servizio **Requisiti minimi:** - Crittografia dei dati degli account email a riposo con crittografia ad "accesso zero". -- Possibilità di esportazione come [Mbox](https://en.wikipedia.org/wiki/Mbox) o singoli .eml con lo standard [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) . +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Consente agli utenti di utilizzare il proprio [nome di dominio](https://en.wikipedia.org/wiki/Domain_name). I nomi di dominio personalizzati sono importanti per gli utenti, poiché consentono loro di mantenere la propria autonomia dal servizio, dovesse diventare negativo o essere acquisito da un'altra azienda che non dà priorità alla privacy. - Opera su un'infrastruttura proprietaria, cioè, non basata su fornitori del servizio email di terze parti. @@ -397,7 +397,7 @@ Consideriamo queste funzionalità come importanti per poter fornire un servizio - Supporto per [WKD](https://wiki.gnupg.org/WKD) per consentire la scoperta migliorata delle chiavi pubbliche di OpenPGP tramite HTTP. Gli utenti di GnuPG possono ottenere una chiave digitando: `gpg --locate-key example_user@example.com` - Supporto per una casella temporanea per gli utenti esterni. Questo è utile quando desideri inviare un'email crittografata, senza inviare una copia effettiva al tuo destinatario. Queste email, solitamente, hanno una durata limitata, prima di essere eliminate automaticamente. Inoltre, non richiedono al destinatario di configurare alcuna crittografia, come OpenPGP. - Disponibilità dei servizi del fornitore email tramite un [servizio onion](https://en.wikipedia.org/wiki/.onion). -- Supporto del [sottoindirizzamento](https://en.wikipedia.org/wiki/Email_address#Subaddressing). +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Funzionalità di catch-all o alias per coloro che possiedono i propri domini. - Utilizzo di protocolli d'accesso email standard, quali IMAP, SMTP o [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). I protocolli d'accesso standard assicurano ai clienti di scaricare facilmente tutte le proprie email, qualora dovessero passare a un altro fornitore. @@ -425,13 +425,13 @@ I server email gestiscono molti dati, estremamente sensibili. Ci aspettiamo che - Protezione della webmail con 2FA, ad esempio TOTP. - Crittografia ad accesso zero, basata sulla crittografia a riposo. Il provider non deve disporre delle chiavi di decrittazione dei dati in loro possesso. Questo previene che dipendenti disonesti possano trapelare i dati sensibili, o che un avversario remoto possa rilasciarli, dopo averli rubati, ottenendo un accesso non autorizzato al server. - Supporto [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions). -- Nessun errore o vulnerabilità TLS quando profilati da strumenti quali [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/) o [Qualys SSL Labs](https://www.ssllabs.com/ssltest); ciò include gli errori relativi al certificato e i parametri deboli DH, come quelli che hanno portato al [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - Una preferenza della suite del server (facoltativa su TLSv1.3), per forti suite di cifratura che supportino la segretezza in avanti e la crittografia autenticata. - Una valida politica [MTA-STS](https://tools.ietf.org/html/rfc8461) e [TLS-RPT](https://tools.ietf.org/html/rfc8460). - Registri [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) validi. - Registri [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) e [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) validi. - Disporre di un registro o una politica [DMARC](https://en.wikipedia.org/wiki/DMARC) adeguati o utilizzare [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) per l'autenticazione. Se si utilizza l'autenticazione DMARC, la politica dev'essere impostata su `rifiuta` o `quarantena`. -- Preferenza per una suite di server TLS 1.2 o successivo e un piano per [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - Invio [SMTPS](https://en.wikipedia.org/wiki/SMTPS), supponendo che SMTP sia utilizzato. - Standard di sicurezza del sito web come: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ I server email gestiscono molti dati, estremamente sensibili. Ci aspettiamo che - Programmi di caccia ai bug e/o un processo di divulgazione delle vulnerabilità coordinato. - Standard di sicurezza del sito web, quali: - [Politica sulla Sicurezza dei Contenuti (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Fiducia diff --git a/i18n/it/encryption.md b/i18n/it/encryption.md index 1e96494a..180d9170 100644 --- a/i18n/it/encryption.md +++ b/i18n/it/encryption.md @@ -21,16 +21,16 @@ Le opzioni qui elencate sono multipiattaforma e ottime per creare backup crittog **Cryptomator** è una soluzione per la crittografia progettata per salvare privatamente i file di qualsiasi provider cloud. Ti consente di creare cassaforti memorizzate su un'unità virtuale, i cui contenuti sono crittografati e sincronizzati con il tuo fornitore d'archiviazione su cloud. [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribuisci } +[:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator utilizza la crittografiaa AES-256 per crittografare i file e i loro Alcune librerie crittografiche di Cryptomator sono state [revisionate](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) da Cure53. Alcune delle librerie sottoposte a verifica sono: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) e [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). Non è stata controllata [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), che è una libreria usata da Cryptomator per iOS. -La documentazione di Cryptomator ne descrive l'[obiettivo di sicurezza](https://docs.cryptomator.org/en/latest/security/security-target/), [architettura di sicurezza](https://docs.cryptomator.org/en/latest/security/architecture/) e le [migliori pratiche](https://docs.cryptomator.org/en/latest/security/best-practices/) previsti, per l'utilizzo. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -80,16 +80,16 @@ La documentazione di Cryptomator ne descrive l'[obiettivo di sicurezza](https:// **VeraCrypt** è un'utility libera con sorgente disponibile, utilizzata per la crittografia al volo. Può creare un disco virtuale crittografato in un file, crittografare una partizione o crittografare l'intero dispositivo di archiviazione con l'autenticazione antecedente l'avvio. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } -[:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentazione} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribuisci } +[:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
-Scarica +Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ Per crittografare l'unità da cui si avvia il sistema operativo, in genere si co ![Logo di BitLocker](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** è il programma di crittografia completa del volume, integrato con Microsoft Windows. Il motivo principale per cui lo consigliamo per la crittografia dell'unità di avvio è il suo [utilizzo di TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, una società di analisi forense, ha scritto su questa funzione in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** è il programma di crittografia completa del volume, integrato con Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentazione} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker è [supportato soltanto](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) dalle edizioni Pro, Enterprise ed Education di Windows. Può essere abilitato sulle edizioni Home, ammesso che soddisfino i prerequisiti. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. Può essere abilitato sulle edizioni Home, ammesso che soddisfino i prerequisiti.
Abilitare BitLocker su Windows Home @@ -136,7 +136,7 @@ Per abilitare BitLocker sulle edizioni "Home" di Windows, è necessario che le p powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Accedi alle [Opzioni di Avvio Avanzate](https://support.microsoft.com/it-it/windows/opzioni-di-avvio-avanzate-inclusa-la-modalit%C3%A0-provvisoria-b90e7808-80b5-a291-d4b8-1a1af602b617). Devi riavviare premendo il tasto F8, prima dell'avvio di Windows e andare nel *prompt dei comandi* in **Risoluzione dei Problemi** → **Opzioni Avanzate** → **Prompt dei Comandi**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). Devi riavviare premendo il tasto F8, prima dell'avvio di Windows e andare nel *prompt dei comandi* in **Risoluzione dei Problemi** → **Opzioni Avanzate** → **Prompt dei Comandi**. 4. Accedi con il tuo profilo da amministratore e digita nel prompt dei comandi questo comando, per avviare la crittografia: ```powershell manage-bde -on c: -used @@ -183,9 +183,9 @@ Consigliamo di memorizzare una chiave di recupero locale in un luogo sicuro, inv **LUKS** è il metodo di FDE predefinito per Linux. È utilizzabile per crittografare interi volumi, partizioni, o creare contenitori crittografati. -[:octicons-home-16: Home](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentazione} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Codice Sorgente" } +[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Gli strumenti con interfacce di riga di comando sono utili per integrare gli [sc ![Logo di Kryptor](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** è uno strumento gratuito e open source di crittografia e firma dei file, che utilizza algoritmi crittografici moderni e sicuri. Punta a essere una versione migliorata di[age](https://github.com/FiloSottile/age) e [Minisign](https://jedisct1.github.io/minisign/) per fornire un'alternativa semplice a GPG. +**Kryptor** è uno strumento gratuito e open source di crittografia e firma dei file, che utilizza algoritmi crittografici moderni e sicuri. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
-Scarica +Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Gli strumenti con interfacce di riga di comando sono utili per integrare gli [sc **Tomb** è un wrapper della shell a riga di comando, per LUKS. Supporta la steganografia tramite [strumenti di terze parti](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Pagina principale](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,14 +271,14 @@ Gli strumenti con interfacce di riga di comando sono utili per integrare gli [sc OpenPGP è talvolta necessario per incarichi specifici, come firmare digitalmente e crittografare un'email. PGP include molte funzionalità ed è [complesso](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html), dato che è in circolazione da molto tempo. Per gli incarichi come firmare o crittografare i file, suggeriamo le opzioni precedenti. -Crittografando con PGP, puoi configurare diverse opzioni nel tuo file `gpg.config`. Ti consigliamo di attenerti con le opzioni standard specificate nelle [Domande Frequenti degli utenti di GnuPG](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +Crittografando con PGP, puoi configurare diverse opzioni nel tuo file `gpg.config`. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Utilizzare le impostazioni predefinite future quando si genera una chiave

-Quando si [generano le chiavi] (https://www.gnupg.org/gph/en/manual/c14.html) suggeriamo di usare il comando `future-default', che indicherà a GnuPG di usare crittografia moderna come [Curve25519] (https://en.wikipedia.org/wiki/Curve25519#History) e [Ed25519] (https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): -``bash +```bash gpg --quick-gen-key alice@example.com future-default ``` @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![Logo di GNU Privacy Guard](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** è un'alternativa con licenza GPL alla suite PGP per software crittografici. GnuPG è conforme con [RFC 4880](https://tools.ietf.org/html/rfc4880), la specifica IETF corrente di OpenPGP. Il progetto GnuPG ha lavorato a una [bozza aggiornata](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) nel tentativo di modernizzare OpenPGP. GnuPG fa parte del progetto Free Software Foundation di GNU ed ha ricevuto un'importante [finanziamento](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) dal governo tedesco. +**GnuPG** è un'alternativa con licenza GPL alla suite PGP per software crittografici. GnuPG è conforme con [RFC 4880](https://tools.ietf.org/html/rfc4880), la specifica IETF corrente di OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG fa parte del progetto Free Software Foundation di GNU ed ha ricevuto un'importante [finanziamento](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) dal governo tedesco. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Informativa sulla Privacy" } @@ -369,12 +369,12 @@ Consigliamo di dare un'occhiata ai loro [Primi passi](https://gpgtools.tenderapp ![Logo di OpenKeychain](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** è un'implementazione Android di GnuPG. È comunementa richiesta da client mail come [K-9 Mail](email-clients.md#k-9-mail) e [FairEmail](email-clients.md#fairemail) e da altre app Android per fornire supporto alla crittografia. Cure53 ha completato un [controllo di sicurezza](https://www.openkeychain.org/openkeychain-3-6) di OpenKeychain 3.6 a ottobre 2015. I dettagli tecnici sul controllo e le soluzioni di OpenKeychain possono essere trovate [qui](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** è un'implementazione Android di GnuPG. È comunementa richiesta da client mail come [K-9 Mail](email-clients.md#k-9-mail) e [FairEmail](email-clients.md#fairemail) e da altre app Android per fornire supporto alla crittografia. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. I dettagli tecnici sul controllo e le soluzioni di OpenKeychain possono essere trovate [qui](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
Scarica diff --git a/i18n/it/file-sharing.md b/i18n/it/file-sharing.md index 8c4289c6..d766c439 100644 --- a/i18n/it/file-sharing.md +++ b/i18n/it/file-sharing.md @@ -15,7 +15,7 @@ Scopri come condividere privatamente i tuoi file tra i tuoi dispositivi, con i t ![Logo di Send](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** è un fork del servizio, ormai dismesso, di Firefox Send di Mozilla, che consente di inviare file ad altri con un link. I file sono crittografati sul tuo dispositivo così che non possano esser letti dal server e, facoltativamente, possono essere anche protetti da password. Il manutentore di Send ospita un'[istanza pubblica](https://send.vis.ee/). Puoi utilizzare altre istanze pubbliche, o puoi ospitare Send autonomamente. +**Send** è un fork del servizio, ormai dismesso, di Firefox Send di Mozilla, che consente di inviare file ad altri con un link. I file sono crittografati sul tuo dispositivo così che non possano esser letti dal server e, facoltativamente, possono essere anche protetti da password. The maintainer of Send hosts a [public instance](https://send.vis.ee). Puoi utilizzare altre istanze pubbliche, o puoi ospitare Send autonomamente. [:octicons-home-16: Home](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Istanze Pubbliche"} @@ -80,10 +80,10 @@ Stiamo lavorando per stabilire i criteri definiti per ogni sezione del nostro si **FreedomBox** è un sistema operativo progettato per essere eseguito su un [computer a scheda singola (SBC)](https://it.wikipedia.org/wiki/Single-board_computer). Lo scopo è semplificare la configurazione delle applicazioni server, che potresti voler ospitare autonomamente. -[:octicons-home-16: Home](https://freedombox.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentazione} -[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} +[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -100,10 +100,10 @@ Stiamo lavorando per stabilire i criteri definiti per ogni sezione del nostro si **Nextcloud** è una suite di software gratuiti e open source dal client al server per la creazione di servizi hosting dei file su un server privato controllato dall'utente. [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribuisci } +[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Scarica @@ -135,18 +135,18 @@ Sconsigliamo di utilizzare l'[App E2EE](https://apps.nextcloud.com/apps/end_to_e **Syncthing** è un'utility open source tra peer di sincronizzazione continua dei file. Viene utilizzata per sincronizzare i file tra due o più dispositivi sulla rete locale o su Internet. Syncthing non utilizza un server centralizzato; utilizza il [Protocollo di Scambio dei Blocchi](https://docs.syncthing.net/specs/bep-v1.html#bep-v1) per trasferire i dati tra dispositivi. Tutti i dati sono crittografati utilizzando TLS. [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/syncthing){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribuisci } +[:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/it/financial-services.md b/i18n/it/financial-services.md index e7996925..20b8fb38 100644 --- a/i18n/it/financial-services.md +++ b/i18n/it/financial-services.md @@ -28,9 +28,9 @@ Molte banche e fornitori di carte di credito offrono una funzionalità nativa di Il piano gratuito di **Privacy.com** ti consente di creare fino a 12 carte virtuali al mese, di impostare i limiti di spesa su tali carte e di chiuderle istantaneamente. Il piano a pagamento ti consente di creare fino a 36 carte al mese, ottenere l'1% di cashback sugli acquisti e di nascondere le informazioni sulle transazioni dalla tua banca. -[:octicons-home-16: Home](https://privacy.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com fornisce le informazioni sui commercianti da cui acquisti alla tua b **MySudo** fornisce fino a 9 carte virtuali a seconda del piano acquistato. I piani a pagamento, inoltre, includono funzionalità che potrebbero tornare utili per effettuare acquisti privatamente, come numeri di telefono e indirizzi email virtuali, sebbene, tipicamente, consigliamo altri [fornitori di alias email](email.md), per l'utilizzo prolungato di alias email. -[:octicons-home-16: Home](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ Questi servizi ti consentono di acquistare carte regalo per numerosi commerciant **CoinCards** (Disponibile negli USA e in Canada) ti consente di acquistare carte regalo per una vasta gamma di commercianti. -[:octicons-home-16: Home](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/it/frontends.md b/i18n/it/frontends.md index b623e9c1..e23896a2 100644 --- a/i18n/it/frontends.md +++ b/i18n/it/frontends.md @@ -17,9 +17,9 @@ Utilizzando un'istanza gestita da altri, assicurati di leggere la politica sulla
-![Logo ProxiTok](assets/img/frontends/proxitok.svg){ align=right } +![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** è un frontend open source per il sito web [TikTok](https://www.tiktok.com), che può anche essere ospitato autonomamente. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. Esistono numerose istanze pubbliche, alcune dotate del supporto ai servizi onion di [Tor](tor.md). @@ -51,11 +51,11 @@ ProxiTok è utile se desideri disabilitare JavaScript nel tuo browser, come [Tor Di default, FreeTube blocca tutte le inserzioni di YouTube. Inoltre, FreeTube integra facoltativamente [SponsorBlock](https://sponsor.ajay.app), per aiutarti a saltare i segmenti sponsorizzati dei video. -[:octicons-home-16: Pagina Home](https://freetubeapp.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } +[:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute }
Download @@ -72,7 +72,7 @@ Di default, FreeTube blocca tutte le inserzioni di YouTube. Inoltre, FreeTube in

Avviso

-Utilizzando FreeTube, il tuo indirizzo IP potrebbe ancora essere noto a YouTube, [Invidious](https://instances.invidious.io) o [SponsorBlock](https://sponsor.ajay.app/), a seconda della tua configurazione. Considera di utilizzare una [VPN](vpn.md) o [Tor](tor.md), se il tuo [modello di minaccia](basics/threat-modeling.md) ti richiede di mascherare l'indirizzo IP. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Considera di utilizzare una [VPN](vpn.md) o [Tor](tor.md), se il tuo [modello di minaccia](basics/threat-modeling.md) ti richiede di mascherare l'indirizzo IP.
@@ -84,7 +84,7 @@ Utilizzando FreeTube, il tuo indirizzo IP potrebbe ancora essere noto a YouTube, **Yattee** è un lettore video gratuito e open source orientato alla privacy per iOS, tvOS e macOS per [YouTube](https://youtube.com). Utilizzando Yattee, il tuo elenco di iscrizioni è salvato localmente sul tuo dispositivo. -Dovrai effettuare alcuni [passaggi aggiuntivi](https://gonzoknows.com/posts/Yattee/) prima di poter utilizzare Yattee per guardare YouTube, a causa delle limitazioni dell'App Store. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Pagina Home](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Politica sulla privacy" } @@ -93,9 +93,9 @@ Dovrai effettuare alcuni [passaggi aggiuntivi](https://gonzoknows.com/posts/Yatt [:octicons-heart-16:](https://github.com/yattee/yattee/wiki/Donations){ .card-link title=Contribuisci }
-Download +Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ Dovrai effettuare alcuni [passaggi aggiuntivi](https://gonzoknows.com/posts/Yatt

Avviso

-Utilizzando Yattee, il tuo indirizzo IP potrebbe ancora essere noto a YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) o [SponsorBlock](https://sponsor.ajay.app/), a seconda della tua configurazione. Considera di utilizzare una [VPN](vpn.md) o [Tor](tor.md), se il tuo [modello di minaccia](basics/threat-modeling.md) ti richiede di mascherare l'indirizzo IP. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Considera di utilizzare una [VPN](vpn.md) o [Tor](tor.md), se il tuo [modello di minaccia](basics/threat-modeling.md) ti richiede di mascherare l'indirizzo IP.
@@ -139,7 +139,7 @@ LibreTube ti consente di memorizzare il tuo elenco di iscrizioni e playlist loca

Avviso

-Utilizzando LibreTube, il tuo indirizzo IP sarà visibile all'istanza di [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) di tua scelta e/o di [SponsorBlock](https://sponsor.ajay.app/), a seconda della tua configurazione. Considera di utilizzare una [VPN](vpn.md) o [Tor](tor.md), se il tuo [modello di minaccia](basics/threat-modeling.md) ti richiede di mascherare l'indirizzo IP. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Considera di utilizzare una [VPN](vpn.md) o [Tor](tor.md), se il tuo [modello di minaccia](basics/threat-modeling.md) ti richiede di mascherare l'indirizzo IP.
@@ -149,17 +149,17 @@ Di default, LibreTube blocca tutte le inserzioni di YouTube. Inoltre, Libretube
-![Logo di Newpipe](assets/img/frontends/newpipe.svg){ align=right } +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** è un'applicazione Android gratuita e open source per [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com) e [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Il tuo elenco delle iscrizioni e le playlist sono salvate localmente sul tuo dispositivo Android. -[:octicons-home-16: Pagina Home](https://newpipe.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Download @@ -170,7 +170,7 @@ Il tuo elenco delle iscrizioni e le playlist sono salvate localmente sul tuo dis
-1. L'istanza predefinita è [FramaTube](https://framatube.org/), tuttavia, se ne possono aggiungere altre tramite **Impostazioni** → **Contenuti** → **Istanze di PeerTube** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Avviso

@@ -190,11 +190,11 @@ Utilizzando NewPipe, il tuo indirizzo IP sarà visibile ai fornitori di video ut Esistono numerose istanze pubbliche, alcune dotate del supporto ai servizi onion di [Tor](tor.md). -[:octicons-home-16: Home](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Istanze Pubbliche"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -225,10 +225,10 @@ Invidious è utile se desideri disabilitare JavaScript nel tuo browser, come [To Piped richiede JavaScript per funzionare e dispone di numerose istanze pubbliche. [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Istanze Pubbliche"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribuisci } +[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute }
diff --git a/i18n/it/index.md b/i18n/it/index.md index 984d75f9..65e2035c 100644 --- a/i18n/it/index.md +++ b/i18n/it/index.md @@ -62,12 +62,12 @@ Provare a proteggere tutti i tuoi dati da chiunque e in ogni momento, è poco pr ## Abbiamo bisogno di te! Ecco come puoi partecipare: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Unisciti al nostro Forum" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Seguici su Mastodon" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribuisci a questo sito web" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Aiuta a tradurre questo sito web" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Scrivici su Matrix" } -[:material-information-outline:](about/index.md){ title="Scopri di più su di noi" } -[:material-hand-coin-outline:](about/donate.md){ title="Supporta il progetto" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } È importante che un sito web come Privacy Guides sia sempre aggiornato. Necessitiamo che il nostro pubblico tenga d'occhio gli aggiornamenti delle applicazioni elencate sul nostro sito e che segua le notizie sui fornitori che consigliamo. È difficile tenere il passo con il veloce ritmo di Internet, ma facciamo del nostro meglio. Se noti un errore, pensi che un fornitore non dovrebbe essere elencato, noti che un fornitore qualificato sia mancante, credi che un plugin per browser non sia più la scelta migliore, o scopri qualsiasi altro problema, ti preghiamo di farcelo sapere. diff --git a/i18n/it/kb-archive.md b/i18n/it/kb-archive.md index 3449dd47..116f455f 100644 --- a/i18n/it/kb-archive.md +++ b/i18n/it/kb-archive.md @@ -8,10 +8,10 @@ description: Alcune pagine che si trovavano nella nostra base di conoscenza, si Alcune pagine che si trovavano nella nostra base di conoscenza, si possono ora trovare sul nostro blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Rafforzamento della Configurazione di Signal](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux: Rafforzamento del Sistema](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux: Sandboxing delle Applicazioni](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Cancellazione sicura dei dati](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrare la Rimozione dei Metadati](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [Guida alla configurazione di iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Rafforzamento della Configurazione di Signal](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux: Rafforzamento del Sistema](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux: Sandboxing delle Applicazioni](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Cancellazione sicura dei dati](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrare la Rimozione dei Metadati](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [Guida alla configurazione di iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/it/meta/admonitions.md b/i18n/it/meta/admonitions.md index d7179ece..56d76811 100644 --- a/i18n/it/meta/admonitions.md +++ b/i18n/it/meta/admonitions.md @@ -163,17 +163,17 @@ Questo formato viene utilizzato per generare schede di raccomandazione. In parti ```markdown title="Recommendation Card"
-![Logo PhotoPrism](assets/img/photo-management/photoprism.svg){ align=right } +![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** è una piattaforma self-hostable per la gestione delle foto. Supporta la sincronizzazione e la condivisione degli album e una serie di altre [funzionalità](https://www.photoprism.app/features). Non include E2EE, quindi è consigliabile ospitarlo su un server di cui ci si fida e che è sotto il proprio controllo. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-github: GitHub](https://github.com/photoprism) @@ -188,12 +188,12 @@ Questo formato viene utilizzato per generare schede di raccomandazione. In parti ![Logo PhotoPrism](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** è una piattaforma self-hostable per la gestione delle foto. Supporta la sincronizzazione e la condivisione degli album e una serie di altre [funzioni](https://www.photoprism.app/features). Non include E2EE, quindi è meglio che sia ospitato su un server di fiducia e che sia sotto il tuo controllo. +**PhotoPrism** è una piattaforma self-hostable per la gestione delle foto. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). Non include E2EE, quindi è meglio che sia ospitato su un server di fiducia e che sia sotto il tuo controllo. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
Scarica @@ -212,10 +212,10 @@ Si tratta di un tipo speciale di monito a scomparsa, utilizzato per generare la ```markdown title="Downloads Section"
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ Si tratta di un tipo speciale di monito a scomparsa, utilizzato per generare la Scarica - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/it/meta/translations.md b/i18n/it/meta/translations.md index 57940004..f0328d0c 100644 --- a/i18n/it/meta/translations.md +++ b/i18n/it/meta/translations.md @@ -2,9 +2,9 @@ title: Traduzioni --- -Crowdin ha una buona documentazione, e suggeriamo di consultare la loro guida [Per Iniziare](https://support.crowdin.com/crowdin-intro/). Il nostro sito è per lo più scritto in [Markdown](https://en.wikipedia.org/wiki/Markdown), quindi, contribuire, dovrebbe essere facile. Questa pagina contiene dei consigli utili per tradurre parte specifica della sintassi che potresti incontrare sul nostro sito. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Il nostro sito è per lo più scritto in [Markdown](https://en.wikipedia.org/wiki/Markdown), quindi, contribuire, dovrebbe essere facile. Questa pagina contiene dei consigli utili per tradurre parte specifica della sintassi che potresti incontrare sul nostro sito. -Ti preghiamo di unirti alla nostra stanza di localizzazione su Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)), se hai qualsiasi ulteriore domanda, e di leggere i [post del nostro blog di annunci](https://blog.privacyguides.org/2023/02/26/i18n-announcement/), per ulteriori informazioni sul progetto. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Nota che la versione in inglese del sito è la versione principale, a significare che le modifiche si verificano lì per prime. Se noti che una lingua non è aggiornata, ti preghiamo di contribuire. Non possiamo garantire l'accuratezza di tutte le nostre traduzioni. Se hai un suggerimento sui contenuti specifici della tua regione, ti preghiamo di aprire un ticket o una richiesta di pull, nel nostro [repository principale](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ Sistemi di scrittura CJK tendono a utilizzare varianti alternative "a larghezza - I link devono utilizzare le parentesi regolari, cioè `(` (Parentesi Sinistra U+0028) e `)` (Parentesi Destra U+0029) ee non `(` (Parentesi Sinistra a Larghezza Intera U+FF08) o `)` (Parentesi Destra a Larghezza Intera U+FF09) - Il testo tra virgolette rientrato deve utilizzare `:` (Due punti U+003A) e non `:` (Due Punti a Larghezza Intera U+FF1A) -- Le immagini devono utilizzare `!` (Punto Esclamativo U+0021) e non `!` (Punto Esclamativo a Larghezza Intera U+FF01) +- Le immagini devono utilizzare `!` (Punto Esclamativo U+0021) e non `!` (Punto Esclamativo a Larghezza Intera U+FF01) diff --git a/i18n/it/meta/uploading-images.md b/i18n/it/meta/uploading-images.md index ff97cb3e..bab1fe1a 100644 --- a/i18n/it/meta/uploading-images.md +++ b/i18n/it/meta/uploading-images.md @@ -17,7 +17,7 @@ I loghi aziendali hanno dimensioni di: ### PNG -Utilizza [OptiPNG](https://sourceforge.net/projects/optipng/) per ottimizzare i file immagine PNG: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/it/meta/writing-style.md b/i18n/it/meta/writing-style.md index cdf4b189..7e0aeda0 100644 --- a/i18n/it/meta/writing-style.md +++ b/i18n/it/meta/writing-style.md @@ -4,11 +4,11 @@ title: Stile di scrittura Privacy Guides è scritto in inglese americano, e dovresti far riferimento alle [linee guida di Stile APA](https://apastyle.apa.org/style-grammar-guidelines/grammar), in caso di dubbi. -In generale, le [linee guida federali degli Stati Uniti per il linguaggio semplice](https://www.plainlanguage.gov/guidelines/), forniscono una buona panoramica su come scrivere in modo chiaro e conciso. Evidenziamo alcune note importanti da tali linee guida, di seguito. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. Evidenziamo alcune note importanti da tali linee guida, di seguito. ## Scrivere per il nostro pubblico -Il [pubblico](https://www.plainlanguage.gov/guidelines/audience/) cui Privacy Guides si riferisce è per lo più composto da adulti medi che utilizzano la tecnologia. Non sminuire i contenuti come se ti stessi rivolgendo a una classe delle medie ma, al contempo, non esagerare con le terminologie complicate su conctti che, gli utilizzatori medi di computer, non sarebbero familiari. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Non sminuire i contenuti come se ti stessi rivolgendo a una classe delle medie ma, al contempo, non esagerare con le terminologie complicate su conctti che, gli utilizzatori medi di computer, non sarebbero familiari. ### Spiega solo ciò che le persone vogliono sapere @@ -24,7 +24,7 @@ Scriviamo *per* un'ampia varietà di persone ma, al contempo, *alla* persona che > > Utilizzando il "tu" per rivolgerti agli utenti, potrebbero comprendere più probabilmente quali siano le loro responsabilità. -Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Evita "utenti" @@ -37,7 +37,7 @@ L'organizzazione è fondamentale. I contenuti dovrebbero confluire dalle informa - Limita il documento ad un massimo di cinque o sei sezioni. I documenti lunghi dovrebbero essere suddivisi in più pagine separate. - Evidenzia le idee importanti con il **grassetto** o con il *corsivo*. -Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Inizia con una frase chiave @@ -45,7 +45,7 @@ Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > Spesso, scriviamo così come pensiamo, ponendo prima le nostre premesse, poi le nostr conclusioni. Potrebbe essere il metodo naturale per sviluppare i pensieri, ma noi preferiamo inserire una frase chiave alla fine del paragrafo. Mettila in risalto e fai capire alle persone dove stai andando a parare. Non costringere i lettori a trattenere molte informazioni in testa, prima di arrivare al punto. -Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Scegli con cura le tue parole @@ -65,7 +65,7 @@ Dovremmo provare a evitare le abbreviazioni quadno possibile, ma la tecnologia > Le parole inutili fanno perdere tempo al tuo pubblico. Una buona scrittura è come una conversazione. Ometti le informazioni che il pubblico non necessita di sapere. Ciò può risultare difficile per un esperto in materia, quindi, è importante far leggere a qualcuno le informazioni, dalla prospettiva del pubblico. -Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Mantieni colloquiale il testo @@ -77,7 +77,7 @@ Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Una voce attiva rende chiaro chi dovrebbe fare cosa. Elimina l'ambiguità sulle responsabilità. Non utlizzare "Dev'esser fatto," piuttosto, preferisci "Devi farlo." -Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Utilizza "deve" per i requisiti diff --git a/i18n/it/mobile-browsers.md b/i18n/it/mobile-browsers.md index c0721852..d82d7778 100644 --- a/i18n/it/mobile-browsers.md +++ b/i18n/it/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,23 +41,23 @@ Questi sono i browser e le configurazioni che attualmente consigliamo per la nav ## Android -Per Android, Firefox è meno sicuro delle alternative basate su Chromium: il motore di Mozilla, [GeckoView](https://mozilla.github.io/geckoview/), non supporta ancora [l'isolamento dei siti](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) e non ha abilitato [l'isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave
-![Logo di Brave](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** include un blocco di contenuti e [funzionalità per la privacy](https://brave.com/privacy-fetures/), molte delle quali abilitate di default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave si basa sul progetto del browser web di Chromium, quindi, dovrebbe sembrare familire e avere problemi di compatibilità minimali con i siti web. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } -[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Servizio Onion" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Scarica @@ -77,7 +77,7 @@ Queste opzioni si possono trovare in :material-menu: → **Impostazioni** → ** ##### Shields -Brave include alcune misure contro il fingerprinting nella sua funzionalità [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Suggeriamo di configurarle [globalmente](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) tra tutte le pagine che visiti. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Valori predefiniti globali di Brave Shields @@ -101,7 +101,7 @@ Brave consente di selezionare filtri aggiuntivi per i contenuti nella pagina int
-1. Quest'opzione fornisce una funzionalità simile alle [modalità di blocco](https://github.com/gorhill/uBlock/wiki/Blocking-mode) avanzata di uBlock Origin o all'estensione [NoScript](https://noscript.net/). +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Cancella dati di navigazione @@ -115,13 +115,13 @@ Brave consente di selezionare filtri aggiuntivi per i contenuti nella pagina int
-- [x] Seleziona **Disabilita UDP senza proxy** nella [Gestione Politca IP WebRTC](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-chaange-my-Privacy-Settings-#webrtc) -- [ ] Rimuovi la spunta da "Consenti ai siti di controllare se hai metodi di pagamento salvati** -- [ ] Rimuovi la spunta da **Gateway IPFS** (1) -- [x] Seleziona **Chiudi le schede quando esci** -- [ ] Rimuovi la spunta da **Acconsenti all'analisi dei prodotti di tutela della privacy (P3A)** -- [ ] Rimuovi la spunta da **Invia automaticamente i rapporti di diagnostica** -- [ ] Rimuovi la spunta da **Invia automaticamente un ping di utilizzo giornaliero a Brave** +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Allow sites to check if you have payment methods saved** +- [ ] Uncheck **IPFS Gateway** (1) +- [x] Select **Close tabs on exit** +- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** +- [ ] Uncheck **Automatically send diagnostic reports** +- [ ] Uncheck **Automatically send daily usage ping to Brave**
@@ -129,7 +129,7 @@ Brave consente di selezionare filtri aggiuntivi per i contenuti nella pagina int #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) consente ai tuoi dati di navigazione (cronologia, segnalibri, ecc.) di essere accessibili su tutti i dispositivi, senza richiedere un profilo e li protegge con l'E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ Su iOS, qualsiasi app che possa navigare sul web è [limitata](https://developer ![Logo di Safari](assets/img/browsers/safari.svg){ align=right } -**Safari** è il browser predefinito di iOS. Include [funzionalità per la privacy](https://support.apple.com/it-it/guide/iphone/iphb01fc3c85/15.0/ios/15.0) come [Prevenzione intelligente del tracciamento](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Report sulla Privacy, schede di navigazione private isolate ed effimere, iCloud Private Relay, riduzione del fingerprinting presentando ai siti web una versione semplificata della configurazione del sistema in modo che più dispositivi sembrino identici. Consente inoltre di separare la navigazione con profili diversi. +**Safari** è il browser predefinito di iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. Consente inoltre di separare la navigazione con profili diversi. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Il Rapporto sulla Privacy è accessibile tramite il menu Impostazioni della Pagi - [ ] Disabilita la **Misurazione della pubblicità che tutela la privacy** -Tradizionalmente, la misurazione dei click sugli annunci ha utilizzato la tecnologia di tracciamento, che viola la privacy degli utenti. La [Misurazione Privata dei Click](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) è una funzionalità di WebKit, nonché uno standrd web proposto, incentrato al consentire agli inserzionisti di misurare l'efficacia delle campagne web senza compromettere la privacy dell'utente. +Tradizionalmente, la misurazione dei click sugli annunci ha utilizzato la tecnologia di tracciamento, che viola la privacy degli utenti. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. Questa, presenta poche preoccupazioni sulla privacy, quindi, sebbene tu possa scegliere di lasciarla attiva, consideriamo il fatto che sia automaticamente disabilitata per la Navigazione Privata, come un segnale per disabilitarla. @@ -201,9 +201,9 @@ Nota che la Navigazione Privata non salva i cookie e dati dei siti web, quindi, ##### Sincronizzazione iCloud -La sincronizzazione della Cronologia di Safari, dei Gruppi di Schede, delle Schede di iCloud e delle password salvate, avviene E2EE. Tuttavia, di default, i segnalibri [non](https://support.apple.com/en-us/HT202303) la prevedono. Apple può decriptarli e accedervi, in conformità con la sua [politica sulla privacy](https://www.apple.com/legal/privacy/en-ww/). +La sincronizzazione della Cronologia di Safari, dei Gruppi di Schede, delle Schede di iCloud e delle password salvate, avviene E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -Puoi abilitare la E2EE per i tuoi segnalibri e i download di Safari attivando la [Protezione avanzata dei dati](https://support.apple.com/it-it/HT212520). Vai al tuo **nome ID Apple → iCloud → Protezione Avanzata dei Dati**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Vai al tuo **nome ID Apple → iCloud → Protezione Avanzata dei Dati**. - [x] Attiva la **Protezione Avanzata dei Dati** @@ -225,9 +225,9 @@ AdGuard per iOS presenta delle funzionalità premium; tuttavia, il blocco di con [:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Codice sorgente" }
-Scarica +Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/it/multi-factor-authentication.md b/i18n/it/multi-factor-authentication.md index e1d21df7..de78cd7d 100644 --- a/i18n/it/multi-factor-authentication.md +++ b/i18n/it/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -Le **YubiKey** sono tra le chiavi di sicurezza più popolari. Alcuni modelli di YubiKey dispongono di un'ampia gamma di funzionalità, quali, l'autenticazione a [Secondo Fattore Universale (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 e WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Verifica dell'Identità Personale (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP e HOTP](https://developers.yubico.com/OATH). +Le **YubiKey** sono tra le chiavi di sicurezza più popolari. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -Uno dei benefici della YubiKey è che una chiave (YubiKey 5) può fare quasi tutto ciò che ti potresti aspettare da una chiave di sicurezza hardware. Ti incoraggiamo a svolgere il [quiz](https://www.yubico.com/quiz/) prima dell'acquisto, per assicurarti di compiere la scelta giusta. +Uno dei benefici della YubiKey è che una chiave (YubiKey 5) può fare quasi tutto ciò che ti potresti aspettare da una chiave di sicurezza hardware. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Home](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-La [tabella di confronto](https://www.yubico.com/store/compare/) mostra le funzionalità e come si confrontano le YubiKeys. Ti consigliamo vivamente di selezionare le chiavi tra le YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. Ti consigliamo vivamente di selezionare le chiavi tra le YubiKey 5 Series. -Le YubiKey sono programmabili utilizzando [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) o [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Per gestire i codici TOTP, puoi utilizzare [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). Tutti i client di Yubico sono open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). Tutti i client di Yubico sono open source. Per i modelli che supportano HOTP e TOTP, esistono 2 slot nell'interfaccia OTP che potrebbero essere utilizzati per HOTP e 32 slot per memorizzare i codici segreti TOTP. Questi codici segreti sono memorizzati e crittografati sulla chiave e non sono mai esposti ai dispositivi cui questa è collegata. Una volta fornito un seed (codice segreto condiviso) a Yubico Authenticator, questo fornirà soltanto il codice a sei cifre, mai il seed. Questo modello di sicurezza aiuta a limitare ciò che un malintenzionato può fare, qualora dovesse compromettere uno dei dispositivi che operano Yubico Authenticator, rendendo la YubiKey resistente agli attacchi fisici. @@ -46,17 +46,17 @@ Il firmware di YubiKey non è open source e non è aggiornabile. Se desideri ave **Nitrokey** dispone di una chiave di sicurezza che supporta [FIDO2 e WebAuthn] (basics/multi-factor-authentication.md#fido-fast-identity-online), detta **Nitrokey FIDO2**. Per il supporto PGP, devi acquistare un'altra delle loro chiavi, come la **Nitrokey Start**, la **Nitrokey Pro 2** o la **Nitrokey Storage 2**. -[:octicons-home-16: Home](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-La [tabella di confronto](https://www.nitrokey.com/#comparison) mostra le funzionalità e le differenze tra i modelli di Nitrokey. La **Nitrokey 3** elencata ha un insieme di funzionalità combinate. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. La **Nitrokey 3** elencata ha un insieme di funzionalità combinate. -I modelli di Nitrokey sono configurabili utilizzando l'[app di Nitrokey](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). Per i modelli che supportano HOTP e TOTP, ci sono 3 slot per HOTP e 15 per TOTP. Alcune Nitrokey possono fungere da gestori di password. Possono memorizzare fino a 16 credenziali differenti e crittografarle utilizzando la stessa password dell'interfaccia OpenPGP. @@ -74,7 +74,7 @@ Ripristinare l'interfaccia di OpenPGP su una Nitrokey, inoltre, renderà il data -La Nitrokey Pro 2, Nitrokey Storage 2 e l'imminente Nitrokey 3 supportano la verifica dell'integrità del sistema per i portatili con il firmware [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/). +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Il firmware di Nitrokey è open source, a differenza di YubiKey. Il firmware dei modelli NitroKey moderni (tranne che per **NitroKey Pro 2**) è aggiornabile. @@ -124,10 +124,10 @@ Consigliamo vivamente l'utilizzo delle app TOTP mobili, invece delle alternative [:octicons-code-16:](https://github.com/ente-io/auth){ .card-link title="Codice sorgente" }
-Download +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -144,10 +144,10 @@ Consigliamo vivamente l'utilizzo delle app TOTP mobili, invece delle alternative **Aegis Authenticator** è un'app gratuita, sicura e open source per gestire i token di verifica a due passaggi per i tuoi servizi online. Aegis Authenticator opera completamente offline/localmente, ma include l'opzione di esportare i token per il backup, a differenza di molte alternative. [:octicons-home-16: Homepage](https://getaegis.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribuisci } +[:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Scarica diff --git a/i18n/it/news-aggregators.md b/i18n/it/news-aggregators.md index a42c6804..40570018 100644 --- a/i18n/it/news-aggregators.md +++ b/i18n/it/news-aggregators.md @@ -18,10 +18,10 @@ Un [aggregatore di notizie](https://en.wikipedia.org/wiki/News_aggregator) conse **Akregator** è un aggregatore di notizie, parte del progetto [KDE](https://kde.org). Dispone di funzionalità di ricerca veloce, archiviazione avanzata e un browser interno per la facile lettura delle notizie. [:octicons-home-16: Homepage](https://apps.kde.org/akregator){ .md-button .md-button--primary } -[:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentazione} -[:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribuisci } +[:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} +[:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Scarica @@ -82,10 +82,10 @@ Un [aggregatore di notizie](https://en.wikipedia.org/wiki/News_aggregator) conse **Fluent Reader** è un aggregatore di notizie multipiattaforma e sicuro, che dispone di utili funzionalità per la privacy, come l'eliminazione dei cookie all'uscita, rigide [politiche di sicurezza dei contenuti (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) e supporto al proxy, a significare che puoi utilizzarlo su [Tor](tor.md). [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribuisci } +[:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute }
Scarica @@ -121,15 +121,15 @@ Un [aggregatore di notizie](https://en.wikipedia.org/wiki/News_aggregator) conse **NetNewsWire** è un lettore di feed gratuito e open source per macOS e iOS, incentrato su una serie di funzionalità e una progettazione native. Supporta i formati tipici dei feed, insieme al supporto integrato per i feed di Reddit. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
-Scarica +Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -177,8 +177,8 @@ Reddit consente d'iscriverti ai subreddit tramite RSS. Sostituisci `[SUBREDDIT]` con il subreddit a cui desideri iscriverti. -```testo -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +```text +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -190,10 +190,10 @@ Puoi iscriverti ai canali di YouTube senza accedere e associare le informazioni

Esempio

-Per iscriverti a un canale YouTube con un client RSS, cerca innanzitutto il [codice del canale](https://support.google.com/youtube/answer6180214). Il codice del canale si trova nella pagina informativa del canale YouTube a cui ci si vuole abbonare, alla voce **Informazioni** > **Condividi** > **Copia ID canale**. Sostituisci l'`[ID CANALE]` di seguito: +Per iscriverti a un canale YouTube con un client RSS, cerca innanzitutto il [codice del canale](https://support.google.com/youtube/answer6180214). Il codice del canale si trova nella pagina informativa del canale YouTube a cui ci si vuole abbonare, alla voce **Informazioni** > **Condividi** > **Copia ID canale**. Replace `[CHANNEL ID]` below: -``testo -https://www.youtube.com/feeds/videos.xml?channel_id=[ID CANALE] +```text +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ```
diff --git a/i18n/it/notebooks.md b/i18n/it/notebooks.md index ba9d00ee..ca802cfb 100644 --- a/i18n/it/notebooks.md +++ b/i18n/it/notebooks.md @@ -26,7 +26,7 @@ Se stai utilizzando un'applicazione come Evernote, Google Keep o Microsoft OneNo [:octicons-heart-16:](https://standardnotes.com/donate){ .card-link title=Contribuisci }
-Download +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.standardnotes) - [:simple-appstore: App Store](https://apps.apple.com/app/id1285392450) @@ -34,7 +34,7 @@ Se stai utilizzando un'applicazione come Evernote, Google Keep o Microsoft OneNo - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,24 +46,24 @@ Se stai utilizzando un'applicazione come Evernote, Google Keep o Microsoft OneNo ![Logo di Notesnook](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** è un'app di appunti libera e open source, incentrata sulla privacy degli utenti e la facilità d'uso. Dispone di crittografia end-to-end su tutte le piattaforme, con una potente sincronizzazione per prendere appunti mentre sei in giro. Puoi importare facilmente le tue note da Evernote, OneNote e molte altre app, utilizzando la loro funzionalità d'[importazione ufficiale](https://importer.notesnook.com/). +**Notesnook** è un'app di appunti libera e open source, incentrata sulla privacy degli utenti e la facilità d'uso. Dispone di crittografia end-to-end su tutte le piattaforme, con una potente sincronizzazione per prendere appunti mentre sei in giro. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Pagina Home](https://notesnook.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute }
-Download +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook consente la crittografia delle note locali solo con la funzione [priva **Joplin** è un'applicazione gratuita, open source e completa di appunti e liste, che può gestire molte note in Markdown, organizzate in blocchi note e tag. Offre l'E2EE e può sincronizzarsi con Nextcloud, Dropbox e molto altro. Offre anche la possibilità di importare facilmente note da Evernote e note in testo semplice. -[:octicons-home-16: Pagina Home](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
-Download +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -135,9 +135,9 @@ Cryptee offre 100MB di archiviazione gratuiti, con opzioni a pagamento se necess
-![Logo di Org-mode](assets/img/notebooks/org-mode.svg){ align=right } +![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** è una [modalità principale](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) per GNU Emacs. Org-mode serve a prendere appunti, mantenere gli elenchi di attività, pianificare progetti e scrivere documenti con un sistema veloce ed efficiente di testo semplice. La sincronizzazione è possibile con gli strumenti di [sincronizzazione dei file](file-sharing.md#file-sync). +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode serve a prendere appunti, mantenere gli elenchi di attività, pianificare progetti e scrivere documenti con un sistema veloce ed efficiente di testo semplice. La sincronizzazione è possibile con gli strumenti di [sincronizzazione dei file](file-sharing.md#file-sync). [:octicons-home-16: Home](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentazione} diff --git a/i18n/it/os/android-overview.md b/i18n/it/os/android-overview.md index b394e72a..7309d624 100644 --- a/i18n/it/os/android-overview.md +++ b/i18n/it/os/android-overview.md @@ -60,7 +60,7 @@ Inoltre, molti OEM dispongono di un'implementazione corrotta dell'Avvio Verifica Gli aggiornamenti del firmware sono fondamentali per mantenere la sicurezza e, senza di essi, il tuo dispositivo non può essere sicuro. Gli OEM stipulano accordi di supporto coi propri partner per fornire i componenti closed source per un periodo di supporto limitato. Questi sono mensilmente riportati nei [Bollettini di Sicurezza di Android](https://source.android.com/security/bulletin). -Poiché i componenti del telefono, come il processore e le tecnologie radio, si affidano a componenti closed source, gli aggiornamenti devono essere forniti dai rispettivi produttori. Dunque, è importante che tu acquisti un dispositivo entro un ciclo di supporto attivo. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) e [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) supportano i propri dispositivi per 4 anni, mentre i prodotti più economici prevedono spesso cicli di supporto più brevi. Con l'introduzione del [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google produce ora il proprio SoC e fornirà un supporto di almeno 5 anni. Con l'introduzione della serie Pixel 8, Google ha aumentato la finestra di supporto a 7 anni. +Poiché i componenti del telefono, come il processore e le tecnologie radio, si affidano a componenti closed source, gli aggiornamenti devono essere forniti dai rispettivi produttori. Dunque, è importante che tu acquisti un dispositivo entro un ciclo di supporto attivo. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. Con l'introduzione del [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google produce ora il proprio SoC e fornirà un supporto di almeno 5 anni. Con l'introduzione della serie Pixel 8, Google ha aumentato la finestra di supporto a 7 anni. I dispositivi EOL, non più supportati dal produttore del SoC, non possono ricevere aggiornamenti del firmware dai fornitori OEM o dai distributori di ricambi per Android. Ciò significa che i problemi di sicurezza di questi dispositivi non saranno risolti. @@ -97,19 +97,19 @@ Android 13: Un'app potrebbe richiedere un'autorizzazione per una sua funzionalità specifica. Ad esempio, ogni app capace di scansionare i codici QR, richiederà l'autorizzazione all'utilizzo della fotocamera. Alcune app possono richiedere più autorizzazioni di quelle necessarie. -[Exodus](https://exodus-privacy.eu.org/) può essere utile se devi confrontare app con scopi simili. Se un'app richiede molte autorizzazioni e contiene molti annunci e analisi, è probabilmente un brutto segno. Consigliamo di esaminare i singoli tracker e di leggerne le descrizioni piuttosto che limitarsi a **contarne il totale** e supporre che tutte le voci elencate siano uguali. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. Se un'app richiede molte autorizzazioni e contiene molti annunci e analisi, è probabilmente un brutto segno. Consigliamo di esaminare i singoli tracker e di leggerne le descrizioni piuttosto che limitarsi a **contarne il totale** e supporre che tutte le voci elencate siano uguali.

Avviso

-Se un'app è prevalentemente un servizio basato su web, il tracciamento potrebbe verificarsi dal lato del server. [Facebook](https://reports.exodus-privacy.eu.org/it/reports/com.facebook.katana/latest/) mostra "nessun tracciatore", ma traccia sicuramente gli interessi e comportamenti degli utenti sul sito. Le app potrebbero eludere il rilevamento non utilizzando le librerie di codice standard prodotte dall'industria pubblicitaria, sebbene sia improbabile. +Se un'app è prevalentemente un servizio basato su web, il tracciamento potrebbe verificarsi dal lato del server. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Le app potrebbero eludere il rilevamento non utilizzando le librerie di codice standard prodotte dall'industria pubblicitaria, sebbene sia improbabile.

Nota

-Le app che rispettano la privacy come [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) potrebbero mostrare dei tracciatori come [Google Firebase Analytics](https://reports.exodus.privacy.eu.org/en/trackers/49/). Questa libreria include [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) che può fornire [notifiche push](https://en.wikipedia.org/wiki/Push_technology) nelle app. Questo [è il caso] (https://fosstodon.org/@bitwarden/109636825700482007) di Bitwarden. Ciò non significa che Bitwarden sta utilizzando tutte le funzionalità analitiche fornite da Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). Questa libreria include [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) che può fornire [notifiche push](https://en.wikipedia.org/wiki/Push_technology) nelle app. Questo [è il caso] (https://fosstodon.org/@bitwarden/109636825700482007) di Bitwarden. Ciò non significa che Bitwarden sta utilizzando tutte le funzionalità analitiche fornite da Google Firebase Analytics.
@@ -145,20 +145,20 @@ Se utilizzi un dispositivo provvisto dei servizi di Google, il tuo sistema opera ### Programma di protezione avanzata -Se possiedi un profilo Google, ti suggeriamo di iscriverti al [Programma di Protezione Avanzata](https://landing.google.com/advancedprotection/). È disponibile gratuitamente a costo zero per chiunque possieda due o più chiavi di sicurezza hardware con supporto a [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online). +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). È disponibile gratuitamente a costo zero per chiunque possieda due o più chiavi di sicurezza hardware con supporto a [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online). Il Programma di Protezione Avanzata fornisce un migliore monitoraggio delle minacce, e consente: - Autenticazione a due fattori più rigida; ad esempio, [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **deve** essere utilizzato e non è consentito l'uso di [SMS OTP](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) e [OAuth](https://en.wikipedia.org/wiki/OAuth) - L'accesso ai dati del profilo soltanto a Google e alle app verificate di terze parti - Scansione delle email in entrata sui profili Gmail, in cerca di tentativi di [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) -- [Scansione del browser sicura](https://www.google.com/chrome/privacy/whitepaper.html#malware) e più rigida, con Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Processo di recupero più rigido per i profili con credenziali perdute - Se utilizzi Google Play Services non 'sandboxed' (comune sui sistemi operativi di fabbrica), il Programma di Protezione Avanzata fornisce anche dei [benefici aggiuntivi](https://support.google.com/accounts/answer/9764949?hl=en), come: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Non permette l'installazione di app al di fuori del Google Play Store, dell'app store del fornitore del sistema operativo o tramite [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Scansione del dispositivo automatica e obbligatoria con [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Avviso sulle applicazioni non verificate ### Aggiornamenti di Sistema di Google Play @@ -169,7 +169,7 @@ Se possiedi un dispositivo al termine della vita, distribuito con Android 10 o s ### ID pubblicitario -Tutti i dispositivi con Google Play Services installata automaticamente, generano un [ID pubblicitario](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en), utilizzando per la pubblicità mirata. Disabilita questa funzionalità per limitare i dati raccolti su di te. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disabilita questa funzionalità per limitare i dati raccolti su di te. Sulle distribuzioni Android con [Google Play in modalità sandbox](https://grapheneos.org/usage#sandboxed-google-play), vai su :gear: **Impostazioni** → **App** → **Sandboxed Google Play** → **Impostazioni di Google** → **Pubblicità** e seleziona *Elimina ID pubblicitario*. diff --git a/i18n/it/os/ios-overview.md b/i18n/it/os/ios-overview.md index 6083cc0d..0d6235d6 100644 --- a/i18n/it/os/ios-overview.md +++ b/i18n/it/os/ios-overview.md @@ -22,7 +22,7 @@ La sola fonte di app su iOS è l'App Store di Apple, che richiede un Apple ID pe ### Telemetria Invadente -Apple ha storicamente avuto problemi con l'adeguata anonimizzazione della propria telemetria, su iOS. [Nel 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), si è scoperto che Apple trasmette le registrazioni di Siri, alcune contenenti informazioni altamente confidenziali, ai propri server, per la revisione manuale da contraenti di terze parti. Sebbene tale programma sia stato temporaneamente interrotto dopo l'[ampia segnalazione](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana) di tale pratica, il problema non è stato completamente risolto [fino al 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple ha storicamente avuto problemi con l'adeguata anonimizzazione della propria telemetria, su iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). Di recente, si è scoperto che Apple [trasmette dati analitici anche quando la condivisione degli stessi è disattivata](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) su iOS, e questi dati [sembrano](https://twitter.com/mysk_co/status/1594515229915979776) essere facilmente collegabili agli identificativi univoci dell'account iCloud, nonostante siano presumibilmente anonimi. @@ -54,7 +54,7 @@ In cima all'app delle **Impostazioni**, visualizzerai il tuo nome e la tua foto #### Find My -**Find My** è un servizio che ti consente di tracciare i tuoi dispositivi Apple e di condividere la tua posizione con i tuoi amici e la tua famiglia. Inoltre, ti consente di svuotare da remoto il tuo dispositivo, in caso di furto, impedendo ai ladri di accedere ai tuoi dati. I [dati sulla posizione](https://www.apple.com/legal/privacy/data/en/find-my/) di Find My sono E2EE, quando: +**Find My** è un servizio che ti consente di tracciare i tuoi dispositivi Apple e di condividere la tua posizione con i tuoi amici e la tua famiglia. Inoltre, ti consente di svuotare da remoto il tuo dispositivo, in caso di furto, impedendo ai ladri di accedere ai tuoi dati. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - La tua posizione è condivisa con un membro della famiglia o amico, ed entrambi utilizzate iOS 15 o superiore. - Il tuo dispositivo è offline ed è individuato dalla Rete di Find My. @@ -117,7 +117,7 @@ Se non desideri che qualcuno possa controllare il tuo telefono con Siri, quando Impostare una password forte sul tuo telefono è il passo più importante che puoi intraprendere per la sicurezza fisica del dispositivo. In questo caso dovrai trovare un compromesso tra la sicurezza e la comodità: una password più lunga sarà noiosa da digitare ogni volta, ma una password o un PIN più breve sarà più facile da indovinare. Configurare Face ID o TouchID insieme a una password forte, può costituire un buon compromesso tra utilizzabilità e sicurezza. -Seleziona **Attiva Passcode** o **Modifica Passcode** > **Opzioni Passcode** > **Codice Alfanumerico Personalizzato**. Assicurati di creare una [password sicura](https://www.privacyguides.org/basics/passwords-overview/). +Seleziona **Attiva Passcode** o **Modifica Passcode** > **Opzioni Passcode** > **Codice Alfanumerico Personalizzato**. Make sure that you create a [secure password](../basics/passwords-overview.md). Se desideri utilizzare Face ID o Touch ID, puoi ora procedere alla configurazione. Il tuo telefono utilizzerà la password configurata in precedenza come ripiego, nel caso in cui la tua verifica biometrica dovesse fallire. I metodi biometrici di sblocco sono principalmente una comodità, sebbene impediscano alle telecamere di sicurezza o alle persone alle tue spalle di guardarti inserire il tuo codice d'accesso. @@ -129,7 +129,7 @@ Su alcuni dispositivi precedenti, potresti dover premere cinque volte il tasto d - [x] Seleziona **Attiva la protezione** -Dopo aver abilitato la protezione dei dati rubati, [alcune azioni](https://support.apple.com/en-us/HT212510) richiederanno l'autenticazione biometrica senza una password di riserva (nel caso in cui uno "shoulder surfer" abbia ottenuto il PIN), come ad esempio l'utilizzo del riempimento automatico della password, l'accesso alle informazioni di pagamento e la disattivazione della modalità smarrito. Aggiunge inoltre un ritardo di sicurezza ad alcune azioni eseguite fuori casa o in un altro "luogo familiare", come la richiesta di un timer di un'ora per reimpostare la password dell'ID Apple o per uscire dal proprio ID Apple. Questo ritardo ha lo scopo di dare all'utente il tempo di attivare la Modalità smarrito e di proteggere il proprio account prima che un ladro possa resettare il dispositivo. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. Aggiunge inoltre un ritardo di sicurezza ad alcune azioni eseguite fuori casa o in un altro "luogo familiare", come la richiesta di un timer di un'ora per reimpostare la password dell'ID Apple o per uscire dal proprio ID Apple. Questo ritardo ha lo scopo di dare all'utente il tempo di attivare la Modalità smarrito e di proteggere il proprio account prima che un ladro possa resettare il dispositivo. **Consenti Accesso Da Bloccato** ti offre delle opzioni per consentire l'accesso quando il telefono è bloccato. Più di queste opzioni disabiliti, minori saranno le azioni disponibili a qualcuno senza la tua password, ma meno comodo sarà per te. Seleziona e scegli quali di queste non desideri siano accessibili a qualcuno, qualora dovesse impossessarsi del tuo telefono. @@ -187,7 +187,7 @@ Disabilita gli **Annunci Personalizzati**, se non desideri ricevere annunci mira - [x] Seleziona **Attiva Rapporto sulla Privacy delle App** -La [Modalità Lockdown](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) è un'impostazione di sicurezza che puoi abilitare per rendere il tuo telefono più resistente agli attacchi. Sappi che certe app e funzionalità [non funzioneranno](https://support.apple.com/en-us/HT212650) come di norma. +La [Modalità Lockdown](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) è un'impostazione di sicurezza che puoi abilitare per rendere il tuo telefono più resistente agli attacchi. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Seleziona **Attiva Modalità Lockdown** diff --git a/i18n/it/os/linux-overview.md b/i18n/it/os/linux-overview.md index fbeccaac..b921d32f 100644 --- a/i18n/it/os/linux-overview.md +++ b/i18n/it/os/linux-overview.md @@ -15,12 +15,12 @@ Il nostro sito web utilizza generalmente il termine "Linux" per descrivere le di Esistono alcune notevoli preoccupazioni sulla privacy con Linux, di cui dovresti essere consapevole. Nonostante tali svantaggi, le distribuzioni di Linux per desktop sono comunque ottime per gran parte delle persone che desiderano: - Evitare la telemetria fornita dai sistemi operativi proprietari -- Mantenere la [libertà del software](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Utilizzare sistemi incentrati sulla privacy come [Whonix](https://www.whonix.org) o [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Sicurezza Open Source -È una convinzione [comunemente errata](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) che Linux e altri software open source siano intrinsecamente sicuri semplicemente perché il codice sorgente è disponibile. Ci si aspetta che la verifica della community si verifichi regolarmente, ma ciò non è sempre [il caso](https://seirdy.one/posts/2022/02/02/floss-security/). +È una convinzione [comunemente errata](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) che Linux e altri software open source siano intrinsecamente sicuri semplicemente perché il codice sorgente è disponibile. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In realtà, la sicurezza della distribuzione dipende da numerosi fattori, come l'attività del progetto, l'esperienza dello sviluppatore, il livello di rigore applicato alle revisioni del codice e quanto spesso è data attenzione a parti specifiche della base di codice, che potrebbero non essere toccate per anni. @@ -30,9 +30,9 @@ Al momento, il desktop Linux [è indietro rispetto alle alternative](https://dis - L'**avvio verificato** su Linux non è robusto come le alternative, quali l'[Avvio Sicuro](https://support.apple.com/guide/security/secac71d5623/web) di Apple o l'[Avvio Verificato](https://source.android.com/security/verifiedboot) di Android. L'avvio verificato impedisce la manomissione persistente da parte di malware e da [attacchi evil maid](https://en.wikipedia.org/wiki/Evil_Maid_attack), ma è ancora in gran parte [non disponibile, anche sulle distribuzioni più avanzate](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- Il **sandboxing forte** per le app su Linux è fortemente carente, anche con app containerizzate, come Flatpaks, o le soluzioni di sandbox, come Firejail. Flatpak è l'utlità di sandboxing più promettente per Linux finora, ma è ancora carente in molte aree e consente [valori predefiniti non sicuri](https://flatkill.org/2020/), che consentono a gran parte delle app di superare banalmente tale sandbox. +- Il **sandboxing forte** per le app su Linux è fortemente carente, anche con app containerizzate, come Flatpaks, o le soluzioni di sandbox, come Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Inoltre, Linux è in ritardo nell'implementazione delle [mitigazioni di exploit](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations), che sono ora lo standard sugli altri sistemi operativi, come Arbitrary Code Guard su Windows o Hardened Runtime su macOS. Inoltre, gran parte dei programmi per Linux e Linux stesso sono programmati in linguaggi non sicuri per la memoria. I bug di corruzione della memoria sono responsabili per [gran parte delle vulnerabilità](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) risolte e cui è stato assegnato un CVE. Sebbene ciò sia vero anche per Windows e per macOS, stanno rapidamente facendo progressi nell'adottare linguaggi sicuri per la memoria, come Rust e Swift, rispettivamente, mentre non sembra esistere un simile sforzo per la riscrittura di Linux in un linguaggio sicuro per la memoria, come Rust. +Inoltre, Linux è in ritardo nell'implementazione delle [mitigazioni di exploit](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations), che sono ora lo standard sugli altri sistemi operativi, come Arbitrary Code Guard su Windows o Hardened Runtime su macOS. Inoltre, gran parte dei programmi per Linux e Linux stesso sono programmati in linguaggi non sicuri per la memoria. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. Sebbene ciò sia vero anche per Windows e per macOS, stanno rapidamente facendo progressi nell'adottare linguaggi sicuri per la memoria, come Rust e Swift, rispettivamente, mentre non sembra esistere un simile sforzo per la riscrittura di Linux in un linguaggio sicuro per la memoria, come Rust. ## Scegliere la tua distribuzione @@ -42,9 +42,9 @@ Non tutte le distribuzioni Linux sono uguali. La nostra [pagina di consigli per Ti consigliamo vivamente di scegliere le distribuzioni che restano vicine alle release stabili a monte del software, spesso note come distribuzioni a rilascio continuo. Questo perché le distribuzioni a rilascio congelato, spesso, non aggiornano le versioni dei pacchetti e restano indietro con gli aggiornamenti di sicurezza. -Per le distribuzioni congelate come [Debian](https://www.debian.org/security/faq#handling), i manutentori dei pacchetti dovrebbero effettuare il backport delle patch per correggere le vulnerabilità, piuttosto che portare il software alla "versione successiva", rilasciata dallo sviluppatore a monte. Alcune correzioni di sicurezza [non](https://arxiv.org/abs/2105.14565) ricevono affatto un [ID CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (software particolarmente meno popolare) e, dunque, non arrivano alla distribuzione con questo modello di correzione. Di conseguenza, talvolta, le correzioni di sicurezza minori sono rimandate alla versione principale successiva. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Alcune correzioni di sicurezza [non](https://arxiv.org/abs/2105.14565) ricevono affatto un [ID CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (software particolarmente meno popolare) e, dunque, non arrivano alla distribuzione con questo modello di correzione. Di conseguenza, talvolta, le correzioni di sicurezza minori sono rimandate alla versione principale successiva. -Non crediamo che trattenere i pacchetti e applicare patch provvisorie sia una buona idea, poiché si discosta dal modo in cui lo sviluppatore avrebbe voluto che il software funzionasse. [Richard Brown](https://rootco.de/aboutme/) ha una presentazione a riguardo: +Non crediamo che trattenere i pacchetti e applicare patch provvisorie sia una buona idea, poiché si discosta dal modo in cui lo sviluppatore avrebbe voluto che il software funzionasse. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch e le distribuzioni basate su Arch sono sconsigliate per coloro che sono all Per avere un sistema sicuro, si suppone che tu abbia una conoscenza sufficiente di Linux per configurarne adeguatamente la sicurezza, come adottando un sistema di [controllo obbligatorio dell'accesso](https://en.wikipedia.org/wiki/Mandatory_access_control), configurando liste nere del [modulo del kernel](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security), rafforzando la sicurezza dei parametri d'avvio, manipolando i parametri [sysctl](https://en.wikipedia.org/wiki/Sysctl) e conoscendo quali componenti necessitano, come [Polkit](https://en.wikipedia.org/wiki/Polkit). -Chiunque utilizzi il [Repository di Arch User (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository), **deve** essere a proprio agio nel controllare i PKGBUILD che scarica da tale servizio. I pacchetti AUR sono contenuti prodotti dalla community e non sono controllati in alcun modo e, dunque, sono vulnerabili agli attacchi alla catena di distribuzione dei softwre, che, difatti, si sono verificati [in passato](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Chiunque utilizzi il [Repository di Arch User (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository), **deve** essere a proprio agio nel controllare i PKGBUILD che scarica da tale servizio. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). L'AUR dovrebbe sempre essere utilizzata con parsimonia e, spesso, esistono molti cattivi consigli, su varie pagine, che indirizzano le persone a utilizzare ciecamente gli [aiutanti AUR](https://wiki.archlinux.org/title/AUR_helpers), senza avvertimenti sufficienti. Simili avvertenze si applicano all'utilizzo di Archivi di Pacchetti Personali (PPA) di terze parti sulle distribuzioni basate su Debian, o dei Progetti della Community (COPR) su Fedora. @@ -83,11 +83,11 @@ Se sei esperto con Linux e vorresti utilizzare una distribuzione basata su Arch, Inoltre, **sconsigliamo**, nello specifico, questi due derivati di Arch: - **Manjaro**: Questa distribuzione trattiene i pacchetti per 2 settimane per assicurarsi che le proprie modifiche non si corrompano, non per assicurarsi che, tutto sia stabile a monte. Utilizzando i pacchetti AUR, sono spesso compilati con le [librerie](https://en.wikipedia.org/wiki/Library_(computing)) più recenti dai repository di Arch. -- **Garuda**: Utilizza [Chaotic-AUR](https://aur.chaotic.cx/) che compila automaticamente e alla cieca i pacchetti da AUR. Non esiste alcun processo di verifica per assicurarsi che i pacchetti di AUR non subiscano attacchi alla catena di distribuzione del software. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. Non esiste alcun processo di verifica per assicurarsi che i pacchetti di AUR non subiscano attacchi alla catena di distribuzione del software. ### Distribuzioni del kernel libero di Linux e "Libre" -**Sconsigliamo** l'utilizzo del kernel libero di Linux, poiché [rimuove delle mitigazioni di sicurezza](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) e [sopprime gli avvertimenti del kernel](https://news.ycombinator.com/item?id=29674846), sul microcodice vulnerabile. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## Consigli generali @@ -95,7 +95,7 @@ Inoltre, **sconsigliamo**, nello specifico, questi due derivati di Arch: Molte delle distribuzioni Linux offrono un opzione nel proprio programma d'installazione per abilitare la FDE di [LUKS](../encryption.md#linux-unified-key-setup). Se questa opzione non viene impostata durante l'installazione, dovrai fare il backup dei tuoi dati e reinstallare, in quanto la crittografia viene applicata dopo [la partizione del disco](https://en.wikipedia.org/wiki/Disk_partitioning), ma prima della formattazione dei [file di sistema](https://en.wikipedia.org/wiki/File_system). Inoltre, suggeriamo di svuotare il tuo dispositivo di archiviazione: -- [Cancellazione sicura dei dati :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Cancellazione sicura dei dati :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ Se richiedi la funzionalità di sospensione su disco (ibernazione), dovresti com ### Wayland -Consigliamo di utilizzare un ambiente desktop che supporti il protocollo di visualizzazione di [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)), sviluppato tenendo [a mente](https://lwn.net/Articles/589147/) la sicurezza. Il suo predecessore ([X11](https://en.wikipedia.org/wiki/X_Window_System)) non supporta l'isolamento della GUI, che consente a qualsiasi finestra di [registrare e iniettare input in altre finestre](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), rendendo futile qualsiasi tentativo di sandboxing. Sebbene esistano delle opzioni per eseguire X11 nidificato, quali [Xpra](https://en.wikipedia.org/wiki/Xpra) o [Xephyr](https://en.wikipedia.org/wiki/Xephyr), queste, spesso, presentano delle conseguenze negative sulle prestazioni e non sono né comode da configurare, né preferibili a Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Il suo predecessore ([X11](https://en.wikipedia.org/wiki/X_Window_System)) non supporta l'isolamento della GUI, che consente a qualsiasi finestra di [registrare e iniettare input in altre finestre](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), rendendo futile qualsiasi tentativo di sandboxing. Sebbene esistano delle opzioni per eseguire X11 nidificato, quali [Xpra](https://en.wikipedia.org/wiki/Xpra) o [Xephyr](https://en.wikipedia.org/wiki/Xephyr), queste, spesso, presentano delle conseguenze negative sulle prestazioni e non sono né comode da configurare, né preferibili a Wayland. -Fortunatamente, [i compositori wayland](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) come quelli inclusi con [GNOME](https://www.gnome.org) e [KDE Plasma](https://kde.org) ora hanno un buon supporto per Wayland insieme ad altri compositori che usano [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (ad esempio [Sway](https://swaywm.org)). Alcune distribuzioni come Fedora e Tumbleweed lo utilizzano di default, mentre altre potrebbero farlo in futuro, dato che X11 è in [modalità di manutenzione](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). Se stai utilizzando uno di questi ambienti è molto facile, basta selezionare la sessione “Wayland” nel gestore dello schermo del desktop([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). Se stai utilizzando uno di questi ambienti è molto facile, basta selezionare la sessione “Wayland” nel gestore dello schermo del desktop([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). **Sconsigliamo** di usare ambienti desktop o gestori di finestre che non hanno il supporto per Wayland, come Cinnamon (è di default su Linux Mint), Pantheon (è di default su Elementary OS), MATE, Xfce, e i3. ### Firmware Proprietario (Aggiornamenti al Microcodice) -Alcune distribuzioni di Linux (come le distribuzioni fai da te o basate su [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)), non dispongono degli aggiornamenti proprietari al [microcodice](https://en.wikipedia.org/wiki/Microcode), che correggono le vulnerabilità di sicurezza critiche. Alcuni esempi significativi di queste vulnerabilità includono [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), e altre [vulnerabilità hardware](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Alcune distribuzioni di Linux (come le distribuzioni fai da te o basate su [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)), non dispongono degli aggiornamenti proprietari al [microcodice](https://en.wikipedia.org/wiki/Microcode), che correggono le vulnerabilità di sicurezza critiche. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). **Consigliamo vivamente** che installi gli aggiornamenti al microcodice, poiché contengono importanti correzioni di sicurezza per la CPU, che non sono completamente mitigabili dal solo software. Sia Fedora che openSUSE hanno gli aggiornamenti del microcodice applicati di default. @@ -131,11 +131,11 @@ Inoltre, alcune distribuzioni non scaricano in automatico gli aggiornamenti del Molte distribuzioni di Linux per desktop (Fedora, openSUSE, etc.), dispongono di [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) per configurare le impostazioni Ethernet e Wi-Fi. -È possibile [randomizzare](https://fedoramagazine.org/randomize-mac-address-nm/) [l'indirizzo MAC](https://en.wikipedia.org/wiki/MAC_address) quando si utilizza NetworkManager. Ciò fornisce una privacy lievemente migliore sulle reti Wi-Fi, complicando il tracciamento di dispositivi specifici sulla rete cui sei connesso. [**Non**](https://papers.mathyvanhoef.com/wisec2016.pdf) ti rende anonimo. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. Ciò fornisce una privacy lievemente migliore sulle reti Wi-Fi, complicando il tracciamento di dispositivi specifici sulla rete cui sei connesso. [**Non**](https://papers.mathyvanhoef.com/wisec2016.pdf) ti rende anonimo. -Consigliamo di modificare l'impostazione a **casuale**, invece che a **stabile**, come suggerito nell'[articolo](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -Se stai utilizzando [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), dovrai impostare [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=), che abiliterà [RFC 7844 (Profili Anonimi per i Client DHCP)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). La randomizzazione dell'indirizzo MAC è utile soprattutto per le connessioni Wi-Fi. Per le connessioni Ethernet, la randomizzazione dell'indirizzo MAC offre pochi vantaggi (o addirittura nessuno), perché un amministratore di rete può facilmente identificare il tuo dispositivo con altri mezzi (ad esempio ispezionando la porta a cui sei connesso sullo switch di rete). La randomizzazione degli indirizzi MAC del Wi-Fi dipende dal supporto del firmware del Wi-Fi. @@ -151,6 +151,6 @@ Esistono altri identificatori di sistema a cui dovresti prestare attenzione. Dov Fedora Project [conteggia](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) quanti sistemi univoci accedono ai suoi mirror, utilizzando una variabile [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description), invece di un ID univoco. Fedora lo fa per determinare il carico e fornire server migliori per gli aggiornamenti, quando necessario. -Quest'[opzione](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) è disabilitata di default. Consigliamo di aggiungere `countme=false` a `/etc/dnf/dnf.conf` nel caso in cui venga abilitato in futuro. Sui sistemi che utilizzano `rpm-ostree`, come Silverblue, l'opzione countme è disabilitata mascherando il timer [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/). +Quest'[opzione](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) è disabilitata di default. Consigliamo di aggiungere `countme=false` a `/etc/dnf/dnf.conf` nel caso in cui venga abilitato in futuro. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. anche openSUSE utilizza un [ID unico](https://en.opensuse.org/openSUSE:Statistics) per contare i sistemi, che può essere disabilitato cancellando il file `/var/lib/zypp/AnonymousUniqueId`. diff --git a/i18n/it/os/macos-overview.md b/i18n/it/os/macos-overview.md index 0b6ebb15..3c4becf1 100644 --- a/i18n/it/os/macos-overview.md +++ b/i18n/it/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS è il sistema operativo desktop di Apple che opera con il lor **macOS** è un sistema operativo Unix sviluppato da Apple per i propri computer Mac. Per migliorare la privacy su macOS, puoi disabilitare le funzionalità di telemetria e rafforzare le impostazioni di privacy e sicurezza esistenti. -I più datati Mac e Hackintosh basati su Intel non supportano tutte le funzionalità di sicurezza offerte da macOS. Per migliorare la sicurezza dei dati, consigliamo di utilizzare un Mac più recente, con [Apple Silicon](https://support.apple.com/en-us/HT211814). +I più datati Mac e Hackintosh basati su Intel non supportano tutte le funzionalità di sicurezza offerte da macOS. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Note sulla Privacy @@ -22,13 +22,13 @@ macOS esegue controlli online quando apri un'app, per verificare che questa non Precedentemente, questi controlli erano eseguiti tramite un protocollo crittografato OCSP, le cui informazioni sulle app che esegui sulla tua rete, sarebbero potute trapelare. Apple ha aggiornato il proprio servizio OCSP per utilizzare la crittografia HTTPS nel 2021 e ha [pubblicato le informazioni](https://support.apple.com/HT202491) sulla propria politica di registrazione per questo servizio. Inoltre, hanno promesso di aggiungere un meccanismo per consentire alle persone di disattivare questo controllo online, sebbene questo non sia stato aggiunto a macOS fino a luglio 2023. -Sebbene [puoi](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) disattivare manualmente questo controllo in maniera relativamente facile, consigliamo di non farlo, a meno che non sia molto compromesso dai controlli di revoca eseguiti da macOS, poiché svolgono un ruolo importante nell'assicurarsi che le app compromesse siano bloccate dall'esecuzione. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Configurazione consigliata Il tuo profilo, quando configuri per la prima volta Mac, sarà un profilo Amministratore, avente privilegi maggiori di un profilo utente Standard. macOS presenta numerose protezioni che impediscono a malware e altri programmi di abusare dei tuoi privilegi da Amministratore, così che l'utilizzo di questo profilo sia, in generale, sicuro. -Tuttavia, exploit nelle utility protettive, come `sudo`, sono stati [scoperti in passato](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). Se desideri evitare la possibilità che i programmi che esegui abusino dei tuoi privilegi da Amministratore, potresti considerare di creare un secondo profilo utente Standard, da utilizzare per le operazioni quotidiane. Ciò presenta l'ulteriore beneficio di rendere più ovvio quando un'app necessita dell'accesso da amministratore, poiché ti richiederà le credenziali ogni volta. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). Se desideri evitare la possibilità che i programmi che esegui abusino dei tuoi privilegi da Amministratore, potresti considerare di creare un secondo profilo utente Standard, da utilizzare per le operazioni quotidiane. Ciò presenta l'ulteriore beneficio di rendere più ovvio quando un'app necessita dell'accesso da amministratore, poiché ti richiederà le credenziali ogni volta. Se utilizzi un secondo profilo, non è rigorosamente necessario connettersi al tuo profilo da Amministratore originale, dalla schermata d'accesso di macOS. Quando stai facendo qualcosa da utente Standard che richieda le autorizzazioni da Amministratore, il sistema dovrebbe richiederti l'autenticazione, dove puoi inserire le tue credenziali da Amministratore, pur essendo un utente Standard, una tantum. Apple fornisce [supporto](https://support.apple.com/HT203998) per nascondere il tuo profilo da Amministratore, se preferisci visualizzare un singolo profilo sulla tua schermata di accesso. @@ -128,7 +128,7 @@ Sui vecchi computer Mac basati su Intel, FileVault è la sola forma di crittogra ##### Modalità Lockdown -La [Modalità Lockdown](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disabilita alcune funzionalità per poter migliorare la sicurezza. Alcune app o funzionalità non funzioneranno allo stesso modo di quanto sono disattivate, ad esempio, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) e [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) sono disabilitate su Safari, con la Modalità di Lockdown abilitata. Consigliamo di abilitare la Modalità di Lockdown e di scoprire se impatta significativamente sul tuo utilizzo: è facile convivere con molte delle modifiche che effettua. +La [Modalità Lockdown](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disabilita alcune funzionalità per poter migliorare la sicurezza. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. Consigliamo di abilitare la Modalità di Lockdown e di scoprire se impatta significativamente sul tuo utilizzo: è facile convivere con molte delle modifiche che effettua. - [x] Clicca **Attiva** diff --git a/i18n/it/os/qubes-overview.md b/i18n/it/os/qubes-overview.md index a75cf8c2..0b5ecac8 100644 --- a/i18n/it/os/qubes-overview.md +++ b/i18n/it/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes è un sistema operativo basato sull'isolamento delle applicazioni all'interno delle *qube* (precedentemente chiamate "VM"), per una maggiore sicurezza. --- -[**Qubes OS**](../desktop.md#qubes-os) è un sistema operativo open-source che utilizza l'hypervisor [Xen](https://en.wikipedia.org/wiki/Xen) per fornire una forte sicurezza per il desktop computing attraverso le *qube* isolate (che sono macchine virtuali). Puoi assegnare ad ogni *qube* un livello di fiducia in base al suo scopo. Qubes OS fornisce sicurezza utilizzando l'isolamento. Permette solo azioni su base individuale e quindi è l'opposto della [enumerazione dei difetti](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) è un sistema operativo open-source che utilizza l'hypervisor [Xen](https://en.wikipedia.org/wiki/Xen) per fornire una forte sicurezza per il desktop computing attraverso le *qube* isolate (che sono macchine virtuali). Puoi assegnare ad ogni *qube* un livello di fiducia in base al suo scopo. Qubes OS fornisce sicurezza utilizzando l'isolamento. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## Come funziona Qubes OS? -Qubes utilizza la [compartimentazione](https://www.qubes-os.org/intro/) per mantenere il sistema sicuro. I Qube sono creati da modelli, predefiniti per Fedora, Debian e [Whonix](../desktop.md#whonix). Qubes OS ti consente anche di creare *qubes* [monouso](https://www.qubes-os.org/doc/how-to-use-disposables/). +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. I Qube sono creati da modelli, predefiniti per Fedora, Debian e [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
Il termine qubes viene gradualmente aggiornato per evitare di riferirsi ad essi come "macchine virtuali". @@ -20,7 +20,7 @@ Alcune informazioni riportate qui e nella documentazione di Quebes OS possono co ![Architettura Qubes](../assets/img/qubes/qubes-trust-level-architecture.png)
Architettura di Qubes, Crediti: Introduzione a Qubes OS
-Ogni qube ha un [bordo colorato](https://www.qubes-os.org/screenshots/) che può aiutarti a tenere traccia del dominio in cui viene eseguito. Ad esempio, potresti utilizzare un colore specifico per le operazioni bancarie, utilizzandone uno differente per un browser generico non affidabile. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. Ad esempio, potresti utilizzare un colore specifico per le operazioni bancarie, utilizzandone uno differente per un browser generico non affidabile. ![Bordo colorato](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Bordi delle finestre di Qubes, Crediti: Screenshot di Qubes
@@ -33,7 +33,7 @@ Qubes OS utilizza [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM per contr ### Copiare e incollare il testo -Puoi [copiare e incollare il testo](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) utilizzando `qvm-copy-to-vm` o le istruzioni seguenti: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Premi **Ctrl+C** per dire alla *qube* in cui ti trovi che vuoi copiare qualcosa. 2. Premi **Ctrl+Maiusc+C** per dire alla *qube* di rendere disponibile questo buffer negli appunti globali. @@ -47,13 +47,13 @@ Per copiare e incollare file e cartelle da una *qube* a un'altra, puoi usare l'o
I Qubes non hanno un proprio filesystem. -È possibile [copiare e spostare i file](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) tra *qubes*. Così facendo, le modifiche non vengono applicate immediatamente e sono facilmente annullabili, in caso di incidente. Quando si esegue un *qube*, non ha un filesystem persistente. Puoi creare e cancellare file, ma queste modifiche sono effimere. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. Così facendo, le modifiche non vengono applicate immediatamente e sono facilmente annullabili, in caso di incidente. Quando si esegue un *qube*, non ha un filesystem persistente. Puoi creare e cancellare file, ma queste modifiche sono effimere.
### Interazioni tra VM -Il [framework qrexec](https://www.qubes-os.org/doc/qrexec/) è una parte fondamentale di Qubes che consente la comunicazione tra i domini. Si basa sulla libreria di Xen *vchan*, che facilita l'[isolamento tramite politiche](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connettersi a Tor tramite una VPN @@ -73,9 +73,9 @@ I tuoi qube dovrebbero esser configurati similmente a come segue: ## Risorse aggiuntive -Per ulteriori informazioni si consiglia di consultare le ampie pagine di documentazione di Qubes OS presenti sul [sito web di Qubes OS](https://www.qubes-os.org/doc/). Le copie offline sono scaricabili dal [repository della documentazione](https://github.com/QubesOS/qubes-doc) di Qubes OS. +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Le copie offline sono scaricabili dal [repository della documentazione](https://github.com/QubesOS/qubes-doc) di Qubes OS. -- [Probabilmente il sistema operativo più sicuro al mondo](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Compartimentazione software vs. separazione fisica](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Suddividere la mia vita digitale in domini di sicurezza](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Articoli Correlati](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/it/passwords.md b/i18n/it/passwords.md index b0c19e46..3a260cc0 100644 --- a/i18n/it/passwords.md +++ b/i18n/it/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://it.wikipedia.org/wiki/KeePassXC applicationCategory: Gestore di password operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Gestore di password operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Gestore di password operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Gestore di password operatingSystem: - Windows @@ -127,7 +127,7 @@ I gestori di password ti consentono di memorizzare e gestire in sicurezza le pas I gestori di password integrati nei software, come i browser e i sistemi operativi, a volte non sono all'altezza di un software di gestione delle password dedicato. Il vantaggio di un gestore di password integrato è la buona integrazione con il software, ma spesso può essere molto semplice e privo di funzionalità per la privacy e la sicurezza rispetto alle alternative indipendenti. -Ad esempio, il gestore di password di Microsoft Edge non offre affatto E2EE. Il gestore di password Google dispone di E2EE [facoltativa](https://support.google.com/accounts/answer/11350823), e quello [di Apple](https://support.apple.com/en-us/HT202303) la offre di default. +Ad esempio, il gestore di password di Microsoft Edge non offre affatto E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -143,16 +143,16 @@ Questi gestori di password, le sincronizzano su un server su cloud per una facil **Bitwarden** è un gestore di password gratuito e open-source. L'obiettivo è quello di risolvere i problemi di gestione delle password per individui, team e organizzazioni aziendali. Bitwarden è una delle soluzioni migliori e più sicure per memorizzare tutti i vostri login e password, mantenendoli comodamente sincronizzati tra tutti i vostri dispositivi. -[:octicons-home-16: Pagina Home](https://bitwarden.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
-Download +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ Questi gestori di password, le sincronizzano su un server su cloud per una facil
-Inoltre, Bitwarden dispone di [Bitwarden Send](https://bitwarden.com/products/send/), che ti consente di condividere testi e file in sicurezza, con la [crittografia end-to-end](https://bitwarden.com/help/send-encryption). Una [password](https://bitwarden.com/help/send-privacy/#send-passwords) può essere richiesta insieme al link di invio. Bitwarden Send dispone inoltre di funzionalità di [cancellazione automatica](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). Una [password](https://bitwarden.com/help/send-privacy/#send-passwords) può essere richiesta insieme al link di invio. Bitwarden Send dispone inoltre di funzionalità di [cancellazione automatica](https://bitwarden.com/help/send-lifespan). Per poter condividere i file è necessario il [piano Premium](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans). Il piano gratuito consente esclusivamente la condivisione di testo. @@ -183,20 +183,20 @@ Il codice utilizzato dai server di Bitwarden è [open-source](https://github.com ![Logo di 1Password](assets/img/password-management/1password.svg){ align=right } -**1Password** è un gestore di password con una forte attenzione alla sicurezza e la facilità d'uso, che consente di archiviare password, carte di credito, licenze software e qualsiasi altra informazione sensibile in una cassaforte digitale sicura. La cassaforte personale è ospitata sui server di 1Password per una [tariffa mensile](https://1password.com/sign-up/). 1Password è [controllato](https://support.1password.com/security-assessments/) regolarmente e fornisce un'assistenza clienti eccezionale. 1Password è closed source; tuttavia, la sicurezza del prodotto è documentata in modo esauriente nel suo [white paper sulla sicurezza](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** è un gestore di password con una forte attenzione alla sicurezza e la facilità d'uso, che consente di archiviare password, carte di credito, licenze software e qualsiasi altra informazione sensibile in una cassaforte digitale sicura. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password è closed source; tuttavia, la sicurezza del prodotto è documentata in modo esauriente nel suo [white paper sulla sicurezza](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Pagina Home](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
-Download +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -222,10 +222,10 @@ Un vantaggio di 1Password rispetto a Bitwarden è il supporto di prima classe pe [:octicons-code-16:](https://gitlab.com/psono){ .card-link title="Codice sorgente" }
-Download +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -274,11 +274,11 @@ Queste opzioni ti consentono di gestire localmente un database di password critt **KeePassXC** è una biforcazione di KeePassX, una conversione nativa e multipiattaforma di KeePass Password Safe, mirata a estenderla e migliorarla con nuove funzionalità e correzioni di bug, per fornire un gestore di password open source, ricco di funzionalità, multipiattaforma e moderno. -[:octicons-home-16: Pagina Home](https://keepassxc.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Download @@ -304,10 +304,10 @@ KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikip **KeePassDX** è un gestore di password leggero per Android, che consente la modifica dei dati crittografati in un singolo file nel formato KeePass, e può compilare i moduli in un modo sicuro. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) consente lo sblocco dei contenuti cosmetici e dispone di funzionalità non standard del protocollo ma, soprattutto, aiuta e incoraggia lo sviluppo. -[:octicons-home-16: Pagina Home](https://www.keepassdx.com){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Download @@ -325,24 +325,24 @@ KeePassXC memorizza i suoi dati di esportazione come file [CSV](https://en.wikip ![Logo di Strongbox](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** è un gestore di password nativo e open source per iOS e macOS. Supportando sia i formati di KeePass che di Password Safe, è utilizzabile insieme ad altri gestori di password, come KeePassXC, sulle piattaforme non Apple. Impiegando un [modello freemium](https://strongboxsafe.com/pricing), Strongbox offre gran parte delle funzionalità sotto il proprio rango gratuito con [funzionalità](https://strongboxsafe.com/comparison/) più orientate alla comodità, come l'autenticazione biometrica, bloccate dietro un abbonamento o una licenza perpetua. +**Strongbox** è un gestore di password nativo e open source per iOS e macOS. Supportando sia i formati di KeePass che di Password Safe, è utilizzabile insieme ad altri gestori di password, come KeePassXC, sulle piattaforme non Apple. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. -[:octicons-home-16: Pagina Home](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
-Download +Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Inoltre, è offerta una versione esclusivamente offline: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). Questa versione è stata ridotta nel tentativo di ridurre la superficie di attacco. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Questa versione è stata ridotta nel tentativo di ridurre la superficie di attacco. ### Riga di comando @@ -356,18 +356,18 @@ Questi prodotti sono gestori di password minimali, utilizzabili nelle applicazio **gopass** è un gestore di password a riga di comando scritto in Go. Funziona su tutti i sistemi operativi desktop e server principali (Linux, macOS, BSD, Windows). -[:octicons-home-16: Pagina Home](https://www.gopass.pw){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute }
-Download +Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/it/photo-management.md b/i18n/it/photo-management.md index 979cf34a..6a38d822 100644 --- a/i18n/it/photo-management.md +++ b/i18n/it/photo-management.md @@ -14,12 +14,12 @@ La maggior parte delle soluzioni di gestione delle foto cloud, come Google Photo ![logo ente](assets/img/photo-management/ente.svg#only-light){ align=right } ![logo ente](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** è un servizio di backup foto crittografato end-to-end che supporta backup automatici su iOS e Android. Il loro codice è completamente open source, sia dal lato del client che del server. È [ospitabile autonomamente](https://github.com/ente-io/ente/tree/main/server#self-hosting). Ha superato un [controllo da Cure53](https://ente.io/blog/cryptography-audit/) a marzo 2023 e da [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) ad aprile 2023. +**ente** è un servizio di backup foto crittografato end-to-end che supporta backup automatici su iOS e Android. Il loro codice è completamente open source, sia dal lato del client che del server. È [ospitabile autonomamente](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/ente-io){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" }
Scarica @@ -46,17 +46,17 @@ La maggior parte delle soluzioni di gestione delle foto cloud, come Google Photo **Stingle** è un'applicazione per gallerie e fotocamere con funzionalità integrate di backup e sincronizzazione crittografata end-to-end per foto e video. Lo storage parte da 1 GB per gli account gratuiti sul loro cloud, oppure puoi ospitare il tuo server API Stingle per una totale indipendenza. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/stingle){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Scarica - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,12 +69,12 @@ La maggior parte delle soluzioni di gestione delle foto cloud, come Google Photo ![Logo PhotoPrism](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** è una piattaforma self-hostable per la gestione delle foto. Supporta la sincronizzazione e la condivisione degli album e una serie di altre [funzioni](https://www.photoprism.app/features). Non include E2EE, quindi è meglio che sia ospitato su un server di fiducia e che sia sotto il tuo controllo. +**PhotoPrism** è una piattaforma self-hostable per la gestione delle foto. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). Non include E2EE, quindi è meglio che sia ospitato su un server di fiducia e che sia sotto il tuo controllo. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
Scarica diff --git a/i18n/it/productivity.md b/i18n/it/productivity.md index e0528c00..bea2ba56 100644 --- a/i18n/it/productivity.md +++ b/i18n/it/productivity.md @@ -18,10 +18,10 @@ Gran parte delle suite da ufficio non supportano l'E2EE, a significare che il fo **Nextcloud** è una suite di software gratuiti e open source dal client al server, per creare i propri servizi di hosting dei file su un server privato che controlli. [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribuisci } +[:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Scarica @@ -52,11 +52,11 @@ Sconsigliamo di utilizzare l'[App E2EE](https://apps.nextcloud.com/apps/end_to_e **CryptPad** è un'alternativa privata di design ai più diffusi strumenti per ufficio. Tutti i contenuti di questo servizio web sono crittografati end-to-end e sono facilmente condivisibili con altri utenti. -[:octicons-home-16: Home](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute }
@@ -99,20 +99,20 @@ I nostri criteri ottimali rappresentano ciò che vorremmo vedere dal progetto pe **LibreOffice** è una suite per ufficio gratuita e open source con funzionalità estese. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentazione} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
-Scarica +Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,19 +127,19 @@ I nostri criteri ottimali rappresentano ciò che vorremmo vedere dal progetto pe **OnlyOffice** è una suite per ufficio gratuita e open source basata su cloud con funzionalità estese, tra cui l'integrazione con Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -175,10 +175,10 @@ In generale, definiamo suite da ufficio le applicazioni che potrebbero ragionevo **PrivateBin** è un pastebin online minimalista e open source, il cui server ha zero conoscenze sui dati incollati. I dati sono crittografati/decrittografati nel browser utilizzando AES a 256 bit. È la versione migliorata di ZeroBin. -[:octicons-home-16: Home](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Istanze Pubbliche"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Codice Sorgente" } +[:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
diff --git a/i18n/it/real-time-communication.md b/i18n/it/real-time-communication.md index e338366d..d8e29a00 100644 --- a/i18n/it/real-time-communication.md +++ b/i18n/it/real-time-communication.md @@ -20,20 +20,20 @@ Queste app di messaggistica sono ottime per proteggere le tue comunicazioni sens ![Logo di Signal](assets/img/messengers/signal.svg){ align=right } -**Signal** è un'app per dispositivi mobili sviluppata da Signal Messenger LLC. L'app fornisce messaggistica istantanea e chiamate protette con il Signal Protocol, un protocollo di crittografia estremamente sicuro che supporta la segretezza in avanti[^1] e la sicurezza post-compromesso. ^2] +**Signal** è un'app per dispositivi mobili sviluppata da Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ . ard-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/signalapp){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal richiede il tuo numero di telefono per la registrazione, ma dovresti crea È possibile modificare l'impostazione **Chi può trovarmi con il numero** in **Nessuno** se si vuole evitare che persone che hanno già il tuo numero di telefono scoprano il tuo account/nome utente Signal. -Gli elenchi di contatti su Signal sono crittografati utilizzando il PIN di Signal e il server non ha accesso ad essi. Inoltre, i profili personali sono crittografati e condivisi esclusivamente con i contatti con cui parli. Signal supporta i gruppi privati [](https://signal.org/blog/signal-private-group-system/), in cui il server non registra i membri del gruppo, i titoli del gruppo, gli avatar o gli attributi del gruppo. Signal ha metadati minimi quando [Mittente sigillato](https://signal.org/blog/sealed-sender/) è abilitato. L'indirizzo del mittente è crittografato insieme al corpo del messaggio e soltanto l'indirizzo del destinatario è visibile al server. Mittente Sigillato è abilitato esclusivamente per i tuoi contatti, ma è attivabile per tutti i destinatari con il rischio incrementato di ricevere spam. +Gli elenchi di contatti su Signal sono crittografati utilizzando il PIN di Signal e il server non ha accesso ad essi. Inoltre, i profili personali sono crittografati e condivisi esclusivamente con i contatti con cui parli. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. L'indirizzo del mittente è crittografato insieme al corpo del messaggio e soltanto l'indirizzo del destinatario è visibile al server. Mittente Sigillato è abilitato esclusivamente per i tuoi contatti, ma è attivabile per tutti i destinatari con il rischio incrementato di ricevere spam. -Il protocollo è stato [controllato](https://eprint.iacr.org/2016/1013.pdf) indipendentemente nel 2016. Le specifiche per il protocollo di Signal si possono trovare nella sua [documentazione](https://signal.org/docs/). +Il protocollo è stato [controllato](https://eprint.iacr.org/2016/1013.pdf) indipendentemente nel 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). Abbiamo alcuni consigli aggiuntivi sulla configurazione e rafforzamento della tua installazione di Signal: -[Configurazione e Rafforzamento di Signal :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Configurazione e Rafforzamento di Signal :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -75,10 +75,10 @@ Abbiamo alcuni consigli aggiuntivi sulla configurazione e rafforzamento della tu [:octicons-code-16:](https://github.com/simplex-chat){ .card-link title="Codice sorgente" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -96,22 +96,22 @@ SimpleX Chat supporta le funzionalità di base per le chat di gruppo, messaggi d
-![Logo di Briar](assets/img/messengers/briar.svg){ align=right } +![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** è un'app di messaggistica istantanea crittografata che si [connette](https://briarproject.org/how-it-works/) ad altri client utilizzando la Rete di Tor. Briar può anche connettersi via Wi-Fi o Bluetooth quando si trova nelle vicinanze. La modalità mesh locale di Briar può essere utile quando la connessione a Internet è problematica. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar può anche connettersi via Wi-Fi o Bluetooth quando si trova nelle vicinanze. La modalità mesh locale di Briar può essere utile quando la connessione a Internet è problematica. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentazione} -[:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Le opzioni per donare sono elencate in fondo alla homepage" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} +[:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supporta le funzionalità di base per le chat di gruppo, messaggi d Per aggiungere un contatto su Briar, è necessario prima aggiungersi a vicenda. Puoi scambiare i link `briar://` o scansionare il codice QR di un contatto, se è nelle vicinanze. -Il software per il client è stato [controllato](https://briarproject.org/news/2017-beta-released-security-audit/) indipendentemente, così come il protocollo anonimo di trasmissione che utilizza la Rete di Tor. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar ha [pubblicato le specifiche](https://code.briarproject.org/briar/briar-spec) complete. @@ -139,26 +139,26 @@ Questi messanger non hanno la segretezza in avanti[^1], e mentre soddisfano dete
-![Logo Element](assets/img/messengers/element.svg){ align=right } +![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** è il [client](https://matrix.org/ecosystem/clients/) di riferimento per il protocollo [Matrix](https://matrix.org/docs/guides/introduction), uno [standard aperto](https://matrix.org/docs/spec) per la comunicazione decentralizzata sicura in tempo reale. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. I messaggi e i file condivisi nelle stanze private (che richiedono un invito), sono di default in E2EE, così come le chiamate e videochiamate tra due persone. -[:octicons-home-16: Pagina Home](https://element.io/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://element.io/privacy){ .card-link title="Politica sulla privacy" } -[:octicons-info-16:](https://element.io/help){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/element-hq){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } +[:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Le chiamate e le videochiamate [non](https://github.com/vector-im/element-web/is Il protocollo Matrix stesso [teoricamente supporta la segretezza in avanti](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], tuttavia questo è [attualmente non supportato in Element](https://github.com/vector-im/element-web/issues/7101) a causa dell'interruzione di alcuni aspetti dell'esperienza utente, come i backup delle chiavi e la cronologia dei messaggi condivisi. -Il protocollo è stato [controllato](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) indipendentemente nel 2016. Le specifiche per il protocollo di Matrix possono essere trovate nella sua [documentazione](https://spec.matrix.org/latest/). Il [ratchet di crittografia Olm](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) utilizzato da Matrix è un'implementazione dell'[algoritmo Double Ratchet](https://signal.org/docs/specifications/doubleratchet/) di Signal. +Il protocollo è stato [controllato](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) indipendentemente nel 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,12 +181,12 @@ Il protocollo è stato [controllato](https://matrix.org/blog/2016/11/21/matrixs- **Session** è un'app di messaggistica decentralizzata incentrata sulle comunicazioni private, sicure e anonime. Session offre il supporto ai messaggi diretti, alle chat di gruppo e alle chiamate vocali. -Session utilizza la [Rete Oxen Service Node](https://oxen.io/) decentralizzata per memorizzare e instradare i messaggi. Ogni messaggio crittografato è indirizzato tramite tre nodi nella Rete del Nodo del Servizio di Oxen, rendendo virtualmente impossibile, per i nodi, la compilazione di informazioni significative su coloro che utilizzano la rete. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Ogni messaggio crittografato è indirizzato tramite tre nodi nella Rete del Nodo del Servizio di Oxen, rendendo virtualmente impossibile, per i nodi, la compilazione di informazioni significative su coloro che utilizzano la rete. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" }
Scarica diff --git a/i18n/it/router.md b/i18n/it/router.md index 8a8719aa..76812142 100644 --- a/i18n/it/router.md +++ b/i18n/it/router.md @@ -35,10 +35,10 @@ Di seguito sono elencati alcuni sistemi operativi alternativi, utilizzabili sui **OPNsense** è una piattaforma open source di firewall e routing basata su FreeBSD che incorpora molte funzionalità avanzate come il traffic shaping, il bilanciamento del carico e le funzionalità VPN, con molte altre funzionalità disponibili sotto forma di plugin. OPNsense è comunemente distribuito come firewall perimetrale, router, punto d'accesso wireless, server DHCP, server DNS ed endpoint VPN. -[:octicons-home-16: Home](https://opnsense.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribuisci} +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/it/search-engines.md b/i18n/it/search-engines.md index e0be6b78..d0ef3953 100644 --- a/i18n/it/search-engines.md +++ b/i18n/it/search-engines.md @@ -10,7 +10,7 @@ Utilizza un motore di ricerca che non crei un profilo pubblicitario basato sulle Questi consigli si basano sui meriti delle politiche sulla privacy di ogni servizio. Non esiste **alcuna garanzia** che tali politiche sulle privacy siano rispettate. -Considera di utilizzare un [VPN](vpn.md) o [Tor](https://www.torproject.org/), se il tuo modello di minaccia richiede di nascondere il tuo indirizzo IP dal fornitore di ricerca. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,10 +24,10 @@ Brave Search dispone di funzionalità uniche come le Discussioni, che evidenzian Ti consigliamo di disabilitare i [Parametri d'utilizzo anonimi](https://search.brave.com/help/usage-metrics), essendo abilitati di default e disabilitabili nelle impostazioni. -[:octicons-home-16: Home](https://search.brave.com/){ .md-button .md-button--primary } -[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Servizio Onion" } -[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation}
@@ -41,14 +41,14 @@ Brave Search ha sede negli Stati Uniti. La loro [politica sulla privacy](https:/ ![Logo di DuckDuckGo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** è uno dei motori di ricerca privati più popolari. Tra le funzionalità di ricerca di DuckDuckGo, le più notevoli sono i [bang](https://duckduckgo.com/bang) e molte [risposte istantanee](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). Il motore di ricerca si affida all'API commerciale di Bing per servire gran parte dei risultati, ma utilizza numerose [altre fonti](https://duckduckgo.com/results/sources/) per le risposte istantanee e altri risultati secondari. +**DuckDuckGo** è uno dei motori di ricerca privati più popolari. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo è il motore di ricerca predefinito per il Tor Browser, nonché una delle poche opzioni disponibili sul browser Safari di Apple. -[:octicons-home-16: Home](https://duckduckgo.com){ .md-button .md-button--primary } -[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Servizio Onion" } -[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo è il motore di ricerca predefinito per il Tor Browser, nonché una d DuckDuckGo ha sede negli Stati Uniti. La loro [politica sulla privacy](https://duckduckgo.com/privacy) dichiara che **registrano** le tue ricerche per scopi di miglioramento del prodotto, ma non il tuo indirizzo IP o alcuna altra informazione personalmente identificabile. -DuckDuckGo offre [altre due versioni](https://help.duckduckgo.com/features/non-javascript/) del proprio motore di ricerca, entrambe le quali non richiedono JavaScript. Tuttavia, queste versioni mancano di funzionalità. Inoltre, queste versioni, sono utilizzabili insieme al loro [indirizzo onion di Tor](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/), aggiungendo [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) o [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) per la rispettiva versione. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. Tuttavia, queste versioni mancano di funzionalità. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -66,9 +66,9 @@ DuckDuckGo offre [altre due versioni](https://help.duckduckgo.com/features/non-j **SearXNG** è un motore di meta-ricerca open source e ospitabile autonomamente, che aggrega i risultati di altri motori di ricerca, non memorizzando alcuna informazione. È un fork attivamente mantenuto di [SearX](https://github.com/searx/searx). -[:octicons-home-16: Home](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Istanze Pubbliche"} -[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Codice Sorgente" } +[:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} +[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -84,14 +84,14 @@ Utilizzando un'istanza di SearXNG, assicurati di leggere la loro politica sulla
-![Logo di Startpage](assets/img/search-engines/startpage.svg#only-light){ align=right } -![Logo di Startpage](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } +![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } +![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** è un motore di ricerca privato conosciuto per fornire risultati di ricerca da [Google e Bing](https://support.startpage.com/hc/en-us/articles/4522435353844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-). Una delle funzionalità uniche di Staartpage è la [Visualizzazione Anonima](https://www.startpage.com/en/anonymous-view/), che si sforza per standardizzare l'attività degli utenti, per complicare l'identificazione univoca. Tale funzionalità può essere utile per nascondere [alcune](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) reti e proprietà del browser. A differenza di quanto suggerito dal nome, non ci si dovrebbe affidare a tale funzionalità per l'anonimato. Se cerchi l'anonimato, piuttosto, utilizza il [Tor Browser](tor.md#tor-browser). +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. A differenza di quanto suggerito dal nome, non ci si dovrebbe affidare a tale funzionalità per l'anonimato. Se cerchi l'anonimato, piuttosto, utilizza il [Tor Browser](tor.md#tor-browser). -[:octicons-home-16: Home](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Politica sulla Privacy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentazione} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage limita regolarmente l'accesso al servizio a certi indirizzi IP, come g -Startpage ha sede nei Paesi Bassi. Secondo la loro [politica sulla privacy](https://www.startpage.com/en/privacy-policy/), registrano dettagli come: sistema operativo, tipo di browser e lingua. Non registrano il tuo indirizzo IP, le richieste di ricerca o altre informazioni personalmente identificabili. +Startpage ha sede nei Paesi Bassi. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. Non registrano il tuo indirizzo IP, le richieste di ricerca o altre informazioni personalmente identificabili. -L'azionista di maggioranza di Startpage è System1, un'azienda di tecnologie inserzionistiche. Non crediamo che ciò sia un problema, dato che seguono una [politica sull privacy](https://system1.com/terms/privacy-policy) distintamente separata. Il team di Privacy Guides ha contattato Startpage [nel 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/), per chiarire le preoccupazioni con l'investimento considerevole di System1 nel servizio. Siamo stati soddisfatti dalle risposte ricevute. +L'azionista di maggioranza di Startpage è System1, un'azienda di tecnologie inserzionistiche. Non crediamo che ciò sia un problema, dato che seguono una [politica sull privacy](https://system1.com/terms/privacy-policy) distintamente separata. The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. Siamo stati soddisfatti dalle risposte ricevute. ## Criteri diff --git a/i18n/it/tools.md b/i18n/it/tools.md index 456dbb75..1a190a2a 100644 --- a/i18n/it/tools.md +++ b/i18n/it/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides è il sito web più trasparente e affidabile per tro Se stai cercando una soluzione specifica per qualcosa, ecco gli strumenti hardware e software che consigliamo, in svariate categorie. I nostri strumenti per la privacy consigliati, sono scelti principalmente secondo le funzionalità di sicurezza, con maggiore enfasi sugli strumenti decentralizzati e open source. Sono applicabili a svariati modelli di minaccia, dalla protezione dai programmi di sorveglianza di massa e l'evitare le grandi società inserzionistiche, alla mitigazione degli attacchi; tuttavia, soltanto tu puoi determinare cosa funzionerà meglio per le tue esigenze. -Se desideri assistenza per capire quali siano gli strumenti e programmi alternativi migliori per la privacy, secondo le tue esigenze, crea una discussione sul nostro [forum](https://discuss.privacyguides.net/) o sulla nostra community di [Matrix](https://matrix.to/#/#privacyguides:matrix.org)! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! Per ulteriori dettagli su ogni progetto, perché è stato scelto e ulteriori consigli o trucchi consigliati, clicca il link "Scopri di Più" in ogni sezione, o clicca sullo stesso consiglio, per essere reindirizzato alla sezione specifica della pagina. @@ -89,7 +89,7 @@ Per ulteriori dettagli su ogni progetto, perché è stato scelto e ulteriori con #### Fornitori DNS -[Raccomandiamo](dns.md#recommended-providers) una serie di server DNS criptati basati su una serie di criteri, come [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) e [Quad9](https://quad9.net/) tra gli altri. Ti consigliamo di leggere le nostre pagine sui DNS prima di scegliere un fornitore. In molti casi, l'utilizzo di un fornitore DNS alternativo non è consigliato. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. Ti consigliamo di leggere le nostre pagine sui DNS prima di scegliere un fornitore. In molti casi, l'utilizzo di un fornitore DNS alternativo non è consigliato. [Scopri di più :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/it/tor.md b/i18n/it/tor.md index 4c2f5f1b..a0751049 100644 --- a/i18n/it/tor.md +++ b/i18n/it/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org/it/ + url: https://torproject.org sameAs: https://it.wikipedia.org/wiki/Tor_(software) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: La rete di **Tor** è un gruppo di server gestiti da volontari che ti consente di connetterti gratuitamente e migliora la tua privacy e sicurezza su Internet. Individui e organizzazioni possono inoltre condividere le informazioni tramite la rete Tor con i "servizi nascosti .onion", senza comprometterne la privacy. Poiché il traffico di Tor è difficile da bloccare e tracciare, è un efficace strumento di elusione della censura. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Pagina Principale} -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Servizio Onion" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentazione} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribuisci} +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor funziona instradando il traffico tramite questi server gestiti da volontari, invece di effettuare una connessione diretta al sito che stai provando a visitare. In questo modo si offusca la provenienza del traffico e nessun server nel percorso di connessione è in grado di vedere il percorso completo del traffico proveniente e diretto, il che significa che nemmeno i server utilizzati per connettersi possono violare l'anonimato. @@ -60,20 +60,20 @@ Se l'anonimato più completo è fondamentale per la tua situazione, dovresti uti Il **Tor Browser** è la scelta ideale per l'anonimato, fornendoti accesso alla rete e ai ponti di Tor e include impostazioni ed estensioni predefinite, configurate automaticamente dai livelli di sicurezza predefiniti: *Standard*, *Safer* e *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Servizio Onion" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentazione } -[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } +[:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ Non dovresti **mai** installare alcun'estensione aggiuntiva su Tor Browser o mod -Tor Browser è progettato per impedire il fingerprinting, o la tua identificazione secondo la configurazione del tuo browser. Dunque, è indispensabile che tu **non** modifichi il browser oltre ai [livelli di sicurezza](https://tb-manual.torproject.org/security-settings/) predefiniti. +Tor Browser è progettato per impedire il fingerprinting, o la tua identificazione secondo la configurazione del tuo browser. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). Oltre a installare Tor Browser direttamente sul tuo computer, esistono inoltre dei sistemi operativi specificamente progettati per connettersi alla rete di Tor, come [Whonix](desktop.md#whonix) su [Qubes OS](desktop.md#qubes-os), che forniscono sicurezza e protezioni persino maggiori, rispetto al solo Tor Browser standard. @@ -98,17 +98,17 @@ Oltre a installare Tor Browser direttamente sul tuo computer, esistono inoltre d **Orbot** è una VPN di Tor gratuita per smartphone, che instrada il traffico da qualsiasi app sul tuo dispositivo, tramite la rete di Tor. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentazione} -[:octicons-code-16:](https://orbot.app/code){ .card-link title="Codice sorgente" } -[:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} +[:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://orbot.app/donate){ .card-link title=Contribute }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -132,9 +132,9 @@ Tutte le versioni sono firmate utilizzando la medesima firma, quindi, dovrebbero
-![Logo di Onion Browser](assets/img/self-contained-networks/onion_browser.svg){ align=right } +![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** è un browser open-source che consente di navigare sul web in modo anonimo attraverso la rete Tor su dispositivi iOS ed è approvato dal [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Informativa sulla Privacy" } @@ -164,10 +164,10 @@ Tutte le versioni sono firmate utilizzando la medesima firma, quindi, dovrebbero Gli individui sottoposti a censura possono utilizzare i proxy di Snowflake per connettersi alla rete di Tor. Snowflake è un ottimo modo per contribuire alla rete, anche senza le conoscenze tecniche per eseguire un relé o ponte di Tor. -[:octicons-home-16: Pagina Principale](https://snowflake.torproject.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentazione} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Codice Sorgente" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribuisci } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
@@ -181,4 +181,4 @@ Snowflake non incrementa la tua privacy in alcun modo, né è utilizzato per con L'esecuzione di un proxy di Snowflake è a basso rischio, persino di più della gestione di un relé o ponte di Tor, che già non sono attività particolarmente rischiose. Tuttavia, comunque, delega il traffico attraverso la tua rete, il che può avere un certo impatto, specialmente se la rete ha una larghezza di banda limitata. Assicurati di comprendere [il funzionamento di Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) prima di decidere se gestire un proxy. -[^1]: L'impostazione `IsolateDestAddr` è discussa nella [mailing list di Tor](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) e nella [documentazione sull'Isolamento del Flusso di Whonix](https://www.whonix.org/wiki/Stream_Isolation), dove entrambi i progetti suggeriscono che, di solito, non è un buon approccio per la maggior parte delle persone. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/it/vpn.md b/i18n/it/vpn.md index d5684374..8de83306 100644 --- a/i18n/it/vpn.md +++ b/i18n/it/vpn.md @@ -25,7 +25,7 @@ Se cerchi l'**anonimato**, dovresti usare Tor Browser. Se stai cercando maggiore **sicurezza**, dovresti sempre assicurarti di connetterti a siti web che utilizzano HTTPS. Una VPN non è un sostituto per buone pratiche di sicurezza. -[Scarica Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Miti di Tor & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ I nostri fornitori consigliati utilizzano la crittografia, accettano Monero, sup **Proton VPN** è un forte concorrente nel settore delle VPN, ed è operativo dal 2016. Proton AG ha sede in Svizzera e offre un livello gratuito limitato, così come un'opzione premium più ricca di funzioni. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ Riteniamo inoltre che sia meglio per la sicurezza delle chiavi private del provi #### :material-check:{ .pg-green } Controllato Indipendentemente -A gennaio 2020, Proton VPN è stato sottoposto a un controllo indipendente da SEC Consult. SEC Consult ha trovato alcune vulnerabilità di rischio basso e medio nelle applicazioni Windows, Android e iOS di Proton VPN, tutti "corretti adeguatamente" da Proton VPN prima della pubblicazione dei rapporti. Nessuno dei problemi identificati avrebbe fornito a un malintenzionato l'accesso remoto al tuo dispositivo o traffico. Puoi visualizzare i rapporti singoli per ogni piattaforma su [protonvpn.com](https://protonvpn.com/blog/open-source/). Ad aprile 2022, Proton VPN è stato sottoposto a [un altro controllo](https://protonvpn.com/blog/no-logs-audit/) e il rapporto è stato [prodotto da Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). Una [lettera di attestazione](https://proton.me/blog/security-audit-all-proton-apps) è stata fornita per le app di Proton VPN, il 9 novembre 2021, da [Securitum](https://research.securitum.com). +A gennaio 2020, Proton VPN è stato sottoposto a un controllo indipendente da SEC Consult. SEC Consult ha trovato alcune vulnerabilità di rischio basso e medio nelle applicazioni Windows, Android e iOS di Proton VPN, tutti "corretti adeguatamente" da Proton VPN prima della pubblicazione dei rapporti. Nessuno dei problemi identificati avrebbe fornito a un malintenzionato l'accesso remoto al tuo dispositivo o traffico. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). Una [lettera di attestazione](https://proton.me/blog/security-audit-all-proton-apps) è stata fornita per le app di Proton VPN, il 9 novembre 2021, da [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Client Open Source @@ -84,31 +84,31 @@ Proton VPN, oltre ad accettare carte di credito/debito, PayPal e [Bitcoin](advan #### :material-check:{ .pg-green } Supporto WireGuard -Proton VPN supporta principalmente il protocollo WireGuard®. [WireGuard](https://www.wireguard.com) è un protocollo più recente che utilizza una crittografia [all'avanguardia](https://www.wireguard.com/protocol/). Inoltre, WireGuard mira ad essere più semplice e performante. +Proton VPN supporta principalmente il protocollo WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Inoltre, WireGuard mira ad essere più semplice e performante. -Proton VPN [consiglia](https://protonvpn.com/blog/wireguard/) l'uso di WireGuard con il loro servizio. Sulle app per Windows, macOS, iOS, Android, ChromeOS e Android TV di Proton VPN, WireGuard è il protocollo predefinito; tuttavia, il [supporto](https://protonvpn.com/support/how-to-change-vpn-protocols/) per il protocollo non è presente nella loro app per Linux. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Port Forwarding remoto -Al momento, Proton VPN supporta soltanto il [port forwarding](https://protonvpn.com/support/port-forwarding/) remoto ed effimero, tramite NAT-PMP, con 60 secondi di tempo di noleggio. L'app per Windows fornisce un'opzione facilmente accessibile, mentre su altri sistemi operativi dovrai eseguire il tuo [client NAT-PMP](https://protonvpn.com/support/port-forwarding-manual-setup/). Le applicazioni torrent supportano spesso NAT-PMP in modo nativo. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Le applicazioni torrent supportano spesso NAT-PMP in modo nativo. #### :material-information-outline:{ .pg-orange } Elusione della censura -Proton VPN ha il suo [protocollo Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) che *può* aiutare in situazioni in cui protocolli VPN come OpenVPN o Wireguard sono bloccati con varie tecniche rudimentali. Stealth incapsula il tunnel VPN in una sessione TLS, in modo da sembrare traffico Internet generico. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth incapsula il tunnel VPN in una sessione TLS, in modo da sembrare traffico Internet generico. Purtroppo non funziona molto bene nei Paesi in cui vengono impiegati filtri sofisticati che analizzano tutto il traffico in uscita nel tentativo di scoprire i tunnel criptati. Stealth non è ancora disponibile su [Windows](https://github.com/ProtonVPN/win-app/issues/64) o Linux. #### :material-check:{ .pg-green } Client Mobile -Oltre a fornire i file di configurazione standard di OpenVPN, ProtonVPN ha client mobile per [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US) e [GitHub](https://github.com/ProtonVPN/android-app/releases), consentendo connessioni facili ai server. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Funzionalità aggiuntive -I client di ProtonVPN supportano l'autenticazione a due fattori su tutte le piattaforme, tranne Linux, al momento. Proton VPN ha i propri server e datacenter in Svizzera, Islanda e Svezia. Offrono il blocco dei contenuti e il blocco di malware noti con il loro servizio DNS. Inoltre, Proton VPN offre anche server "Tor" che consentono di connettersi facilmente ai siti onion, ma consigliamo comunque di utilizzare [il browser Tor ufficiale](https://www.torproject.org/) per questo scopo. +I client di ProtonVPN supportano l'autenticazione a due fattori su tutte le piattaforme, tranne Linux, al momento. Proton VPN ha i propri server e datacenter in Svizzera, Islanda e Svezia. Offrono il blocco dei contenuti e il blocco di malware noti con il loro servizio DNS. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } La funzione Killswitch non funziona sui Mac basati su Intel -Arresti anomali del sistema [potrebbero verificarsi](https://protonvpn.com/support/macos-t2-chip-kill-switch/) sui Mac basati su Intel quando si utilizza la funzionalità killswitch VPN. Se necessiti di questa funzionalità e stai utilizzando un Mac con chipset Intel, dovresti considerare l'utilizzo di un altro servizio VPN. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. Se necessiti di questa funzionalità e stai utilizzando un Mac con chipset Intel, dovresti considerare l'utilizzo di un altro servizio VPN. ### IVPN @@ -118,20 +118,20 @@ Arresti anomali del sistema [potrebbero verificarsi](https://protonvpn.com/suppo **IVPN** è un altro fornitore di VPN premium, in operazione dal 2009. IVPN ha sede in Gibilterra. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/ivpn){ .card-link title="Codice sorgente" } +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ Arresti anomali del sistema [potrebbero verificarsi](https://protonvpn.com/suppo #### :material-check:{ .pg-green } 37 Paesi -IVPN ha [server in 37 paesi](https://www.ivpn.net/server-locations).(1) Scegliere un fornitore VPN con un server più vicino a te ridurrà la latenza del traffico di rete che invii. Questo per un percorso più breve (meno 'salti'), verso la destinazione. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Questo per un percorso più breve (meno 'salti'), verso la destinazione. { .annotate } 1. Ultimo controllo: 21-12-2023 @@ -148,11 +148,11 @@ Riteniamo inoltre che sia meglio per la sicurezza delle chiavi private del provi #### :material-check:{ .pg-green } Controllato Indipendentemente -IVPN è stata sottoposta a un [controllo di non registrazione da Cure53](https://cure53.de/audit-report_ivpn.pdf), che si è concluso in accordo con la dichiarazione di non registrazione di IVPN. Inoltre, IVPN ha completato un [rapporto di cinque test completi di Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) a gennaio 2020. IVPN ha inoltre dichiarato di avere in programma per il futuro dei [rapporti annuali](https://www.ivpn.net/blog/independent-security-audit-concluded). Un'ulteriore revisione è stata condotta [ad aprile 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) ed è stata prodotta da Cure53 [sul loro sito web](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN è stata sottoposta a un [controllo di non registrazione da Cure53](https://cure53.de/audit-report_ivpn.pdf), che si è concluso in accordo con la dichiarazione di non registrazione di IVPN. Inoltre, IVPN ha completato un [rapporto di cinque test completi di Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) a gennaio 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Client Open Source -A partire da febbraio 2020 [le applicazioni IVPN sono ora open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Il codice sorgente è ottenibile dalla loro [organizzazione di GitHub](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Il codice sorgente è ottenibile dalla loro [organizzazione di GitHub](https://github.com/ivpn). #### :material-check:{ .pg-green } Accetta contanti e Monero @@ -160,25 +160,25 @@ Oltre ad accettare carte di credito/debito e PayPal, IVPN accetta Bitcoin, **Mon #### :material-check:{ .pg-green } Supporto WireGuard -IVPN supporta il protocollo WireGuard®. [WireGuard](https://www.wireguard.com) è un protocollo più recente che utilizza una [crittografia](https://www.wireguard.com/protocol/) all'avanguardia. Inoltre, WireGuard mira ad essere più semplice e performante. +IVPN supporta il protocollo WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Inoltre, WireGuard mira ad essere più semplice e performante. -IVPN [consiglia](https://www.ivpn.net/wireguard/) l'utilizzo di WireGuard con il loro servizio e, pertanto, il protocollo è il predefinito su tutte le app di IVPN. Inoltre, IVPN offre anche un generatore di configurazione di WireGuard da utilizzare con le [app](https://www.wireguard.com/install/) ufficiali di WireGuard. +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Port Forwarding Remoto -IVPN in precedenza supportava il port forwarding, ma ha rimosso l'opzione a [giugno 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). L'assenza di questa funzionalità potrebbe influenzare negativamente alcune applicazioni, specialmente quelle tra pari come i client di torrenting. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). L'assenza di questa funzionalità potrebbe influenzare negativamente alcune applicazioni, specialmente quelle tra pari come i client di torrenting. #### :material-check:{ .pg-green } Elusione della censura -IVPN dispone di modalità di offuscamento che utilizzano il progetto [v2ray](https://www.v2ray.com/en/index.html), utile in situazioni in cui protocolli VPN come OpenVPN o Wireguard sono bloccati. Attualmente questa funzione è disponibile solo su Desktop e [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). Dispone di due modalità in cui può utilizzare [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) su connessioni QUIC o TCP. QUIC è un protocollo moderno con un migliore controllo della congestione e quindi può essere più veloce con una latenza ridotta. La modalità TCP fa apparire i dati come normale traffico HTTP. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). Dispone di due modalità in cui può utilizzare [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) su connessioni QUIC o TCP. QUIC è un protocollo moderno con un migliore controllo della congestione e quindi può essere più veloce con una latenza ridotta. La modalità TCP fa apparire i dati come normale traffico HTTP. #### :material-check:{ .pg-green } Client Mobile -Oltre a fornire i file di configurazione standard di OpenVPN, IVPN ha client mobile per [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) e [GitHub](https://github.com/ivpn/android-app/releases), consentendo connessioni facili ai server. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Funzionalità aggiuntive -I client IVPN supportano l'autenticazione a due fattori (i client Mullvad no). Inoltre, IVPN fornisce la funzionaalità "[AntiTracker](https://www.ivpn.net/antitracker)", che blocca le reti e i tracciatori pubblicitari dal livello della rete. +I client IVPN supportano l'autenticazione a due fattori (i client Mullvad no). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -189,20 +189,20 @@ I client IVPN supportano l'autenticazione a due fattori (i client Mullvad no). I **Mullvad** è una VPN veloce ed economica con una grande attenzione alla trasparenza e alla sicurezza. Sono operativi dal **2009**. Mullvad ha sede in Svezia e non dispone di una prova gratuita. [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } -[:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Servizio Onion" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Informativa sulla Privacy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentazione} -[:octicons-code-16:](https://github.com/mullvad){ .card-link title="Codice sorgente" } +[:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
-Scarica +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ I client IVPN supportano l'autenticazione a due fattori (i client Mullvad no). I #### :material-check:{ .pg-green } 40 Paesi -Mullvad ha [server in 40 paesi](https://mullvad.net/servers/).(1) Scegliere un fornitore VPN con un server più vicino a te ridurrà la latenza del traffico di rete che invii. Questo per un percorso più breve (meno 'salti'), verso la destinazione. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Questo per un percorso più breve (meno 'salti'), verso la destinazione. { .annotate } 1. Ultimo controllo: 21-12-2023 @@ -223,11 +223,11 @@ I client VPN di Mullvad sono stati controllati da Cure53 e Assured AB in un rapp > Cure53 e Assured AB sono soddisfatti dai risultati del controllo e, il software, lascia un'impressione complessiva positiva. Con la dedizione alla sicurezza del team interno al complesso Mullvad VPN, i tester non hanno dubbi riguardo alla giusta direzione del progetto da un punto di vista della sicurezza. -Nel 2020 [è stato annunciato](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) un secondo controllo e il [rapporto di controllo finale](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) è stato reso disponibile sul sito web di Cure53: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > I risultati di questo progetto di maggio-giugno 2020, rivolto al complesso di Mullvad, sono abbastanza positivi. [...] L'ecosistema applicativo complessivo utilizzato da Mullvad lascia un'impressione solida e strutturata. La struttura generale dell'applicazione semplifica l'introduzione di patch e correzioni, in un modo strutturato. Più di ogni altra cosa, i risultati individuati da Cure53 rivelano l'importanza di controllare e rivalutare costantemente i vettori di fuga di notizie attuali, per poter sempre assicurare la privacy degli utenti finali. Detto questo, Mullvad fa un ottimo lavoro nel proteggere l'utente finale dalle comuni perdite di informazioni d'identificazione personale e i relativi rischi legati alla privacy. -Nel 2021, [è stato annunciato](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) un controllo dell'infrastrutturaa e il [rapporto finale del controllo](https://cure53.de/pentest-report_mullvad_2021_v1.pdf)è staato reso disponibile sul sito web di Cure53. Un altro rapporto è stato commissionato [a giugno 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) ed è disponibile sul [sito web di Assured](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Client Open Source @@ -239,17 +239,17 @@ Mullvad, oltre ad accettare carte di credito/debito e PayPal, accetta Bitcoin, B #### :material-check:{ .pg-green } Supporto WireGuard -Mullvad supporta il protocollo WireGuard®. [WireGuard](https://www.wireguard.com) è un protocollo più recente che utilizza una [crittografia](https://www.wireguard.com/protocol/) all'avanguardia. Inoltre, WireGuard mira ad essere più semplice e performante. +Mullvad supporta il protocollo WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Inoltre, WireGuard mira ad essere più semplice e performante. -Mullvad [consiglia](https://mullvad.net/en/help/why-wireguard/) l'utilizzo di WireGuard con il proprio servizio. È il solo, nonché predefinito, protocollo sulle app per Android, iOS, macOS e Linux di Mullvad, m su Windows devi [abilitarlo manualmente](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/). Inoltre, Mullvad offre un generatore di configurazione di WireGuard da utilizzare con le [app](https://www.wireguard.com/install/) ufficiali di WireGuard. +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } Supporto IPv6 -Mullvad ti consente di [accedere ai servizi ospitati su IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), a differenza di altri fornitori che bloccano le connessioni IPv6. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Port Forwarding Remoto -Mullvad, in precedenza, supportava il port forwarding, ma ha rimosso l'opzione a [maggio 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). L'assenza di questa funzionalità potrebbe influenzare negativamente alcune applicazioni, specialmente quelle tra pari come i client di torrenting. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). L'assenza di questa funzionalità potrebbe influenzare negativamente alcune applicazioni, specialmente quelle tra pari come i client di torrenting. #### :material-check:{ .pg-green } Elusione della censura @@ -257,11 +257,11 @@ Mullvad ha una modalità di offuscamento che utilizza [Shadowsocks con v2ray](ht #### :material-check:{ .pg-green } Client mobile -Mullvad ha pubblicato i client dell'[App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) e di [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn), che supportano entrambi un'interfaccia facile da usare, invece di richiederti la configurazione manuale della tua connessione a WireGuard. Il client Android è disponibile anche su [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. Il client Android è disponibile anche su [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Funzionalità aggiuntive -Mullvad è molto trasparente su quali nodi [possiede o affitta](https://mullvad.net/en/servers/). Utilizzano [ShadowSocks](https://shadowsocks.org/) nella loro configurazione ShadowSocks + OpenVPN, rendendoli più resistenti ai firewall con [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) che cercano di bloccare le VPN. Presumibilmente, la [Cina deve utilizzare un metodo diverso per bloccare i server ShadowSocks](https://github.com/net4people/bbs/issues/22). Il sito web di Mullvad è accessibile anche tramite Tor presso [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Presumibilmente, la [Cina deve utilizzare un metodo diverso per bloccare i server ShadowSocks](https://github.com/net4people/bbs/issues/22). Il sito web di Mullvad è accessibile anche tramite Tor presso [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteri diff --git a/i18n/ja/CODE_OF_CONDUCT.md b/i18n/ja/CODE_OF_CONDUCT.md index cb35de9f..4a12f120 100644 --- a/i18n/ja/CODE_OF_CONDUCT.md +++ b/i18n/ja/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **前向きかつ建設的な態度で行動すること** diff --git a/i18n/ja/about/index.md b/i18n/ja/about/index.md index 406acea4..8125f54a 100644 --- a/i18n/ja/about/index.md +++ b/i18n/ja/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. - [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html)[オランダ語からの翻訳] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## 沿革 @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/ja/about/notices.md b/i18n/ja/about/notices.md index 9a1d2feb..e77d584c 100644 --- a/i18n/ja/about/notices.md +++ b/i18n/ja/about/notices.md @@ -29,7 +29,7 @@ This does not include third-party code embedded in this repository, or code wher This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* +We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ You must not conduct any systematic or automated data collection activities on o --- -*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/ja/about/privacytools.md b/i18n/ja/about/privacytools.md index de287b5d..f9b75b85 100644 --- a/i18n/ja/about/privacytools.md +++ b/i18n/ja/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## 私たちが移行した理由 In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## ドメイン名の信頼性 @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## コミュニティからの呼びかけ -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## r/privacytoolsIO の管理 -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## 移行の開始 -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## 以降の出来事 -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIOの現在 -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [2021年6月28日 r/privacytoolsIOの管理に関する要請](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [2021年7月27日 PrivacyToolsのブログで、移行に関する意図を発表](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [2021年9月13日 r/privacytoolsIOでPrivacy Guidesへの移行の開始についての発表](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [2021年6月28日 r/privacytoolsIOの管理に関する要請](https://reddit.com/comments/o9tllh) +- [2021年7月27日 PrivacyToolsのブログで、移行に関する意図を発表](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [2021年9月13日 r/privacytoolsIOでPrivacy Guidesへの移行の開始についての発表](https://reddit.com/pnql46) - [2021年9月17日 JonahからOpenCollectiveでの発表](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [2021年9月30日 現在このページで説明されているほとんどの出来事の詳細を記述したTwitterのスレッド](https://twitter.com/privacy_guides/status/1443633412800225280) -- [2021年10月1日 u/dng99によるサブドメインの障害を指摘する投稿](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [2022年4月2日 PrivacyToolsの非難的なブログ記事に対するu/dng99の回答](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [2021年10月1日 u/dng99によるサブドメインの障害を指摘する投稿](https://reddit.com/comments/pymthv/comment/hexwrps) +- [2022年4月2日 PrivacyToolsの非難的なブログ記事に対するu/dng99の回答](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [2022年5月16日 @TommyTran732によるTwitterでの反応](https://twitter.com/TommyTran732/status/1526153497984618496) - [2022年9月3日 Techloreのフォーラムへの@dngrayによる投稿](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/ja/advanced/communication-network-types.md b/i18n/ja/advanced/communication-network-types.md index ee11dcb7..3d7bd11a 100644 --- a/i18n/ja/advanced/communication-network-types.md +++ b/i18n/ja/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). これは次のようなものも含みます。 - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## フェデレーション(連合)型ネットワーク @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/ja/advanced/dns-overview.md b/i18n/ja/advanced/dns-overview.md index 4ce3586f..0425c851 100644 --- a/i18n/ja/advanced/dns-overview.md +++ b/i18n/ja/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### 暗号化されていないDNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/ja/advanced/payments.md b/i18n/ja/advanced/payments.md index da21c52d..52503d7e 100644 --- a/i18n/ja/advanced/payments.md +++ b/i18n/ja/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a 何世紀にもわたり、**現金**はプライベートな支払いの主な形態として機能してきました。 現金にはほとんどの場合において優れたプライバシーの特性があり、ほとんどの国で広く受け入れられ、また、**代替可能**、つまり独自性がなく、完全な交換可能性を備えています。 -現金による支払いに関する法律は国によって異なります。 米国では、1万ドルを超える現金支払いについては、[Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000)でIRSに特別な開示を行うことが義務付けられています。 The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +現金による支払いに関する法律は国によって異なります。 In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. 以上の理由はありますが、現金は一般的に最も優れた選択肢です。 @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### その他のコイン(ビットコイン、イーサリアムなど) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### 取得 -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/ja/advanced/tor-overview.md b/i18n/ja/advanced/tor-overview.md index 095f8323..64507f5a 100644 --- a/i18n/ja/advanced/tor-overview.md +++ b/i18n/ja/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Torの使用は検出不可能ではありません -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/ja/android.md b/i18n/ja/android.md index 91b5baf0..1a76ed64 100644 --- a/i18n/ja/android.md +++ b/i18n/ja/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,19 +113,19 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: ホームページ](https://grapheneos.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="プライバシーポリシー" } -[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=ドキュメンテーション} -[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="ソースコード" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=貢献 } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[CalyxOSよりもGrapheneOSが推奨される理由 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[CalyxOSよりもGrapheneOSが推奨される理由 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOSは、デフォルトのアプリストアとしてF-Droidを使用しています。 We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOSは、デフォルトのアプリストアとしてF-Droidを使用しています。 We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw 携帯電話会社から電話を購入するのは避けること。 These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. 売り手の評判を常にチェックすること。 If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. 売り手の評判を常にチェックすること。 If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. 以下、Google Pixelを購入する際のいくつかのヒントを示します。 @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ Metadata is not currently deleted from video files but that is planned.
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/ja/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/ja/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/ja/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/ja/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/ja/assets/img/how-tor-works/tor-encryption.svg b/i18n/ja/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/ja/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/ja/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/ja/assets/img/how-tor-works/tor-path-dark.svg b/i18n/ja/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/ja/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/ja/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/ja/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/ja/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index 0300545d..ce51beee 100644 --- a/i18n/ja/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/ja/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - 端末 - - - - - - Guard - - - リレー - - - リレー - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - リレー - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/ja/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/ja/assets/img/how-tor-works/tor-path-hidden-service.svg index e54aace3..8d008447 100644 --- a/i18n/ja/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/ja/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - 端末 - - - - - - Guard - - - リレー - - - リレー - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - リレー - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/ja/assets/img/how-tor-works/tor-path.svg b/i18n/ja/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/ja/assets/img/how-tor-works/tor-path.svg +++ b/i18n/ja/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/ja/basics/account-deletion.md b/i18n/ja/basics/account-deletion.md index 9831f1e9..ea02d491 100644 --- a/i18n/ja/basics/account-deletion.md +++ b/i18n/ja/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. データ漏洩とは、サービスのセキュリティが侵害され、保護されている情報が不正行為者によって閲覧、送信、または盗まれることをいいます。 Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. データ漏洩とは、サービスのセキュリティが侵害され、保護されている情報が不正行為者によって閲覧、送信、または盗まれることをいいます。 Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## 古いアカウントを探す ### パスワードマネージャー -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [資格情報マネージャー](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [パスワード](https://support.apple.com/en-us/HT211145) -- iOS [パスワード](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### メール @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR(EEA居住者のみ) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### アカウント情報を上書きする @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## 新しいアカウントを作らないこと -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/ja/basics/common-misconceptions.md b/i18n/ja/basics/common-misconceptions.md index 5c0a31bd..312ed759 100644 --- a/i18n/ja/basics/common-misconceptions.md +++ b/i18n/ja/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/ja/basics/common-threats.md b/i18n/ja/basics/common-threats.md index 65e7aa2e..0bad6086 100644 --- a/i18n/ja/basics/common-threats.md +++ b/i18n/ja/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## サービスプロバイダーからのプライバシー保護 @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: 国連:[*世界人権宣言*](https://www.un.org/en/about-us/universal-declaration-of-human-rights) diff --git a/i18n/ja/basics/email-security.md b/i18n/ja/basics/email-security.md index f4b54a66..ce101bc0 100644 --- a/i18n/ja/basics/email-security.md +++ b/i18n/ja/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/ja/basics/multi-factor-authentication.md b/i18n/ja/basics/multi-factor-authentication.md index 4577af45..7b341054 100644 --- a/i18n/ja/basics/multi-factor-authentication.md +++ b/i18n/ja/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTPは、最も一般的なMFAの形式の一つです。 When you set up TOTP, The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### ハードウェアセキュリティ -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass(およびKeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/ja/basics/passwords-overview.md b/i18n/ja/basics/passwords-overview.md index 1012e2b4..b0a68811 100644 --- a/i18n/ja/basics/passwords-overview.md +++ b/i18n/ja/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/ja/basics/vpn-overview.md b/i18n/ja/basics/vpn-overview.md index 1994eef1..6d63b9a0 100644 --- a/i18n/ja/basics/vpn-overview.md +++ b/i18n/ja/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -現在、TorはTCPプロトコルのみをサポートしています。 UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +現在、TorはTCPプロトコルのみをサポートしています。 UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -ほとんどのVPNサービスは、同じ[少数の企業](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/)が所有しています。 These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [VPNとプライバシーレビューサイトの問題点](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [無料VPNアプリの調査](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [VPNとプライバシーレビューサイトの問題点](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [無料VPNアプリの調査](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/ja/basics/why-privacy-matters.md b/i18n/ja/basics/why-privacy-matters.md index e74e5dc1..ed87d246 100644 --- a/i18n/ja/basics/why-privacy-matters.md +++ b/i18n/ja/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## ソース -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021年) Neil Richards 著 -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/ja/calendar.md b/i18n/ja/calendar.md index c35e9e80..205aaf5f 100644 --- a/i18n/ja/calendar.md +++ b/i18n/ja/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/ja/cloud.md b/i18n/ja/cloud.md index 4f761572..8b4f14d3 100644 --- a/i18n/ja/cloud.md +++ b/i18n/ja/cloud.md @@ -56,15 +56,15 @@ Proton Driveの新しいモバイルクライアントは、まだ第三者に **Tresorit**は、2011年に設立された、スイスとハンガリーの暗号化クラウドストレージ プロバイダーです。 Tresoritはスイスの国営郵便局であるスイスポストが所有しています。 -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Driveの新しいモバイルクライアントは、まだ第三者に Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## 規準 diff --git a/i18n/ja/cryptocurrency.md b/i18n/ja/cryptocurrency.md index 98ec6847..522c45ce 100644 --- a/i18n/ja/cryptocurrency.md +++ b/i18n/ja/cryptocurrency.md @@ -24,10 +24,10 @@ Making payments online is one of the biggest challenges to privacy. These crypto **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/ja/data-redaction.md b/i18n/ja/data-redaction.md index 60fde615..db36f452 100644 --- a/i18n/ja/data-redaction.md +++ b/i18n/ja/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106)
diff --git a/i18n/ja/desktop-browsers.md b/i18n/ja/desktop-browsers.md index 5228f0e1..5c7570c4 100644 --- a/i18n/ja/desktop-browsers.md +++ b/i18n/ja/desktop-browsers.md @@ -70,8 +70,8 @@ schema: **Mullvad Browser**はVPNユーザーにTor Browserのフィンガープリント対策のブラウザ技術を提供することを目的とした、Torネットワークへの接続機能のない[Tor Browser](tor.md#tor-browser)です。 Tor Projectが開発し、[Mullvad](vpn.md#mullvad)が配布しています。MullvadのVPNを使用する必要は**ありません**。 [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ schema: -[Tor Browser](tor.md)と同様に、Mullvad Browserは、あなたのブラウザーのフィンガープリントを他のすべてのMullvadユーザーと同一にすることで、フィンガープリンティングを防ぐよう設計されています。また、*Standard(標準)*、*Safer(より安全)*、*Safest(最も安全)*の3つのデフォルトのセキュリティレベルにより自動的に調整される設定と拡張機能が含まれています。 したがって、デフォルトの[セキュリティーレベル](https://tb-manual.torproject.org/security-settings/)を調整する以外の変更は、決して行うべきではありません。 その他の変更を加えた場合、あなたのブラウザーのフィンガープリントは一意のものとなり、このブラウザを使う意味が無くなってしまいます。 ブラウザーをより詳細に設定したい場合、また、フィンガープリンティングも問題ではない場合は、代わりに[Firefox](#firefox)を推奨します。 +[Tor Browser](tor.md)と同様に、Mullvad Browserは、あなたのブラウザーのフィンガープリントを他のすべてのMullvadユーザーと同一にすることで、フィンガープリンティングを防ぐよう設計されています。また、*Standard(標準)*、*Safer(より安全)*、*Safest(最も安全)*の3つのデフォルトのセキュリティレベルにより自動的に調整される設定と拡張機能が含まれています。 Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). その他の変更を加えた場合、あなたのブラウザーのフィンガープリントは一意のものとなり、このブラウザを使う意味が無くなってしまいます。 ブラウザーをより詳細に設定したい場合、また、フィンガープリンティングも問題ではない場合は、代わりに[Firefox](#firefox)を推奨します。 ### フィンガープリント対策 @@ -116,17 +116,17 @@ Mullvad Browserでは、デフォルトの[検索エンジン](search-engines.md **Firefox**は、[強化型トラッキング防止](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop)などの強力なプライバシー設定を提供し、[様々な種類のトラッキング](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks)をブロックするのに役立ちます。 [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browserでは、デフォルトの[検索エンジン](search-engines.md

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug ##### Firefox Suggest (アメリカのみ) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest)は、米国のみで利用可能な、検索提案機能と似た機能です。 私たちは、検索提案機能の無効化を推奨するのと同じ理由で、これを無効にすることを推奨します。 **アドレスバー**のヘッダーの下に以下のオプションが表示されない場合、この機能は備わっていないので、これらの変更を無視しても問題ありません。 +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. 私たちは、検索提案機能の無効化を推奨するのと同じ理由で、これを無効にすることを推奨します。 **アドレスバー**のヘッダーの下に以下のオプションが表示されない場合、この機能は備わっていないので、これらの変更を無視しても問題ありません。 - [ ] **ウェブからの提案**のチェックを外すこと - [ ] **スポンサーからの提案**のチェックを外すこと @@ -183,7 +183,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug > Firefox は、Firefoxのバージョンと言語、デバイスのオペレーティングシステムとハードウェア構成、メモリー、クラッシュやエラーに関する基本情報、アップデート、セーフブラウジング、アクティベーションなどの自動処理の結果に関するデータを送信します。 Firefoxが私たちにデータを送信するとき、あなたのIPアドレスは一時的に私たちのサーバーログの一部として収集されます。 -さらに、Firefoxアカウントサービスは [いくつかの技術データ](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts)を収集します。 Firefoxアカウントを使用している場合は、オプトアウトすることができます。 +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). Firefoxアカウントを使用している場合は、オプトアウトすることができます。 1. [accounts.firefox.comのプロフィール設定](https://accounts.firefox.com/settings#data-collection)を開く 2. **データの収集と使用** > **Firefoxアカウントの改善を支援する**のチェックを外す @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### 同期 -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/)は、あなたのブラウジングデータ(履歴、ブックマークなど)をすべてのデバイスで利用可能にし、それをE2EE(End-to-End Encryption, 端末間暗号化)で保護します。 +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox(高度) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -[Arkenfoxプロジェクト](https://github.com/arkenfox/user.js)は、Firefoxのための慎重に考えられたオプションのセットを提供しています。 もしArkenfoxを使用することを[決めた](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not)場合、[いくつかのオプション](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common])は主観的に厳格であり、また、一部のウェブサイトが正しく動作しなくなる可能性があります。これらのオプションは、ニーズに合わせて[簡単に変更できます](https://github.com/arkenfox/user.js/wiki/3.1-Overrides)。 プロジェクトの[ウィキ](https://github.com/arkenfox/user.js/wiki)に全て目を通すことを**強くお勧めします**。 なお、Arkenfoxは[コンテナ](https://support.mozilla.org/ja/kb/containers#w_for-advanced-users)のサポートも有効にしています。 +[Arkenfoxプロジェクト](https://github.com/arkenfox/user.js)は、Firefoxのための慎重に考えられたオプションのセットを提供しています。 もしArkenfoxを使用することを[決めた](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not)場合、[いくつかのオプション](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common])は主観的に厳格であり、また、一部のウェブサイトが正しく動作しなくなる可能性があります。これらのオプションは、ニーズに合わせて[簡単に変更できます](https://github.com/arkenfox/user.js/wiki/3.1-Overrides)。 プロジェクトの[ウィキ](https://github.com/arkenfox/user.js/wiki)に全て目を通すことを**強くお勧めします**。 Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfoxでは、canvasのランダム化やFirefoxの組み込みのフィンガープリント対策の設定に基づき、基本的または単純なトラッキングスクリプトを防ぐことを唯一の目的としています。 Arkenfoxは、Mullvad BrowserやTor Browserのように、高度なフィンガープリンティングトラッキング用のスクリプトを防止するための唯一の方法である、他の多くのArkenfoxユーザーとブラウザを混ぜ合わせることを目指してはいません。 常に複数のブラウザを使用できることを覚えておいてください。たとえば、ログインしたままにしたいサイトや、それとは別の仕方で信頼したいサイトについては Firefox + Arkenfox を使用し、一般的なブラウジングには Mullvad Browserを使用するといった方法を考えることができます。 @@ -223,25 +223,25 @@ Arkenfoxでは、canvasのランダム化やFirefoxの組み込みのフィン
-![Brave ロゴ](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser**には、コンテンツブロッカーと[いくつかのプライバシー機能](https://brave.com/privacy-features/)が内蔵されており、その多くはデフォルトで有効になっています。 +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. BraveはChromiumウェブブラウザープロジェクトに基づいて構築されているため、使い慣れた使用感があるほか、ウェブサイトの互換性問題を最小限に抑えられます。 -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ Brave adds a "[referral code](https://github.com/brave/brave-browser/wiki/Brave% ##### シールド -Braveには、[シールド](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-)機能にフィンガープリンティングへの対策が備わっています。 訪問する全てのページにおいて、これらのオプションを[グローバル](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-)に設定することをお勧めします。 +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. シールドのオプションは、必要に応じてサイトごとにダウングレードできますが、デフォルトでは以下の設定をおすすめします。 @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave
-1. このオプションでは、uBlock Originの高度な[ブロックモード](https://github.com/gorhill/uBlock/wiki/Blocking-mode)や[NoScript](https://noscript.net/)拡張機能と同様の機能が有効になります。 +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### プライバシーとセキュリティー
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. BraveはTor Browserほどフィンガープリントに対して強く**なく**、BraveでTorを使う人はずっと少ないため目立ってしまうでしょう。 [強力な匿名性が必要](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-)な場合には[Tor Browser](tor.md#tor-browser)を使用してください。 +1. BraveはTor Browserほどフィンガープリントに対して強く**なく**、BraveでTorを使う人はずっと少ないため目立ってしまうでしょう。 Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ BraveのWeb3機能はブラウザのフィンガープリントなど攻撃面 #### 同期 -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync)は、あなたのブラウジングデータ(履歴、ブックマークなど)をすべてのデバイスで利用可能にし、それをE2EE(End-to-End Encryption, 端末間暗号化)で保護します。アカウントは不要です。 +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave RewardsとWallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ uBlock Origin Lite only receives block list updates whenever the extension is up - Linux、macOS、Windowsで利用できる。 - ブラウザをよりプライバシーを尊重したものにするための変更が、ユーザーエクスペリエンスを損なうものではないこと。 - デフォルトでサードパーティCookieをブロックしている。 -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### 満たされることが望ましい基準 満たされることが望ましい基準には、このカテゴリーの完璧なプロジェクトに私たちが望むものを示しています。 私たちが推薦するプロジェクトは、この機能の一部または全部を含んでいないかもしれませんが、もし含んでいれば、このページで他のプロジェクトよりも上位にランクされるかもしれません。 - コンテンツブロック機能を内蔵していること。 -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - ユーザーのプライバシーに影響を与えないアドオン機能(ブロートウェア)が含まれていないこと。 - テレメトリーをデフォルトでは収集しないこと。 @@ -462,4 +462,4 @@ uBlock Origin Lite only receives block list updates whenever the extension is up - ユーザーのプライバシーに直接影響を与えるものであること。つまり、単に情報を提供するだけではないこと。 [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/ja/desktop.md b/i18n/ja/desktop.md index ac7f8333..2e3fb500 100644 --- a/i18n/ja/desktop.md +++ b/i18n/ja/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: ホームページ](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=ドキュメンテーション} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=貢献 } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute }
@@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,9 +108,9 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: ホームページ](https://nixos.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=ドキュメンテーション} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=貢献 } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute }
@@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute }
@@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute }
@@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute }
@@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. また、 [Whonix](#whonix) のもとのOSとしても機能しています。 -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute }
diff --git a/i18n/ja/device-integrity.md b/i18n/ja/device-integrity.md index 23005968..6b134fda 100644 --- a/i18n/ja/device-integrity.md +++ b/i18n/ja/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/ja/dns.md b/i18n/ja/dns.md index 15324611..3a70b220 100644 --- a/i18n/ja/dns.md +++ b/i18n/ja/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## 推奨するサービスプロバイダー -| DNSプロバイダー | プライバシーポリシー | プロトコル | ログ設定 | ECS | フィルタリング | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | --- | --------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Some[^2] | いいえ | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | いいえ | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | いいえ[^4] | いいえ | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | 任意 | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | 任意 | Based on personal configuration, Malware blocking by default. | +| DNSプロバイダー | プライバシーポリシー | プロトコル | ログ設定 | ECS | フィルタリング | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | --- | --------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Some[^2] | いいえ | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | いいえ | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | いいえ[^4] | いいえ | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | 任意 | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | 任意 | Based on personal configuration, Malware blocking by default. | ### 規準 @@ -50,7 +50,7 @@ After installation of either a configuration profile or an app that uses the DNS #### 署名済みプロファイル -Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

詳細

@@ -74,7 +74,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home features a polished web interface to view insights and manage blocked content. @@ -144,13 +144,13 @@ AdGuard Home features a polished web interface to view insights and manage block ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -159,8 +159,8 @@ Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to suc
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. 特に要求されていない場合は、データは記録されません。 [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/ja/email-clients.md b/i18n/ja/email-clients.md index 7246fed6..10935f04 100644 --- a/i18n/ja/email-clients.md +++ b/i18n/ja/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -74,9 +74,9 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. -[:octicons-home-16: ホームページ](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="プライバシーポリシー" } -[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=ドキュメンテーション} +[:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mailのソースコードは公開されていません。 We recommend i [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mailのソースコードは公開されていません。 We recommend i ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/ja/email.md b/i18n/ja/email.md index 1c9f325a..2d9c535b 100644 --- a/i18n/ja/email.md +++ b/i18n/ja/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mailには内部にクラッシュレポートがあり、これは第三 #### :material-check:{ .pg-green } カスタムドメインとエイリアス -Proton Mailの有料会員は独自ドメインでサービスや [キャッチオール](https://proton.me/support/catch-all) アドレスを使うことができます。 Proton Mailはドメインを購入したくない人に便利な [サブアドレス](https://proton.me/support/creating-aliases) もサポートしています。 +Proton Mailの有料会員は独自ドメインでサービスや [キャッチオール](https://proton.me/support/catch-all) アドレスを使うことができます。 Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } プライベートな支払い方法 @@ -129,7 +129,7 @@ Proton Mailにはデジタル遺産の機能はありません。 #### :material-check:{ .pg-green } カスタムドメインとエイリアス -Mailbox.orgでは独自ドメインを使用することができ、 [キャッチオール](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) アドレスをサポートしています。 Mailbox.orgはドメインを購入したくない人に便利な [サブアドレス](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it) もサポートしています。 +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } プライベートな支払い方法 @@ -137,17 +137,17 @@ Mailbox.orgは決済プロセッサBitPayがドイツでの業務を停止した #### :material-check:{ .pg-green } アカウントのセキュリティ -Mailbox.orgはwebメールに限り [二要素認証](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) をサポートしています。 [YubiCloud](https://www.yubico.com/products/services-software/yubicloud)を介して、TOTP または [YubiKey](https://en.wikipedia.org/wiki/YubiKey) のいずれかを使用することができます。 [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) などのウェブ標準はまだサポートされていません。 +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) などのウェブ標準はまだサポートされていません。 #### :material-information-outline:{ .pg-blue } データのセキュリティ -Mailbox.orgでは [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox) を使用して受信メールを暗号化することができます。 新しいメッセージを受信するとすぐにあなたの公開鍵で暗号化されます。 +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). 新しいメッセージを受信するとすぐにあなたの公開鍵で暗号化されます。 -ただし、Mailbox.orgが使用しているソフトウェアプラットフォームである [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange) はアドレス帳とカレンダーの暗号化を [サポートしていません](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) 。 その情報については、 [スタンドアロンオプション](calendar.md) の方が適切であるかもしれません。 +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. その情報については、 [スタンドアロンオプション](calendar.md) の方が適切であるかもしれません。 #### :material-check:{ .pg-green } メールの暗号化 -Mailbox.orgはwebメールに [暗号化を組み込んで](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) おり、OpenPGP公開鍵を持つ人へのメッセージ送信を簡素化します。 また、Mailbox.orgのサーバ上にある [メールをリモートの受信者が復号](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) することもできます。 この機能はリモートの受信者がOpenPGPを持っておらず、自分のメールボックスにあるメールのコピーを複合できない場合に便利です。 +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. この機能はリモートの受信者がOpenPGPを持っておらず、自分のメールボックスにあるメールのコピーを複合できない場合に便利です。 Mailbox.orgは [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD) からHTTP経由で公開鍵を発見することもサポートしています。 これにより、Mailbox.orgを使っていない人でも、Mailbox.orgアカウントのOpenPGPキーを簡単に見つけることができ、プロバイダをまたいだE2EEが可能になります。 This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Mailbox.orgは [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD) からHTTP #### :material-information-outline:{ .pg-blue } 追加機能 -[.onionサービス](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org) を使って、IMAP/SMTP経由でMailboxl.orgアカウントにアクセスできます。 ただし .onionサービスからwebメールのインターフェイスにアクセスすることはできず、TLS証明書のエラーが発生する可能性があります。 +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). ただし .onionサービスからwebメールのインターフェイスにアクセスすることはできず、TLS証明書のエラーが発生する可能性があります。 -全てのアカウントには [暗号化可能](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive) な限られたクラウドストレージが付属しています。 Mailbox.orgは [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely) エイリアスも提供しており、これはメールサーバ間の接続にTLS暗号化を強制し、さもなければメッセージは全く送信されません。 Mailbox.orgはIMAPやPOP3のような標準的なアクセスプロトコルに加え、 [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) もサポートしています。 +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.orgはIMAPやPOP3のような標準的なアクセスプロトコルに加え、 [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) もサポートしています。 Mailbox.orgの全てのプランにはデジタル遺産機能があります。 相続人が申請し、遺言書を提出することを条件に、自分のデータを相続人に渡すかどうかを選択することができます。 または、名前と住所で人を指名することもできます。 @@ -185,18 +185,18 @@ Mailbox.orgの全てのプランにはデジタル遺産機能があります。 [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } カスタムドメインとエイリアス -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } プライベートな支払い方法 @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tutaにはデジタルレガシー機能はありません。 @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). 注目すべき無料の機能: @@ -310,8 +310,8 @@ The number of shared aliases (which end in a shared domain like @addy.io) that y **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ The number of shared aliases (which end in a shared domain like @addy.io) that y - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLoginは、2022年4月8日付で[Proton AGに買収](https://proton.me/news/proton-and-simplelogin-join-forces)されました。 Proton Mailを第一のメールボックスに使っている場合、SimpleLoginは素晴らしい選択肢です。 いまでは両方の製品が同じ会社によって所有されているので、一つの企業を信頼すれば十分となりました。 また、SimpleLoginは今後、プロトンが提供するサービスとより緊密に統合されるものと期待されています。 引き続きSimpleLoginは、希望のメールプロバイダーへの転送をサポートします。 Securitumは2022年初めにSimpleLoginを[監査](https://simplelogin.io/blog/security-audit/)し、すべての問題は[対処](https://simplelogin.io/audit2022/web.pdf)されました。 +SimpleLoginは、2022年4月8日付で[Proton AGに買収](https://proton.me/news/proton-and-simplelogin-join-forces)されました。 Proton Mailを第一のメールボックスに使っている場合、SimpleLoginは素晴らしい選択肢です。 いまでは両方の製品が同じ会社によって所有されているので、一つの企業を信頼すれば十分となりました。 また、SimpleLoginは今後、プロトンが提供するサービスとより緊密に統合されるものと期待されています。 引き続きSimpleLoginは、希望のメールプロバイダーへの転送をサポートします。 Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). 設定でSimpleLoginアカウントをProtonアカウントとリンクさせることができます。 Proton Unlimited、Business、またはVisionaryプランをお持ちの場合は、SimpleLogin Premiumを無料で利用できます。 @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## 規準 @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **最低条件:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ We regard these features as important in order to provide a safe and optimal ser - TOTPなどの二要素認証によるウェブメールの保護。 - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions)のサポート。 -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - 有効な [MTA-STS](https://tools.ietf.org/html/rfc8461) および [TLS-RPT](https://tools.ietf.org/html/rfc8460) ポリシー。 - 有効な[DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities)レコード。 - 有効な[SPF](https://ja.wikipedia.org/wiki/Sender_Policy_Framework)および[DKIM](https://ja.wikipedia.org/wiki/DKIM)レコード。 - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - 以下のようなウェブサイトのセキュリティ基準: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ We regard these features as important in order to provide a safe and optimal ser - バグ報奨金プログラム、協調的な脆弱性開示プロセス。 - 以下のようなウェブサイトのセキュリティ基準: - [コンテンツセキュリティポリシー(CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### 信頼 diff --git a/i18n/ja/encryption.md b/i18n/ja/encryption.md index 70ec7521..369ad7a6 100644 --- a/i18n/ja/encryption.md +++ b/i18n/ja/encryption.md @@ -22,15 +22,15 @@ cover: encryption.webp [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomatorは、AES-256を用いて、ファイルとファイル名の両方 Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt(ファイル) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/ja/file-sharing.md b/i18n/ja/file-sharing.md index 49726d2f..cd4266a7 100644 --- a/i18n/ja/file-sharing.md +++ b/i18n/ja/file-sharing.md @@ -15,7 +15,7 @@ cover: file-sharing.webp ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send**は、Mozillaの廃止されたFirefox Sendサービスのフォークで、リンクを使って他の人にファイルを送ることができます。 ファイルはサーバーから読み取れないようにデバイス上で暗号化され、オプションでパスワードで保護することもできます。 Sendの保守管理者は[公開インスタンス](https://send.vis.ee/)をホストしています。 他の公開インスタンスを使うこともできますし、Sendを自分でホストすることもできます。 +**Send**は、Mozillaの廃止されたFirefox Sendサービスのフォークで、リンクを使って他の人にファイルを送ることができます。 ファイルはサーバーから読み取れないようにデバイス上で暗号化され、オプションでパスワードで保護することもできます。 The maintainer of Send hosts a [public instance](https://send.vis.ee). 他の公開インスタンスを使うこともできますし、Sendを自分でホストすることもできます。 [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="公開インスタンス"} @@ -81,9 +81,9 @@ ffsend upload --host https://send.vis.ee/ FILE **FreedomBox**は、[シングルボードコンピュータ(SBC)](https://ja.wikipedia.org/wiki/%E3%82%B7%E3%83%B3%E3%82%B0%E3%83%AB%E3%83%9C%E3%83%BC%E3%83%89%E3%82%B3%E3%83%B3%E3%83%94%E3%83%A5%E3%83%BC%E3%82%BF)上で動作するように設計されたオペレーティングシステムです。 目的は、自身でホストしたいサーバーアプリケーションを簡単に立ち上げられるようにすることです。 [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=ドキュメンテーション} -[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="ソースコード" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=貢献 } +[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} +[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ ffsend upload --host https://send.vis.ee/ FILE [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ Nextcloudでの[E2EEアプリ](https://apps.nextcloud.com/apps/end_to_end_encryp [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/ja/financial-services.md b/i18n/ja/financial-services.md index cd59175f..f769e0b8 100644 --- a/i18n/ja/financial-services.md +++ b/i18n/ja/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/ja/frontends.md b/i18n/ja/frontends.md index 062a3b4a..94621a51 100644 --- a/i18n/ja/frontends.md +++ b/i18n/ja/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-Yatteeを使用している場合、あなたのIPアドレスは、設定に応じて、YouTube、[Invidious](https://instances.invidio)、[Piped](https://github.com/TeamPiped/Piped/wiki/Instances)または[SponsorBlock](https://spon.ajay.app/)に通知されます。 Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -149,17 +149,17 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube
-![Newpipeのロゴ](assets/img/frontends/newpipe.svg){ align=right } +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe**は、 [YouTube](https://youtube.com)、 [SoundCloud](https://soundcloud.com)、 [media.ccc.de](https://media.ccc.de)、 [Bandcamp](https://bandcamp.com)、 [PeerTube](https://joinpeertube.org/)用の、フリーでオープンソースのAndroidアプリケーションです(1)。 +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). 購読リストとプレイリストは、Android端末にローカル保存されます。 [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube
-1. デフォルトのインスタンスは [FramaTube](https://framatube.org/)ですが、 **設定** → **コンテンツ** → **PeerTubeのインスタンス**から追加できます。 +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/ja/index.md b/i18n/ja/index.md index 9a487383..20ba1423 100644 --- a/i18n/ja/index.md +++ b/i18n/ja/index.md @@ -62,12 +62,12 @@ schema: ## あなたの力が必要です! 参加方法は以下の通りです: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="フォーラムに参加" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Mastodonでフォロー" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="このウェブサイトに貢献" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="このウェブサイトの翻訳に協力" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="私たちとMatrixでチャット" } -[:material-information-outline:](about/index.md){ title="私たちの詳細" } -[:material-hand-coin-outline:](about/donate.md){ title="プロジェクトを支援" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } Privacy Guidesのようなウェブサイトは、常に最新の情報を提供することが重要です。 閲覧者は、私たちのサイトに掲載されたアプリケーションのソフトウェアアップデートを確認し、おすすめのプロバイダに関する最新情報を入手する必要があります。 インターネットの速さに追いつくのは難しいですが、私たちは最善を尽くします。 誤りを見つけた場合、不適切なプロバイダが掲載されていると感じた場合、適格なプロバイダが掲載されていない場合、ブラウザのプラグインが最適でないと感じた場合、またはその他の問題を発見した場合は、ご連絡ください。 diff --git a/i18n/ja/kb-archive.md b/i18n/ja/kb-archive.md index 150c631f..8969ec45 100644 --- a/i18n/ja/kb-archive.md +++ b/i18n/ja/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOSとCalyxOSの比較](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [安全なデータ消去](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOSとCalyxOSの比較](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [安全なデータ消去](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/ja/meta/admonitions.md b/i18n/ja/meta/admonitions.md index 30a8f8a9..bd7c0210 100644 --- a/i18n/ja/meta/admonitions.md +++ b/i18n/ja/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/ja/meta/translations.md b/i18n/ja/meta/translations.md index 34c19711..f6912c8b 100644 --- a/i18n/ja/meta/translations.md +++ b/i18n/ja/meta/translations.md @@ -2,9 +2,9 @@ title: 翻訳 --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/ja/meta/uploading-images.md b/i18n/ja/meta/uploading-images.md index 649aa990..049aa5b4 100644 --- a/i18n/ja/meta/uploading-images.md +++ b/i18n/ja/meta/uploading-images.md @@ -17,7 +17,7 @@ Privacy Guidesに投稿する際の一般的なルールをいくつか紹介し ### PNG -[OptiPNG](https://sourceforge.net/projects/optipng/)を使用してPNG画像を最適化してください。 +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/ja/meta/writing-style.md b/i18n/ja/meta/writing-style.md index 25d66a68..64e9573e 100644 --- a/i18n/ja/meta/writing-style.md +++ b/i18n/ja/meta/writing-style.md @@ -4,11 +4,11 @@ title: 文章のスタイル Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## 読者のために書くこと -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### 「ユーザー」を避けること @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > 能動態で書くと、誰が何をすべきかが明確になります。 It eliminates ambiguity about responsibilities. 「それがされなければならない」ではなく、「あなたはそれをしなければならない」とすること。 -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/ja/mobile-browsers.md b/i18n/ja/mobile-browsers.md index 6bac694c..12122347 100644 --- a/i18n/ja/mobile-browsers.md +++ b/i18n/ja/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,22 +41,22 @@ schema: ## Android -Androidでは、FirefoxはChromiumベースのブラウザーよりもまだ安全性が低いです。Mozillaのエンジンである[GeckoView](https://mozilla.github.io/geckoview/)は、[サイト分離](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture)をサポートしておらず、また、[分離プロセス](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196)を有効にしていません。 +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave
-![Brave ロゴ](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser**には、コンテンツブロッカーと[いくつかのプライバシー機能](https://brave.com/privacy-features/)が内蔵されており、その多くはデフォルトで有効になっています。 +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. BraveはChromiumウェブブラウザープロジェクトに基づいて構築されているため、使い慣れた使用感があるほか、ウェブサイトの互換性問題を最小限に抑えられます。 -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ BraveはChromiumウェブブラウザープロジェクトに基づいて構築 ##### シールド -Braveには、[シールド](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-)機能にフィンガープリンティングへの対策が備わっています。 訪問する全てのページにおいて、これらのオプションを[グローバル](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-)に設定することをお勧めします。 +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Braveシールドのグローバルデフォルト @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. このオプションでは、uBlock Originの高度な[ブロックモード](https://github.com/gorhill/uBlock/wiki/Blocking-mode)や[NoScript](https://noscript.net/)拡張機能と同様の機能が有効になります。 +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### ブラウジングデータを消去 @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync)は、あなたのブラウジングデータ(履歴、ブックマークなど)をすべてのデバイスで利用可能にし、それをE2EE(End-to-End Encryption, 端末間暗号化)で保護します。アカウントは不要です。 +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report provides a snapshot of cross-site trackers currently prevented fr - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud同期 -Safariの履歴、タブグループ、iCloudタブ、保存されたパスワードの同期は端末間暗号化によって行われます。 しかし、デフォルトでは、ブックマークは[そうではありません](https://support.apple.com/en-us/HT202303)。 アップルは、 [プライバシーポリシー](https://www.apple.com/legal/privacy/en-ww/)に従い、ブックマークを復号化して、読み取ることができます。 +Safariの履歴、タブグループ、iCloudタブ、保存されたパスワードの同期は端末間暗号化によって行われます。 However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -[高度なデータ保護](https://support.apple.com/en-us/HT212520)を有効にすることで、Safariのブックマークとダウンロードに対して端末間暗号化を有効にできます。 **Apple ID名 → iCloud → 高度なデータ保護**にアクセスしてください。 +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). **Apple ID名 → iCloud → 高度なデータ保護**にアクセスしてください。 - [x] **高度なデータ保護**を有効にする @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/ja/multi-factor-authentication.md b/i18n/ja/multi-factor-authentication.md index b0dac352..d7d35a1c 100644 --- a/i18n/ja/multi-factor-authentication.md +++ b/i18n/ja/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -**YubiKeys**は最も人気のあるセキュリティ・キーのひとつです。 いくつかのYubiKeyモデルには以下のような幅広い機能があります: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +**YubiKeys**は最も人気のあるセキュリティ・キーのひとつです。 Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -YubiKeyの利点の1つは、1つのキーでハードウェア・セキュリティ・キーに期待されるほとんどのこと(YubiKey 5)ができることです。 正しい選択をするために、購入前に [quiz](https://www.yubico.com/quiz/)をご覧になることをお勧めします。 +YubiKeyの利点の1つは、1つのキーでハードウェア・セキュリティ・キーに期待されるほとんどのこと(YubiKey 5)ができることです。 We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). Yubicoのクライアントはすべてオープンソースです。 +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). Yubicoのクライアントはすべてオープンソースです。 For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation} -The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Nitrokeyの中には、パスワードマネージャーとして機能するものもあります。 They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/ja/news-aggregators.md b/i18n/ja/news-aggregators.md index 489d4810..dce05a0d 100644 --- a/i18n/ja/news-aggregators.md +++ b/i18n/ja/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ RedditではRSSでSubredditを購読することができます。 Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ Googleアカウントにログインしたり、使用状況情報を関連付 RSSクライアントでYouTubeチャンネルを購読するには、まず[チャンネルID](https://support.google.com/youtube/answer/6180214)を探します。 The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/ja/notebooks.md b/i18n/ja/notebooks.md index 7d6f50d0..3762d015 100644 --- a/i18n/ja/notebooks.md +++ b/i18n/ja/notebooks.md @@ -34,7 +34,7 @@ cover: notebooks.webp - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ cover: notebooks.webp ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. 外出先でメモを取るための強力な同期機能を備えており、すべてのプラットフォームでエンドツーエンドの暗号化を行います。 You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. 外出先でメモを取るための強力な同期機能を備えており、すべてのプラットフォームでエンドツーエンドの暗号化を行います。 You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ cover: notebooks.webp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin**は、ノートやタグを管理し大量のMarkdownノートを扱える、フリー、オープンソース、フル機能のノートおよびToDoアプリケーションです。 エンドツーエンド暗号化対応で、NextcloudやDropboxなどを通じて同期できます。 また、Evernoteやプレーンテキストノートを簡単にインポートできます。 -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -135,9 +135,9 @@ Crypteeは100MBのストレージを無料で提供しています。さらに
-![Org-modeロゴ](assets/img/notebooks/org-mode.svg){ align=right } +![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode**はGNU Emacsの[主要なモード](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html)です。 Org-modeを使うと、高速かつ効果的なプレーンテキスト システムにより、メモの保存、ToDoリストの管理、プロジェクトの計画、およびドキュメントの作成を行うことができます。 [ファイル同期](file-sharing.md#file-sync)ツールを使うと同期が可能です。 +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-modeを使うと、高速かつ効果的なプレーンテキスト システムにより、メモの保存、ToDoリストの管理、プロジェクトの計画、およびドキュメントの作成を行うことができます。 [ファイル同期](file-sharing.md#file-sync)ツールを使うと同期が可能です。 [:octicons-home-16: ホームページ](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=文書 } diff --git a/i18n/ja/os/android-overview.md b/i18n/ja/os/android-overview.md index 99a08d82..211652f3 100644 --- a/i18n/ja/os/android-overview.md +++ b/i18n/ja/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### 高度な保護機能プログラム -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### 広告ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/ja/os/ios-overview.md b/i18n/ja/os/ios-overview.md index 163424b0..825dd229 100644 --- a/i18n/ja/os/ios-overview.md +++ b/i18n/ja/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/ja/os/linux-overview.md b/i18n/ja/os/linux-overview.md index 4152bcd0..357e4496 100644 --- a/i18n/ja/os/linux-overview.md +++ b/i18n/ja/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## ディストリビューションの選択 @@ -42,9 +42,9 @@ Additionally, Linux falls behind in implementing [exploit mitigations](https://m We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## 一般的な推奨事項 @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### スワップ @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/ja/os/macos-overview.md b/i18n/ja/os/macos-overview.md index f5957d7d..28a6e632 100644 --- a/i18n/ja/os/macos-overview.md +++ b/i18n/ja/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS**は、AppleがMacコンピュータ用に開発したUnixオペレーティングシステムです。 To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. データセキュリティを強化するため、[Appleシリコン](https://support.apple.com/en-us/HT211814)を搭載した新しいMacを使用することをおすすめします。 +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## プライバシーに関する注意事項 @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## 推奨する設定 Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### ロックダウンモード -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/ja/os/qubes-overview.md b/i18n/ja/os/qubes-overview.md index 4dde7c23..0e0ddcb4 100644 --- a/i18n/ja/os/qubes-overview.md +++ b/i18n/ja/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## Qubes OSの仕組み -Qubesは、 [区画化(コンパートメンタリゼーション)](https://www.qubes-os.org/intro/) によってシステムの安全性を維持しています。 Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubesのアーキテクチャー](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### テキストのコピー&ペースト -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## VPN経由でTorに接続 @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## その他の資料 -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/ja/passwords.md b/i18n/ja/passwords.md index 39271276..ffb6787b 100644 --- a/i18n/ja/passwords.md +++ b/i18n/ja/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: パスワードマネージャー operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: パスワードマネージャー operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: パスワードマネージャー operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: パスワードマネージャー operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi
-Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### コマンドライン @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/ja/photo-management.md b/i18n/ja/photo-management.md index c424a5bf..bf876d54 100644 --- a/i18n/ja/photo-management.md +++ b/i18n/ja/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/ja/productivity.md b/i18n/ja/productivity.md index 90f6416f..8e92ebfe 100644 --- a/i18n/ja/productivity.md +++ b/i18n/ja/productivity.md @@ -19,9 +19,9 @@ cover: productivity.webp [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,10 +53,10 @@ Nextcloudでの[E2EEアプリ](https://apps.nextcloud.com/apps/end_to_end_encryp **CryptPad**は、一般的なオフィスツールのプライベートな代替ツールです。 このウェブサービス上のコンテンツはすべてエンドツーエンドで暗号化されており、他のユーザーと簡単に共有することができます。 [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="プライバシーポリシー" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=ドキュメンテーション} -[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="ソースコード" } -[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=貢献 } +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute }
@@ -99,20 +99,20 @@ In general, we define collaboration platforms as full-fledged suites which could **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ In general, we define collaboration platforms as full-fledged suites which could **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ In general, we define collaboration platforms as full-fledged suites which could - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. PrivateBinはZeroBinの改良版です。 [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/ja/real-time-communication.md b/i18n/ja/real-time-communication.md index c0b4a6e0..7d1839f7 100644 --- a/i18n/ja/real-time-communication.md +++ b/i18n/ja/real-time-communication.md @@ -22,18 +22,18 @@ cover: real-time-communication.webp **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/ja/router.md b/i18n/ja/router.md index 9649571b..89a1ec3a 100644 --- a/i18n/ja/router.md +++ b/i18n/ja/router.md @@ -35,10 +35,10 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/ja/search-engines.md b/i18n/ja/search-engines.md index b788b352..ab86617b 100644 --- a/i18n/ja/search-engines.md +++ b/i18n/ja/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Searchは米国に拠点を置いています。 Their [privacy policy](ht ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGoは米国に拠点を置いています。 Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" } @@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} @@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. 私たちは受け取った答えに満足しています。 +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. 私たちは受け取った答えに満足しています。 ## 規準 diff --git a/i18n/ja/tools.md b/i18n/ja/tools.md index de479a43..591d1423 100644 --- a/i18n/ja/tools.md +++ b/i18n/ja/tools.md @@ -9,7 +9,7 @@ description: Privacy Guidesは、大規模監視プログラムやその他の 何か特定のソリューションをお探しなら、様々なカテゴリーでおすすめのハードウェアとソフトウェアのツールをご紹介します。 私たちがおすすめするプライバシーツールは、主にセキュリティ機能に基づいて選択されており、さらに分散型やオープンソースのツールに重点を置いています。 これらは、世界的な大規模監視プログラムからの保護や大手ハイテク企業の回避から攻撃の緩和まで、さまざまな脅威モデルに適用できます。しかし、あなただけがあなたのニーズに最適であるかを判断できます。 -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNSプロバイダ -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [詳細 :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/ja/tor.md b/i18n/ja/tor.md index ed103cc2..738639bb 100644 --- a/i18n/ja/tor.md +++ b/i18n/ja/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: **Tor**ネットワークは、ボランティアが運営するサーバ群で、無料で接続でき、インターネット上でのプライバシーとセキュリティの確保に役立ちます。 個人や組織は、プライバシーを損なうことなく、Torネットワーク上で「.onion 秘匿サービス」による情報共有が可能です。 Torトラフィックはブロックや追跡が困難であるため、Torは効果的な検閲回避ツールです。 -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ Firefoxでおすすめされているものを含め、Tor Browserに追加の -Tor Browserはフィンガープリントを防止するよう設計されており、不用意にブラウザの設定を変更するとあなたは特定されやすくなってしまいます。 したがって、デフォルトの[セキュリティーレベル](https://tb-manual.torproject.org/security-settings/)を調整する以外の変更は、**決して**行うべきではありません。 +Tor Browserはフィンガープリントを防止するよう設計されており、不用意にブラウザの設定を変更するとあなたは特定されやすくなってしまいます。 Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) @@ -134,7 +134,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflakeはあなたのプライバシーを高めるものではなく、ま Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. プロキシーを設置するかどうかを決定する前に、 [Snowflakeがどのように動作するか](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home)について理解しておきましょう。 -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/ja/vpn.md b/i18n/ja/vpn.md index eeb4cfc9..d1601270 100644 --- a/i18n/ja/vpn.md +++ b/i18n/ja/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. **セキュリティー**を強化するには、ウェブサイトへの接続に常にHTTPSを使用してください。 VPNは、優れたセキュリティーの代わりにはなりません。 -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ If you are looking for **anonymity**, you should use the Tor Browser. **Proton VPN**はVPNの分野において強力なサービスプロバイダーであり、2016年から運営されています。 Proton AGはスイスに本社を置き、機能が限定された無料枠と、より多くの機能を備えたプレミアムオプションを提供しています。 -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ Proton VPN has [servers in 71 countries](https://protonvpn.com/vpn-servers) [or #### :material-check:{ .pg-green } 独立監査済み -2020年1月時点で、Proton VPNはSEC Consultによる独立監査を受けました。 SEC ConsultはProton VPNのWindows、Android、iOSアプリに中、低リスクの脆弱性を発見しましたが、これらすべてはProton VPNによって報告書が公表される前に「適切に修正」されました。 確認された問題はいずれも攻撃者がデバイスやトラフィックへリモートアクセスを可能にするものではありませんでした。 [protonvpn.com](https://protonvpn.com/blog/open-source/)で各プラットフォームの個別レポートを確認できます。 2022年4月、Proton VPNは[別の監査](https://protonvpn.com/blog/no-logs-audit/)を受け、報告書が[Securitumによって作成されました。](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf) 2021年11月9日に[Securitum](https://research.securitum.com)から [監査証明書](https://proton.me/blog/security-audit-all-proton-apps) がProton VPNアプリに対して提供されました。 +2020年1月時点で、Proton VPNはSEC Consultによる独立監査を受けました。 SEC ConsultはProton VPNのWindows、Android、iOSアプリに中、低リスクの脆弱性を発見しましたが、これらすべてはProton VPNによって報告書が公表される前に「適切に修正」されました。 確認された問題はいずれも攻撃者がデバイスやトラフィックへリモートアクセスを可能にするものではありませんでした。 You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). 2021年11月9日に[Securitum](https://research.securitum.com)から [監査証明書](https://proton.me/blog/security-audit-all-proton-apps) がProton VPNアプリに対して提供されました。 #### :material-check:{ .pg-green } オープンソースクライアント @@ -84,31 +84,31 @@ Proton VPNはクレジットおよびデビットカード、PayPal、そして[ #### :material-check:{ .pg-green } WireGuard対応 -Proton VPNは主にWireGuard®プロトコルをサポートしています。 [WireGuard](https://www.wireguard.com)は最先端の[暗号化](https://www.wireguard.com/protocol/)を使用する新しいプロトコルです。 加えて、WireGuardはよりシンプルかつより高性能であることを目指しています。 +Proton VPNは主にWireGuard®プロトコルをサポートしています。 [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). 加えて、WireGuardはよりシンプルかつより高性能であることを目指しています。 -Proton VPNはそのサービスでWireGuardを使用することを[推奨](https://protonvpn.com/blog/wireguard/)しています。 Proton VPNのWindows、macOS、iOS、Android、ChromeOS、Android TVアプリではWireGuardがデフォルトのプロトコルになっています。しかし、Linuxアプリではこのプロトコルが[サポート](https://protonvpn.com/support/how-to-change-vpn-protocols/)されていません。 +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } リモートポートフォワーディング -Proton VPNは現在NAT-PMP経由で、リース時間は60秒の一時的なリモート[ポートフォワーディング](https://protonvpn.com/support/port-forwarding/)のみをサポートしています。 Windowsアプリにはそれに簡単にアクセスできるオプションがありますが、他のオペレーティングシステムでは独自の[NAT-PMPクライアント](https://protonvpn.com/support/port-forwarding-manual-setup/)を実行する必要があります。 Torrentアプリは多くの場合NAT-PMPをネイティブサポートしています。 +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrentアプリは多くの場合NAT-PMPをネイティブサポートしています。 #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } モバイルクライアント -標準的なOpenVPN構成ファイルに加えて、Proton VPNは[App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085)、[Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US)、そして[GitHub](https://github.com/ProtonVPN/android-app/releases)用にモバイルクライアントを用意しており、サーバーへの簡単な接続を可能にしています。 +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } 追加機能 -Proton VPNクライアントは現時点でLinuxを除くすべてのプラットフォームで2要素認証をサポートしています。 Proton VPNはスイス、アイスランド、スウェーデンに独自のサーバーとデータセンターを持っています。 They offer content blocking and known-malware blocking with their DNS service. さらに、Proton VPNは「Tor」サーバーも提供しており、簡単にonionサイトへ接続することができますが、それには[公式Tor Browser](https://www.torproject.org/)の使用を強くおすすめします。 +Proton VPNクライアントは現時点でLinuxを除くすべてのプラットフォームで2要素認証をサポートしています。 Proton VPNはスイス、アイスランド、スウェーデンに独自のサーバーとデータセンターを持っています。 They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } IntelベースのMacではキルスイッチ機能が正常に動作しません。 -VPNキルスイッチを使用しているとき、IntelベースのMacではシステムクラッシュが[発生する可能性があります。](https://protonvpn.com/support/macos-t2-chip-kill-switch/) この機能が必要で、Intelチップセットを搭載したMacを使用している場合は別のVPNサービスの利用を検討する必要があります。 +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. この機能が必要で、Intelチップセットを搭載したMacを使用している場合は別のVPNサービスの利用を検討する必要があります。 ### IVPN @@ -118,9 +118,9 @@ VPNキルスイッチを使用しているとき、IntelベースのMacではシ **IVPN**はプレミアムVPNプロバイダの一つで、2009年から運営されています。 IVPNの拠点はジブラルタルです。 -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ VPNキルスイッチを使用しているとき、IntelベースのMacではシ - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ VPNキルスイッチを使用しているとき、IntelベースのMacではシ #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. これは目的地までのルートが短い(ホップが少ない) ことによります。 +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. これは目的地までのルートが短い(ホップが少ない) ことによります。 { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Pi #### :material-check:{ .pg-green } 独立監査済み -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } オープンソースクライアント -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } 現金とMoneroが利用可能 @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard対応 -IVPNはWireGuard®️プロトコルをサポートしています。 [WireGuard](https://www.wireguard.com)は最先端の[暗号化](https://www.wireguard.com/protocol/)を使用する新しいプロトコルです。 加えて、WireGuardはよりシンプルかつより高性能であることを目指しています。 +IVPNはWireGuard®️プロトコルをサポートしています。 [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). 加えて、WireGuardはよりシンプルかつより高性能であることを目指しています。 -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } リモートポートフォワーディング -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } モバイルクライアント -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } 追加機能 -IVPNのクライアントは2要素認証をサポートしています(Mullvadのクライアントはサポートしていません)。 IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPNのクライアントは2要素認証をサポートしています(Mullvadのクライアントはサポートしていません)。 IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPNのクライアントは2要素認証をサポートしています(Mullva [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPNのクライアントは2要素認証をサポートしています(Mullva #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. これは目的地までのルートが短い(ホップが少ない) ことによります。 +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. これは目的地までのルートが短い(ホップが少ない) ことによります。 { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ MullvadのVPNクライアントはCure53とAssured ABによる[cure53.deに公 > Cure53とAssured ABは監査の結果に満足しており、このソフトウェアは全体的に好印象を残した。 With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } オープンソースクライアント @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard対応 -MullvadはWireGuard®️プロトコルをサポートしています。 [WireGuard](https://www.wireguard.com)は最先端の[暗号化](https://www.wireguard.com/protocol/)を使用する新しいプロトコルです。 加えて、WireGuardはよりシンプルかつより高性能であることを目指しています。 +MullvadはWireGuard®️プロトコルをサポートしています。 [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). 加えて、WireGuardはよりシンプルかつより高性能であることを目指しています。 -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6のサポート -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } リモートポートフォワーディング -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } モバイルクライアント -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } 追加機能 -Mullvadには、どのノードを[所有またはレンタル](https://mullvad.net/en/servers/)しているのかに関する非常に高い透明性があります。 They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## 規準 diff --git a/i18n/ko/CODE_OF_CONDUCT.md b/i18n/ko/CODE_OF_CONDUCT.md index 59e41e2e..e4a3c4d5 100644 --- a/i18n/ko/CODE_OF_CONDUCT.md +++ b/i18n/ko/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **긍정적이고 건설적인 방식으로 행동합니다** diff --git a/i18n/ko/about/index.md b/i18n/ko/about/index.md index 7857e9ea..e943b848 100644 --- a/i18n/ko/about/index.md +++ b/i18n/ko/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides**는 여러분의 데이터 보안, 프라이버시 보호 [정보 제공](/kb)을 목적으로 운영되는 사이트입니다. Privacy Guides 존재 의의는 '디지털 프라이버시의 가치'와 '여러분의 온라인 활동을 모니터링하고자 하는 전 세계 각국 정부의 활동'을 보다 널리, 그리고 분명하게 알리는 것입니다. Privacy Guides는 비영리 단체이며, 순수하게 [자원봉사자로 이루어진 팀](https://discuss.privacyguides.net/g/team)과 기여자 분들에 의해 운영됩니다. Privacy Guides 웹사이트에는 광고가 존재하지 않으며, 서술된 서비스 제공 업체와 어떠한 제휴도 맺지 않았습니다. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=홈페이지 } -[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="소스 코드" } -[:octicons-heart-16:](donate.md){ .card-link title=기부 } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } +[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } +[:octicons-heart-16:](donate.md){ .card-link title=Contribute } > (프라이버시 중점) 앱을 찾으려면 Good Reports 및 **Privacy Guides** 등의 사이트를 살펴보세요. 대표적으로 빅테크 기업에서 운영하지 않는 이메일 서비스(일반적으로 유료 요금제)를 포함하여 다양한 분야의 프라이버시 중점 앱을 소개하고 있습니다. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > 단순히 적당한 VPN을 찾고 있다면, 아무 팟캐스트나 들어가서 할인 코드를 이용하시면 됩니다. 하지만 **좋은** VPN을 찾고 있다면, 여러분에게는 전문적인 도움이 필요합니다. 이메일 클라이언트, 브라우저, 운영 체제, 비밀번호 관리자도 마찬가지입니다. 그렇다면 어떤 제품이 가장 프라이버시 면에서 뛰어난 선택지인지 어떻게 알 수 있을까요? 답은 **Privacy Guides**에서 찾을 수 있습니다. Privacy Guides는 수많은 자원봉사자들이 가장 뛰어난 프라이버시 친화 서비스/제품을 가려내기 위해 끊임없이 노력하는 플랫폼입니다. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) -이외에도 여러 매체에서 소개되었습니다: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## 역사 @@ -41,7 +41,7 @@ Privacy Guides 프로젝트는 지금은 [사라진](privacytools.md) 'PrivacyTo 2022년에는 메인 웹사이트를 Jekyll에서 MkDocs(`mkdocs-material` 사용)로 전환하는 작업을 마쳤습니다. 이로 인해 외부 기여자의 오픈 소스 기여 진입 장벽이 훨씬 낮아졌습니다. 본래는 내용을 제대로 작성하기 위해서는 복잡한 문법을 익히는 과정이 필요했으나, 이제는 표준 마크다운 문서 작성 난이도와 유사한 수준으로 기여할 수 있기 때문입니다. -또한 [discuss.privacyguides.net](https://discuss.privacyguides.net/)이라는 논의 포럼을 개설해, 사람들이 의견 및 아이디어를 나누고 Privacy Guides의 목표에 대해 궁금한 점을 질문할 수 있는 커뮤니티 플랫폼을 열었습니다. 기존의 GitHub 토론 플랫폼을 대체하여 독점 플랫폼 의존도를 낮추는 동시에, 이전부터 운영하던 Matrix 커뮤니티 또한 발전하는 효과를 얻었습니다. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. 기존의 GitHub 토론 플랫폼을 대체하여 독점 플랫폼 의존도를 낮추는 동시에, 이전부터 운영하던 Matrix 커뮤니티 또한 발전하는 효과를 얻었습니다. 2023년 현재까지, [프랑스어](/fr/), [히브리어](/he/), [네덜란드어](/nl/) 버전 번역 사이트를 공개했습니다. [Crowdin](https://crowdin.com/project/privacyguides)에서 작업하는 훌륭한 Privacy Guides 번역 팀이 보다 많은 언어를 지원할 수 있도록 노력하고 있습니다. Privacy Guides는 앞으로도 사회 공헌 및 지식 전달이라는 본래 목적에 힘쓸 것이며, 현대 디지털 시대에 만연한 프라이버시 불감증에 대한 경각심을 일깨울 방법과 기술 산업 전반에 걸친 보안 사고의 피해를 명확하게 강조할 방법을 모색해 나갈 계획입니다. diff --git a/i18n/ko/about/notices.md b/i18n/ko/about/notices.md index 8c2edbe5..c50d3fc4 100644 --- a/i18n/ko/about/notices.md +++ b/i18n/ko/about/notices.md @@ -29,7 +29,7 @@ Privacy Guides is an open-source project contributed to under licenses that incl 즉, 저장소 내용 중 사람이 읽을 수 있는 콘텐츠는 크리에이티브 커먼즈 저작자표시-변경금지 4.0 국제 공공 라이선스 텍스트에 명시된 조항에 따라 자신의 프로젝트에 사용할 수 있습니다. 단, 여러분은 라이선스를 중시하는 선에서 자유롭게 이용할 수 있지만 Privacy Guides가 여러분의 행위나 여러분 개인을 직접 보증/지지하는 듯이 표현해서는 안 됩니다. 여러분은 본 프로젝트에서 명시적으로 승인하지 않는 한 자신의 프로젝트에서 Privacy Guides 상표를 사용할 수 **없습니다**. Privacy Guides 브랜드 상표에는 'Privacy Guides' 로고타입과 방패 로고가 포함됩니다. -Privacy Guides는 외부 제공 업체로부터 얻은 로고 및 각종 이미지(`assets`에 존재)에 대해, 퍼블릭 도메인이거나 공정 이용에 해당되는 것으로 판단하고 있습니다. ['공정 이용'](https://ko.wikipedia.org/wiki/%EA%B3%B5%EC%A0%95_%EC%9D%B4%EC%9A%A9)은 미국의 공정 이용 법리([Fair Use Doctrine](https://www.copyright.gov/fair-use/more-info.html))를 대표로 하는 저작권법으로, 간단히 설명하면 공개 논평에서 내용의 주제를 식별할 목적으로 저작권이 있는 이미지를 사용하는 것은 법적으로 허용하는 법입니다. 단, 로고 등의 이미지는 여전히 일부 관할권에서는 상표법의 적용을 받을 수 있습니다. 본 콘텐츠를 활용하기에 앞서 상표를 소유한 법인 및 단체를 식별하는 용도로 사용한 것이 맞는지 확인하고, 활용하고자 하는 상황에 적용되는 법률에 따라 해당 상표를 사용할 권리가 존재하는지 확인하세요. *여러분이 본 웹사이트의 콘텐츠를 복제할 때, 타인의 상표나 저작권을 침해하지 않도록 할 책임은 전적으로 여러분에게 있습니다.* +Privacy Guides는 외부 제공 업체로부터 얻은 로고 및 각종 이미지(`assets`에 존재)에 대해, 퍼블릭 도메인이거나 공정 이용에 해당되는 것으로 판단하고 있습니다. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. 단, 로고 등의 이미지는 여전히 일부 관할권에서는 상표법의 적용을 받을 수 있습니다. 본 콘텐츠를 활용하기에 앞서 상표를 소유한 법인 및 단체를 식별하는 용도로 사용한 것이 맞는지 확인하고, 활용하고자 하는 상황에 적용되는 법률에 따라 해당 상표를 사용할 권리가 존재하는지 확인하세요. *여러분이 본 웹사이트의 콘텐츠를 복제할 때, 타인의 상표나 저작권을 침해하지 않도록 할 책임은 전적으로 여러분에게 있습니다.* 여러분이 본 웹사이트에 기여하는 경우, 여러분은 상기 라이선스에 따라 기여하는 것입니다. 여러분은 프로젝트의 일부로서 여러분의 기여를 복제, 변형, 공연, 전시, 공연, 배포할 수 있는 권리를 Privacy Guides에게 부여하게 됩니다. 이는 영구적이며, 전 세계적으로 유효하며, 비독점적이고, 양도 가능하며, 로열티가 없고, 철회 불가능합니다. 또한 이 권리는 여러 단계의 서브라이선스 주체에게 재실시됩니다. @@ -47,4 +47,4 @@ Privacy Guides는 외부 제공 업체로부터 얻은 로고 및 각종 이미 --- -*본 공지의 일부는 GitHub의 [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md)로부터 참고하여 채택되었습니다. 해당 자료 및 본 공지 페이지는 [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/) 라이선스를 따릅니다.* +*본 공지의 일부는 GitHub의 [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md)로부터 참고하여 채택되었습니다. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/ko/about/privacytools.md b/i18n/ko/about/privacytools.md index 5326b83f..7ad753eb 100644 --- a/i18n/ko/about/privacytools.md +++ b/i18n/ko/about/privacytools.md @@ -14,13 +14,13 @@ title: "PrivacyTools FAQ" PrivacyTools는 2015년 'BurungHantu'가 스노든 폭로 이후 프라이버시에 도움이 되는 유용한 툴과 정보를 제공하려는 목적으로 만든 사이트입니다. 해당 사이트는 많은 [기여자](https://github.com/privacytools/privacytools.io/graphs/contributors)들의 참여를 통해 활발한 오픈 소스 프로젝트로 발전했습니다. 일부 기여자들은 Matrix와 Mastodon 같은 온라인 서비스를 운영하거나, GitHub에서 사이트의 변경 사항 관리 및 검수, 프로젝트 후원자 찾기, 블로그 포스트 작성, Twitter 같은 홍보 플랫폼 운영 등 다양한 조직적인 역할을 맡게 되었습니다. -2019년부터 BurungHantu는 웹사이트 및 커뮤니티의 활발한 개발에서 점점 멀어지기 시작했고, 서버 운영 관련 비용 결제를 미루기 시작했습니다. 시스템 관리자가 사비로 서버 비용을 지불하는 것을 피하기 위해, 저희는 [2019년 10월 31일](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/)에 사이트에 명시한 후원 방식을 BurungHantu의 개인 PayPal 및 암호화폐 계좌에서 OpenCollective 페이지로 변경했습니다. 이는 저희가 중요하게 여기는 '완전히 투명한 재정 관리'를 달성하는 동시에, Open Collective Foundation 501(c)3이 미국에서 세금 공제가 가능하다는 이점도 존재했습니다. 변경 과정은 어떠한 반대도 없이 팀원들의 만장일치로 진행되었습니다. +2019년부터 BurungHantu는 웹사이트 및 커뮤니티의 활발한 개발에서 점점 멀어지기 시작했고, 서버 운영 관련 비용 결제를 미루기 시작했습니다. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). 이는 저희가 중요하게 여기는 '완전히 투명한 재정 관리'를 달성하는 동시에, Open Collective Foundation 501(c)3이 미국에서 세금 공제가 가능하다는 이점도 존재했습니다. 변경 과정은 어떠한 반대도 없이 팀원들의 만장일치로 진행되었습니다. ## 이전하게 된 이유 2020년이 되고, BurungHantu의 부재는 훨씬 두드러졌습니다. 향후 사이트 중단을 방지하기 위해 도메인 네임 서버를 시스템 관리자가 관리하는 네임 서버로 변경해야 했는데, 이 요청이 한달 넘게 완료되지 않았던 적도 있었습니다. BurungHantu는 Matrix 공개 채팅방과 팀원용 비공개 채팅방에서 몇 달씩 잠적하다가, 이따금 나타나 작은 피드백을 주고 앞으로는 더 활발히 활동하겠다고 약속한 후 다시 잠적하곤 했습니다. -2020년 10월, 이런 문제 때문에 PrivacyTools의 시스템 관리자였던 Jonah는 다른 장기 기여자에게 관리 권한을 넘기고 프로젝트를 [떠났습니다](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/). Jonah는 BurungHangu가 부재 중이던 당시 거의 모든 PrivacyTools 서비스를 운영하고 웹사이트 개발의 *사실상* 프로젝트 리더로 활동해왔기 때문에, 그의 이탈은 조직에 큰 변화를 가져왔습니다. 이 중대한 조직 변화로 인해, 당시 BurungHantu는 나머지 팀원들에게 앞으로는 다시 프로젝트를 지휘하겠다고 약속했습니다. ==PrivacyTools 팀은 이후 수개월 동안 여러 방법을 통해 연락을 시도했지만, 어떠한 답변도 받지 못했습니다.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah는 BurungHangu가 부재 중이던 당시 거의 모든 PrivacyTools 서비스를 운영하고 웹사이트 개발의 *사실상* 프로젝트 리더로 활동해왔기 때문에, 그의 이탈은 조직에 큰 변화를 가져왔습니다. 이 중대한 조직 변화로 인해, 당시 BurungHantu는 나머지 팀원들에게 앞으로는 다시 프로젝트를 지휘하겠다고 약속했습니다. ==PrivacyTools 팀은 이후 수개월 동안 여러 방법을 통해 연락을 시도했지만, 어떠한 답변도 받지 못했습니다.== ## 도메인 의존 문제 @@ -34,25 +34,25 @@ BurungHantu와 연락이 불가능한 상태에서, 팀은 기존 도메인 통 ## 커뮤니티 행동 촉구 -2021년 말, 저희는 PrivacyTools 커뮤니티에서 새로운 이름을 고르고, 2022년 8월 2일부터 [선정된](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) 새 도메인에서 프로젝트를 이어나갈 의향을 [알렸습니다](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/). 결과적으로 'Privacy Guides'가 선정됐고, Jonah가 2020년에 시작했지만 개발이 진행되지 않은 사이드 프로젝트에 사용하기 위해 소유하고 있던 `privacyguides.org` 도메인을 사용하기로 했습니다. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. 결과적으로 'Privacy Guides'가 선정됐고, Jonah가 2020년에 시작했지만 개발이 진행되지 않은 사이드 프로젝트에 사용하기 위해 소유하고 있던 `privacyguides.org` 도메인을 사용하기로 했습니다. ## r/privacytoolsIO 운영 권한 -privacytools.io 웹사이트 문제가 계속되는 동시에, 레딧의 r/privacytoolsIO 서브레딧(게시판) 운영팀은 관리에 어려움을 겪고 있었습니다. 서브레딧 운영은 웹사이트 개발과는 독립적으로 이루어졌지만, BurungHantu는 서브레딧의 주 관리자이기도 했으며 '모든 권한'을 가진 유일한 관리자였습니다. 2021년 6월 28일, 당시 유일하게 활동하던 관리자인 u/trai_dep은 레딧 운영자에게 서브레딧 운영에 필요한 주 관리자 지위와 모든 권한을 요청하는 [게시글을](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) 작성했습니다. +privacytools.io 웹사이트 문제가 계속되는 동시에, 레딧의 r/privacytoolsIO 서브레딧(게시판) 운영팀은 관리에 어려움을 겪고 있었습니다. 서브레딧 운영은 웹사이트 개발과는 독립적으로 이루어졌지만, BurungHantu는 서브레딧의 주 관리자이기도 했으며 '모든 권한'을 가진 유일한 관리자였습니다. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit은 서브레딧에 활동하는 관리자가 존재해야 합니다. 주 관리자는 장기간(예시: 1년 이상) 활동하지 않는 경우, 주 관리자는 다음 순위의 관리자로 재임명 가능합니다. 이 요청이 받아들여지기 위해서는 BurungHantu가 (다른 플랫폼에서 잠적했던 것처럼) 오랜 기간 동안 어떤 Reddit 활동에도 전혀 참여하지 않았어야 했습니다. > Reddit 요청을 통해 서브레딧 관리자에서 해임된 경우, 이는 귀하의 응답 부재와 활동 부족으로 인해 해당 서브레딧이 r/redditrequest 위임을 받을 조건을 충족했기 때문입니다. > -> r/redditrequest는 Reddit에서 특정 커뮤니티에 현재 활동하는 관리자가 존재하는지 확인하기 위한 방법이며 [관리자 행동 강령](https://www.redditinc.com/policies/moderator-code-of-conduct)의 일부입니다. +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## 이전 개시 -2021년 9월 14일, 새 도메인으로의 마이그레이션 개시를 [발표했습니다](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/). +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > ... 저희는 이전이 이루어졌음을 사람들이 가능한 한 빨리 알 수 있도록 이전을 서둘러야 한다고 판단했습니다. 현재 www.privacyguides.org로 리디렉션되는 도메인을 최대한 오래 유지해야 모든 사용자가 변경 사항을 확인하고 북마크 및 웹사이트 링크 등을 업데이트하기에 충분한 시간을 확보할 수 있기 때문입니다. -[마이그레이션에 잇따른 변경 사항](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/)은 다음과 같습니다. +This change [entailed:](https://reddit.com/comments/pnhn4a) - www.privacytools.io를 [www.privacyguides.org](https://www.privacyguides.org)로 리디렉션합니다. - 지난 작업과 이슈 트래커를 보존하기 위해 GitHub에 소스 코드를 아카이브하여 향후 수개월 동안 현재 사이트를 개발하는 용도로 이용했습니다. @@ -63,11 +63,11 @@ Reddit은 서브레딧에 활동하는 관리자가 존재해야 합니다. 주 ## 이후의 사건들 -이전하고 나서 대략 일주일 후, BurungHantu는 약 1년 만에 처음으로 온라인에 복귀했지만, 여태까지의 불안정성으로 인해 팀원은 아무도 PrivacyTools로 복귀할 의향이 없었습니다. BurungHantu는 장기 부재에 대해 사과하기는 커녕 즉시 공격적으로 나서며 Privacy Guides로의 이전을 자신과 자신의 프로젝트에 대한 공격으로 받아들였습니다. 이후, BurungHantu는 커뮤니티에서 '프로젝트에 참여하지 않고 포기했다'라는 지적을 받자 많은 게시글을 [삭제했습니다](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn). +이전하고 나서 대략 일주일 후, BurungHantu는 약 1년 만에 처음으로 온라인에 복귀했지만, 여태까지의 불안정성으로 인해 팀원은 아무도 PrivacyTools로 복귀할 의향이 없었습니다. BurungHantu는 장기 부재에 대해 사과하기는 커녕 즉시 공격적으로 나서며 Privacy Guides로의 이전을 자신과 자신의 프로젝트에 대한 공격으로 받아들였습니다. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. 이 시점에서 BurungHantu는 '자신은 privacytools.io 작업을 계속하고 싶다'며 www.privacytools.io의 [www.privacyguides.org](https://www.privacyguides.org) 리디렉션을 제거해 달라고 요청했습니다. Privacy Guides는 이를 따랐고, 커뮤니티 인원들이 사용하고 있는 Matrix, Mastodon, PeerTube 서브도메인을 적어도 앞으로 몇 달간은 공개 서비스로 계속 운영하여 해당 사용자들이 다른 계정으로 마이그레이션할 기간을 마련해달라고 BurungHantu에게 요청했습니다. 당시 제공하던 서비스의 연합적 특성으로 인해 특정 도메인에 결속돼있어 마이그레이션하기 매우 어려웠고, 아예 불가능한 경우마저 있었습니다. -안타깝게도, 서브도메인은 10월 초에 [지원이 끊겨](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) 해당 서비스를 당시까지 사용하던 사용자는 마이그레이션할 수 없게 되었습니다. BurungHantu가 요청했던 r/privacytoolsIO 서브레딧 권한 반환이 이루어지지 않았기 때문입니다(관련 내용은 후술하였습니다). +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. 곧이어 BurungHantu는 Jonah가 프로젝트 후원금을 훔쳤다고 거짓 비난을 했습니다. BurungHantu의 주장대로라면 당시 시점은 이미 해당 사건이 발생한 지 1년이 넘은 상태였지만, Privacy Guides로의 이전이 이루어질 때까지 그 누구에게도 해당 사건을 알리지 않았다는 뜻이 됩니다. Privacy Guides 팀 및 [커뮤니티는](https://twitter.com/TommyTran732/status/1526153536962281474) BurungHantu에게 해당 주장이 사실이라면 증거는 무엇인지, 여태까지 고발하지 않았던 이유는 무엇인지 밝힐 것을 여러 차례 요청했지만, 그는 대답하지 않았습니다. @@ -77,11 +77,11 @@ Reddit은 서브레딧에 활동하는 관리자가 존재해야 합니다. 주 2022년 9월 25일 기준, Privacy Guides는 BurungHantu가 privacytools.io에서 어떤 만행을 저지르고 있는지 파악했고, 이는 보고 계신 설명 페이지를 만들기로 결정한 주된 이유이기도 합니다. BurungHantu가 운영 중인 사이트는 SEO(검색 엔진 최적화)를 매우 신경써서 검색 결과에서 최대한 많은 노출을 노리고 있으며, 금전적 보상을 대가로 받고 특정 서비스를 추천하고 있습니다. 최근에는 IVPN, Mullvad VPN 서비스가 PrivacyTools에서 제거되었습니다. 이 두 서비스는 프라이버시 커뮤니티라면 어디든 보편적으로 [권장하는](../vpn.md) 서비스이며, 제휴 마케팅에 반대하는 입장으로 유명합니다. 대신에 등재된 서비스는 NordVPN, Surfshark, ExpressVPN, hide.me였습니다. 이들은 신뢰할 수 없는 플랫폼과 비즈니스 관행을 가진 거대 VPN 업체로, 공격적인 홍보 및 제휴 마케팅으로 악명 높습니다. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. 프라이버시를 진지하게 고려하는 사람들은 서로 싸우려 들지 않으며, 누군가에게 큰 돈을 받고 남들을 선동하지 않습니다. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. 프라이버시를 진지하게 고려하는 사람들은 서로 싸우려 들지 않으며, 누군가에게 큰 돈을 받고 남들을 선동하지 않습니다. ## r/privacytoolsIO 현황 -[r/PrivacyGuides](https://www.reddit.com/r/privacyguides)가 출시되고 나서도 u/trai_dep이 두 서브레딧을 계속 관리하는 것은 비현실적이었고, 커뮤니티 또한 Privacy Guides로의 이전에 동참함에 따라 2021년 11월 1일 [게시글](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/)을 통해 r/privacytoolsIO 서브레딧은 제한된(Restricted) 서브레딧으로 변경되었습니다. +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > ... 이 서브레딧의 여태까지의 성장은 수년에 걸쳐 이루어진 많은 노력의 결과입니다. 다름 아닌 PrivacyGuides.org 팀이 그 주역이었습니다. 그리고 여러분 모두의 덕택이었습니다. > @@ -89,7 +89,7 @@ Reddit은 서브레딧에 활동하는 관리자가 존재해야 합니다. 주 서브레딧은 그 누구의 소유물도 아니며, 브랜드 대표만의 소유물은 더더욱 아닙니다. 서브레딧은 커뮤니티의 소유물입니다. 그리고 커뮤니티와 운영진은 r/PrivacyGuides로의 이전을 지지하기로 결정했습니다. -이후 수개월 동안 BurungHantu는 Reddit 규정을 [위반하며](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) 서브레딧 관리 권한을 자신의 계정으로 돌려달라고 협박하고 간청했습니다. +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > 해임 요청에 관련한 관리자의 보복 행위는 허용되지 않습니다. @@ -107,12 +107,12 @@ Reddit은 서브레딧에 활동하는 관리자가 존재해야 합니다. 주 본 주제는 커뮤니티 내에서 여러 차례 논의되어 왔으며, 현재 페이지를 읽고 계신 분들은 대부분 Privacy Guides로 전환되기까지의 사건에 대해 이미 잘 아실 것이라 생각합니다. 본 주제 관련 이전 포스트 중에는 여기서는 간결성을 위해 생략한 추가 정보가 담겨있을 수 있습니다. 필요하다면 다음 링크들을 참고하시기 바랍니다. -- [2021년 6월 28일: r/privacytoolsIO 권한 요청](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [2021년 7월 27일: 팀이 PrivacyTools 블로그에 작성한 이전 계획 발표](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [2021년 9월 13일: r/privacytoolsIO Privacy Guides로의 이전 개시 발표](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [2021년 6월 28일: r/privacytoolsIO 권한 요청](https://reddit.com/comments/o9tllh) +- [2021년 7월 27일: 팀이 PrivacyTools 블로그에 작성한 이전 계획 발표](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [2021년 9월 13일: r/privacytoolsIO Privacy Guides로의 이전 개시 발표](https://reddit.com/pnql46) - [2021년 9월 17일: Open Collective 관련 공지 (Jonah 작성)](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [2021년 9월 30일: 현재 보고 계신 이 페이지에 설명된 대부분의 사건을 자세히 설명하는 Twitter 스레드](https://twitter.com/privacy_guides/status/1443633412800225280) -- [2021년 10월 1일: 서브도메인 중단 알림 게시글 (u/dng99 작성)](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [2022년 4월 2일: PrivacyTool의 비난 블로그 포스트에 대한 u/dnd99의 응답](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [2021년 10월 1일: 서브도메인 중단 알림 게시글 (u/dng99 작성)](https://reddit.com/comments/pymthv/comment/hexwrps) +- [2022년 4월 2일: PrivacyTool의 비난 블로그 포스트에 대한 u/dnd99의 응답](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [2022년 5월 16일: Twitter에 작성된 응답 (@TommyTran732 작성)](https://twitter.com/TommyTran732/status/1526153497984618496) - [2022년 9월 3일: Techlore 포럼에 작성된 포스트 (@dngray 작성)](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/ko/advanced/communication-network-types.md b/i18n/ko/advanced/communication-network-types.md index 0abc0396..8884e28c 100644 --- a/i18n/ko/advanced/communication-network-types.md +++ b/i18n/ko/advanced/communication-network-types.md @@ -28,7 +28,7 @@ description: 메신저 애플리케이션에서 보편적으로 사용되는 몇 - [접근이나 제어가 제한적](https://drewdevault.com/2018/08/08/Signal.html)일 수 있습니다. 예시는 다음과 같습니다: - 더 자유로운 커스텀이나 더 나은 사용 경험을 제공 가능한 제3자 클라이언트를 중앙 집중형 네트워크에 연결하는 것이 [금지됩니다](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165). 이는 이용 약관에 정의되어 있는 경우가 많습니다. - 외부 개발자를 위한 문서가 부실하거나 아예 없습니다. -- 단일 주체가 서비스를 통제하는 경우, 서비스의 [소유권](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), 프라이버시 정책, 운영이 쉽게 뒤바뀔 수 있으며, 훗날에 서비스가 손상될 가능성이 존재합니다. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - 자체 호스팅을 하기 위해서는 서비스 구축에 대한 노력과 지식이 필요합니다. ## 연합형 네트워크 @@ -60,7 +60,7 @@ description: 메신저 애플리케이션에서 보편적으로 사용되는 몇 P2P 메신저는 [분산형(Distributed) 네트워크](https://en.wikipedia.org/wiki/Distributed_networking)에 노드로서 연결되어 제3자 서버 없이 수신자에게 메시지를 전달합니다. -클라이언트(피어)는 일반적으로 [분산 컴퓨팅](https://en.wikipedia.org/wiki/Distributed_computing) 네트워크를 이용해 서로를 찾아냅니다. 예시로는 [토렌트](https://ko.wikipedia.org/wiki/%EB%B9%84%ED%8A%B8%ED%86%A0%EB%A0%8C%ED%8A%B8), [IPFS](https://ko.wikipedia.org/wiki/InterPlanetary_File_System)에서 사용하는 [분산 해시 테이블](https://ko.wikipedia.org/wiki/%EB%B6%84%EC%82%B0_%ED%95%B4%EC%8B%9C_%ED%85%8C%EC%9D%B4%EB%B8%94)(DHT)이 있습니다. Wi-Fi나 Bluetooth를 통해 연결하는 근접 기반 네트워크 방식(Proximity Based Network)을 사용하는 경우도 있습니다. Briar, [Scuttlebutt](https://www.scuttlebutt.nz) 소셜 네트워크 프로토콜이 대표적입니다. +클라이언트(피어)는 일반적으로 [분산 컴퓨팅](https://en.wikipedia.org/wiki/Distributed_computing) 네트워크를 이용해 서로를 찾아냅니다. 예시로는 [토렌트](https://ko.wikipedia.org/wiki/%EB%B9%84%ED%8A%B8%ED%86%A0%EB%A0%8C%ED%8A%B8), [IPFS](https://ko.wikipedia.org/wiki/InterPlanetary_File_System)에서 사용하는 [분산 해시 테이블](https://ko.wikipedia.org/wiki/%EB%B6%84%EC%82%B0_%ED%95%B4%EC%8B%9C_%ED%85%8C%EC%9D%B4%EB%B8%94)(DHT)이 있습니다. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). 피어가 이러한 방법을 통해 연락 상대로 연결되는 경로를 찾아내면 서로 직접 연결이 이루어집니다. 메시지에는 일반적으로 암호화가 적용되나, 관찰자는 발신자/수신자의 위치와 신원을 유추할 수 있습니다. diff --git a/i18n/ko/advanced/dns-overview.md b/i18n/ko/advanced/dns-overview.md index 0bd63b85..39d6b189 100644 --- a/i18n/ko/advanced/dns-overview.md +++ b/i18n/ko/advanced/dns-overview.md @@ -18,7 +18,7 @@ DNS는 [인터넷의 초창기](https://ko.wikipedia.org/wiki/%EB%8F%84%EB%A9%94 ### 암호화되지 않은 DNS -1. [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html)를 이용하면 인터넷 패킷 흐름을 모니터링하고 기록할 수 있습니다(tshark는 [Wireshark](https://ko.wikipedia.org/wiki/%EC%99%80%EC%9D%B4%EC%96%B4%EC%83%A4%ED%81%AC) 프로젝트의 일부입니다). 다음 명령어는 명시된 규칙을 충족하는 패킷을 기록합니다. +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. 다음 명령어는 명시된 규칙을 충족하는 패킷을 기록합니다. ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ DNS는 [인터넷의 초창기](https://ko.wikipedia.org/wiki/%EB%8F%84%EB%A9%94 nslookup privacyguides.org 8.8.8.8 ``` -3. 이제 결과를 [분석](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs)합니다. +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -78,7 +78,7 @@ RFC 절차를 거치지 않았기 때문에, [일부 구현체](https://dnscrypt ### DOT(DNS over TLS) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS)는 DNS 통신을 암호화하는 또 다른 방법으로, [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858)에 정의되어 있습니다. Android 9, iOS 14, Linux([systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) 237 버전)에서 처음으로 지원되었습니다. DoT는 [복잡한 프로토콜](https://dnscrypt.info/faq/)인데다가 구현체마다 RFC 준수 여부가 다양하기 때문에, 최근 몇 년 동안은 업계 선호도가 DoT에서 DoH로 이동하고 있습니다. 또한, 853 포트를 전용으로 사용하기 때문에 제한적인 방화벽에 의해 쉽게 차단될 수 있다는 문제도 존재합니다. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS)는 DNS 통신을 암호화하는 또 다른 방법으로, [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858)에 정의되어 있습니다. Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. 또한, 853 포트를 전용으로 사용하기 때문에 제한적인 방화벽에 의해 쉽게 차단될 수 있다는 문제도 존재합니다. @@ -123,7 +123,7 @@ DoH 네이티브 구현은 iOS 14, macOS 11, Microsoft Windows, Android 13(단, ``` -[연결 생성](https://ko.wikipedia.org/wiki/%EC%A0%84%EC%86%A1_%EC%A0%9C%EC%96%B4_%ED%94%84%EB%A1%9C%ED%86%A0%EC%BD%9C#%EC%97%B0%EA%B2%B0_%EC%83%9D%EC%84%B1) 및 [TLS 핸드셰이크](https://www.cloudflare.com/ko-kr/learning/ssl/what-happens-in-a-tls-handshake/)가 모든 암호화 연결에서 발생하는 것을 확인할 수 있습니다. 뒤따르는 'Application Data' 패킷을 살펴보면 요청했던 도메인이나 반환된 IP 주소가 포함되어 있지 않다는 것 또한 확인할 수 있습니다. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. 뒤따르는 'Application Data' 패킷을 살펴보면 요청했던 도메인이나 반환된 IP 주소가 포함되어 있지 않다는 것 또한 확인할 수 있습니다. @@ -193,9 +193,9 @@ SNI(Server Name Indication, 서버 이름 표시)는 주로 하나의 IP 주소 ``` -즉, '암호화 DNS'를 사용하더라도 도메인은 SNI를 통해 노출될 가능성이 높습니다. [TLS 1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) 프로토콜에는 이런 방식의 유출을 방지하는 [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/) 기능이 존재합니다. +즉, '암호화 DNS'를 사용하더라도 도메인은 SNI를 통해 노출될 가능성이 높습니다. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -하지만 Encrypted Client Hello 또한 여러 정부(특히 [중국](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/), [러시아](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/))에서 [차단을 시작했거나](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello), 차단을 시도하고 있습니다. 최근 러시아는 [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) 표준을 사용하는 [해외 사이트를 차단하기 시작했습니다](https://github.com/net4people/bbs/issues/108). HTTP/3의 일부인 [QUIC](https://ko.wikipedia.org/wiki/QUIC) 프로토콜에서는 `ClientHello` 암호화가 필수적이기 때문입니다. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. 최근 러시아는 [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) 표준을 사용하는 [해외 사이트를 차단하기 시작했습니다](https://github.com/net4people/bbs/issues/108). HTTP/3의 일부인 [QUIC](https://ko.wikipedia.org/wiki/QUIC) 프로토콜에서는 `ClientHello` 암호화가 필수적이기 때문입니다. @@ -366,7 +366,7 @@ DNSSEC 서명 과정은 사람이 펜으로 법적 문서에 서명하는 과정 DNSSEC은 DNS의 모든 계층에 걸쳐 계층적(Hierarchical) 디지털 서명 정책을 구현합니다. 예를 들어 `privacyguides.org`를 조회하는 경우, 루트 DNS 서버는 자신의 키로 서명해 `.org` 네임 서버에게 제공하고, `.org` 네임 서버 또한 자신의 키로 서명해 `privacyguides.org`의 권한 있는 서버에 제공합니다. -Google의 [DNS Security Extensions (DNSSEC) 개요](https://cloud.google.com/dns/docs/dnssec?hl=ko)와 Cloudflare의 [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/)를 각색하였으며, 두 글은 모두 [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/) 라이선스를 따릅니다. +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). diff --git a/i18n/ko/advanced/payments.md b/i18n/ko/advanced/payments.md index 326ef98c..b3e76e29 100644 --- a/i18n/ko/advanced/payments.md +++ b/i18n/ko/advanced/payments.md @@ -9,7 +9,7 @@ icon: material/hand-coin **현금**은 수 세기 동안 주된 비공개 결제 수단으로 쓰여 왔습니다. 현금은 수많은 나라들에서 사용할 뿐만 아니라, 대부분의 상황에서 매우 뛰어난 프라이버시를 제공합니다. 또한, 고유하지 않아 똑같이 생긴 물건과 구별할 수 없습니다. -현금 결제 관련 법률은 국가마다 다릅니다. 미국의 경우에는 $10,000 이상의 현금 결제를 할 때[Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000)를 이용하여 IRS에게 보고해야 합니다. 이를 받는 회사는 해당 결제를 진행하는 사람의 이름, 주소, 직업, 생년월일과 주민등록번호나 다른 TIN을 확인할 의무가 있습니다 (일부 예외 사항 제외). 환전 또는 송금과 같은 경우에는 신분증 없이 결제할 수 있는 금액이 $3,000 이하입니다. 또한, 현금에는 일렬번호가 인쇄되어 있습니다. 판매자가 일렬번호를 추적하는 일은 거의 없지만, 법 집행 기관은 수사에서 이를 사용할 수 있습니다. +현금 결제 관련 법률은 국가마다 다릅니다. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). 이를 받는 회사는 해당 결제를 진행하는 사람의 이름, 주소, 직업, 생년월일과 주민등록번호나 다른 TIN을 확인할 의무가 있습니다 (일부 예외 사항 제외). 환전 또는 송금과 같은 경우에는 신분증 없이 결제할 수 있는 금액이 $3,000 이하입니다. 또한, 현금에는 일렬번호가 인쇄되어 있습니다. 판매자가 일렬번호를 추적하는 일은 거의 없지만, 법 집행 기관은 수사에서 이를 사용할 수 있습니다. 그럼에도 불구하고 현금은 일반적으로 가장 좋은 결제 방식입니다. @@ -60,7 +60,7 @@ Additionally, many if not most cryptocurrencies are scams. Make transactions car - [권장하는 암호화폐 :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -프라이버시 코인들은 정부 기관들로부터 감시를 받고 있습니다. 2020년에는 [IRS에서 비트코인 Lightning 네트워크와 모네로의 거래를 해독할 수 있는 도구에 대해 625,000 달러의 현상금](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc)을 발표했습니다. 결론적으로 IRS는 Chainanalysis와 Integra Fec [이 두 회사에게 총합 125만 달러의 현상금을 지급했습니다](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view). 이 도구들이 어떤 네트워크를 대상으로 만들어졌는지는 공개되지 않았습니다. 기밀 유지로 인해 ==이 암호화폐 추적 방법들이 실제로 작동하는지는 독립적으로 확인된 바는 없습니다.== 하지만, 표적 조사를 돕는 암호화폐 추적 도구는 존재할 확률이 높으며, 이런 암호화폐는 대규모 감시만 피할 수 있을 것입니다. +프라이버시 코인들은 정부 기관들로부터 감시를 받고 있습니다. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. 결론적으로 IRS는 Chainanalysis와 Integra Fec [이 두 회사에게 총합 125만 달러의 현상금을 지급했습니다](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view). 이 도구들이 어떤 네트워크를 대상으로 만들어졌는지는 공개되지 않았습니다. 기밀 유지로 인해 ==이 암호화폐 추적 방법들이 실제로 작동하는지는 독립적으로 확인된 바는 없습니다.== 하지만, 표적 조사를 돕는 암호화폐 추적 도구는 존재할 확률이 높으며, 이런 암호화폐는 대규모 감시만 피할 수 있을 것입니다. ### 기타 코인 (비트코인, 이더리움 등) @@ -76,7 +76,7 @@ Additionally, many if not most cryptocurrencies are scams. Make transactions car ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/ko/advanced/tor-overview.md b/i18n/ko/advanced/tor-overview.md index defcf4f8..4ee8ed67 100644 --- a/i18n/ko/advanced/tor-overview.md +++ b/i18n/ko/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: 우회로의 첫 번째 릴레이는 'Entry Guard' 혹은 'Guard'라고 합니다. 알려진 익명성 침해 공격으로부터 보호하기 위해, 우회로에서 첫 번째 릴레이로 2~3개월간 유지되는 빠르고 안정적인 릴레이입니다. 우회로의 나머지 경로는 새로운 웹사이트를 방문할 때마다 변경되며, 이러한 릴레이가 모두 모여 Tor의 완벽한 프라이버시 보호를 제공합니다. 보다 자세한 가드 릴레이 작동 방식 설명은 [이 블로그 포스트](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters)와 [이 논문](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf)을 참고해 주세요. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: 우회로의 첫 번째 릴레이는 'Entry Guard' 혹은 'Guard'라고 합니다. 알려진 익명성 침해 공격으로부터 보호하기 위해, 우회로에서 첫 번째 릴레이로 2~3개월간 유지되는 빠르고 안정적인 릴레이입니다. 우회로의 나머지 경로는 새로운 웹사이트를 방문할 때마다 변경되며, 이러한 릴레이가 모두 모여 Tor의 완벽한 프라이버시 보호를 제공합니다. 보다 자세한 가드 릴레이 작동 방식 설명은 [이 블로그 포스트](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters)와 [이 논문](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf)을 참고해 주세요. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: '릴레이 플래그'란 우회로 위치(Guard, Exit, BadExit 등), 우회로 속성(Fast, Stable 등), 역할(Authority, HSDir 등) 같은 릴레이의 특수 자격을 말합니다. 이는 Directory Authority에 의해 할당되며, Directory Protocol 사양에 추가로 정의되어 있습니다. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/ko/android.md b/i18n/ko/android.md index 26d77091..acf71b32 100644 --- a/i18n/ko/android.md +++ b/i18n/ko/android.md @@ -83,9 +83,9 @@ schema: **Android 오픈소스 프로젝트**는 Google이 주도하는 오픈 소스 모바일 운영 체제로, 전 세계 모바일 기기의 대부분이 사용하고 있습니다. Android가 탑재되어 판매되는 대부분의 휴대폰은 Google Play 서비스 등의 여러 앱이 강력하게 통합되어 있습니다. 이러한 프라이버시 침해 기능이 포함되지 않은 Android 버전으로 모바일 기기 운영 체제를 교체하여 프라이버시를 크게 향상시킬 수 있습니다. -[:octicons-home-16:](https://source.android.com/){ .card-link title=홈페이지 } -[:octicons-info-16:](https://source.android.com/docs){ .card-link title=문서} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="소스 코드" } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } +[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } 본 내용은 모바일 기기의 보안 및 프라이버시 보호를 극대화하는 용도로 권장드리는 Android 운영 체제, 기기, 애플리케이션 목록입니다. Android 자체에 대한 내용은 Android 기본 개요를 참고해주세요. @@ -113,27 +113,27 @@ Privacy Guides에서 권장하는 커스텀 Android 운영 체제의 우선 순 GraphneOS는 추가적인 [보안 강화](https://en.wikipedia.org/wiki/Hardening_(computing))와 프라이버시 강화 기능을 제공합니다. [메모리 할당 보안 강화](https://github.com/GrapheneOS/hardened_malloc), 네트워크 및 센서 권한 등 다양한 [보안 기능](https://grapheneos.org/features)을 포함하고 있습니다. GrapheneOS는 전체 펌웨어 업데이트 및 서명된 빌드 또한 제공하므로, 자체 검사 부팅을 완벽하게 지원합니다. -[:octicons-home-16: 홈페이지](https://grapheneos.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="프라이버시 정책" } -[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=문서} -[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=기부 } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } -GrapheneOS는 [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play) 지원하여, [Google Play 서비스](https://en.wikipedia.org/wiki/Google_Play_Services)를 여타 일반 앱처럼 완벽하게 샌드박스를 적용하여 실행할 수 있습니다. 즉, 원하는 특정 [직장 프로필](os/android-overview.md#work-profile)이나 [사용자 프로필](os/android-overview.md#user-profiles)에 추가하여, [푸시 알림](https://firebase.google.com/docs/cloud-messaging/) 등 대부분의 Google Play 서비스를 이용하면서도 권한 및 접근 영역을 완전히 제어할 수 있습니다. +GrapheneOS는 [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play) 지원하여, [Google Play 서비스](https://en.wikipedia.org/wiki/Google_Play_Services)를 여타 일반 앱처럼 완벽하게 샌드박스를 적용하여 실행할 수 있습니다. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel 스마트폰은 현재 GrapheneOS [하드웨어 보안 요구 사항](https://grapheneos.org/faq#device-support)을 충족하는 유일한 기기입니다. -[CalyxOS보다 GrapheneOS를 추천하는 이유 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[CalyxOS보다 GrapheneOS를 추천하는 이유 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS
-![DivestOS 로고](assets/img/android/divestos.svg){ align=right } +![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS**는 [LineageOS](https://lineageos.org/)의 소프트 포크입니다. +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. 서명된 빌드가 존재하여, Pixel 외 기기에서 [검증 부팅(Verified Boot)](https://source.android.com/security/verifiedboot)을 사용할 수 있습니다. [:octicons-home-16: 홈페이지](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d
-DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ DivestOS 펌웨어 업데이트의 [세부 상태](https://gitlab.com/divested-m 이동 통신사로부터 휴대폰을 사는 것은 지양해야 합니다. 이동 통신사에서 판매하는 휴대폰은 보통 **부트로더 잠금**이 걸려 있으며, [OEM 잠금 해제](https://source.android.com/devices/bootloader/locking_unlocking)를 지원하지 않습니다. 이 경우, 어떤 종류의 대체 Android 배포판도 설치할 수 없습니다. -온라인에서 중고 휴대폰을 구입할 때에는 매우 **주의해야** 합니다. 판매자의 평판을 항상 확인하세요. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). 또한 이전 소유자의 활동과 연관될 수 있다는 위험성도 존재합니다. +온라인에서 중고 휴대폰을 구입할 때에는 매우 **주의해야** 합니다. 판매자의 평판을 항상 확인하세요. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). 또한 이전 소유자의 활동과 연관될 수 있다는 위험성도 존재합니다. Android 기기 및 운영 체제 호환성에 관한 추가 정보: - 수명이 다했거나 거의 다한 기기는 구매하지 마세요. 제조업체에서 추가 펌웨어 업데이트가 제공되는 기기를 구매해야 합니다. - LineageOS나 /e/ OS가 사전 설치된 휴대폰이나, 적절한 [자체 검사 부팅(Verified Boot)](https://source.android.com/security/verifiedboot) 지원 혹은 펌웨어 업데이트가 없는 Android 휴대폰을 구매하지 마세요. 이러한 기기는 조작되었는지 여부를 확인할 방법이 없습니다. -- 요런대, 어떤 기기나 Android 배포판이 여기에 등재되지 않은 경우에는 그럴 만한 이유가 있을 겁니다. 자세한 내용은 [포럼](https://discuss.privacyguides.net/)을 참고해 주세요. +- 요런대, 어떤 기기나 Android 배포판이 여기에 등재되지 않은 경우에는 그럴 만한 이유가 있을 겁니다. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -218,16 +218,16 @@ We recommend a wide variety of Android apps throughout this site. The apps liste Shelter는 기본 파일 관리자([DocumentsUI](https://source.android.com/docs/core/architecture/modular-system/documentsui?hl=ko))를 통해 프로필 간 연락처 검색 차단 및 프로필 간 파일 공유를 지원합니다. -[:octicons-repo-16: 저장소](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } -[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=기부 } +[:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } +[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ When using Shelter, you are placing complete trust in its developer, as Shelter
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS 앱 스토어 -GrapheneOS 앱 스토어는 [GitHub](https://github.com/GrapheneOS/Apps/releases)에서 찾을 수 있습니다. 안드로이드 12 이상을 지원하며 자체 업데이트를 지원합니다. 앱 스토어에는 [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), [PDF Viewer](https://github.com/GrapheneOS/PdfViewer) 등 GraphneOS 프로젝트에서 제작한 독립 실행형 애플리케이션이 있습니다. 이러한 애플리케이션을 찾는 경우, GrapheneOS 앱 스토어의 앱은 Google이 접근할 수 없는 GrapheneOS 프로젝트 자체 서명으로 서명되어 있으므로, Play 스토어 대신 GrapheneOS 앱 스토어에서 다운로드하실 것을 권장드립니다. +GrapheneOS 앱 스토어는 [GitHub](https://github.com/GrapheneOS/Apps/releases)에서 찾을 수 있습니다. 안드로이드 12 이상을 지원하며 자체 업데이트를 지원합니다. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). 이러한 애플리케이션을 찾는 경우, GrapheneOS 앱 스토어의 앱은 Google이 접근할 수 없는 GrapheneOS 프로젝트 자체 서명으로 서명되어 있으므로, Play 스토어 대신 GrapheneOS 앱 스토어에서 다운로드하실 것을 권장드립니다. ### Aurora Store @@ -338,7 +338,7 @@ Google Play 스토어는 Google 계정 로그인이 필수적이기 때문에 **Aurora Store**는 Google 계정, Google Play 서비스, microG 없이 앱을 다운로드할 수 있는 Google Play 스토어 클라이언트입니다. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ GitLab에서는 ([Aurora Store](#aurora-store) 예시) [프로젝트 저장소]( APK 파일을 다운로드해 수동으로 설치하는 경우, Android [빌드 도구](https://developer.android.com/studio/releases/build-tools)의 일부인 [`apksigner`](https://developer.android.com/studio/command-line/apksigner)를 사용해 앱 서명을 확인할 수 있습니다. -1. [Java JDK](https://www.oracle.com/java/technologies/downloads/)를 설치합니다. +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. [Android 스튜디오 명령줄 도구](https://developer.android.com/studio#command-tools)를 다운로드합니다. @@ -393,7 +393,7 @@ APK 파일을 다운로드해 수동으로 설치하는 경우, Android [빌드 ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. 이제 결과 해시를 다른 소스와 비교할 수 있습니다. [Signal처럼](https://signal.org/android/apk/) 일부 개발자는 웹사이트에서 인증서 지문을 명시합니다. +5. 이제 결과 해시를 다른 소스와 비교할 수 있습니다. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ APK 파일을 다운로드해 수동으로 설치하는 경우, Android [빌드 ![F-Droid 로고](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/ko/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/ko/assets/img/how-tor-works/tor-encryption-dark.svg index a20379fb..0f1e0716 100644 --- a/i18n/ko/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/ko/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 사용자 - - 기기 - - - - 웹사이트에 데이터 송신 - - - - - 웹사이트로부터 데이터 수신 - - - - - 사용자 - - 기기 - - - - 입구 - - - - - 중간 - - - - - 출구 - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - 입구 - - - - - 중간 - - - - - 출구 - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/ko/assets/img/how-tor-works/tor-encryption.svg b/i18n/ko/assets/img/how-tor-works/tor-encryption.svg index 1c25034f..f954fb0f 100644 --- a/i18n/ko/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/ko/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 사용자 - - 기기 - - - - 웹사이트에 데이터 송신 - - - - - 웹사이트로부터 데이터 수신 - - - - - 사용자 - - 기기 - - - - 입구 - - - - - 중간 - - - - - 출구 - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - 입구 - - - - - 중간 - - - - - 출구 - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/ko/assets/img/how-tor-works/tor-path-dark.svg b/i18n/ko/assets/img/how-tor-works/tor-path-dark.svg index a9e82289..96e11b9e 100644 --- a/i18n/ko/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/ko/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - 사용자 - 기기 - - - - 입구 - - - - - 중간 - - - - - 출구 - - - - - PrivacyGuides.org - - - - - - - - + + + + 사용자 + 기기 + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/ko/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/ko/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index 4c6fc577..ce51beee 100644 --- a/i18n/ko/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/ko/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 사용자 - - - 기기 - - - - - - 가드 - - - 릴레이 - - - 릴레이 - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 랑데부 포인트 - - - 릴레이 - - - - - 입구 - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/ko/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/ko/assets/img/how-tor-works/tor-path-hidden-service.svg index 6feadd65..8d008447 100644 --- a/i18n/ko/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/ko/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 사용자 - - - 기기 - - - - - - 가드 - - - 릴레이 - - - 릴레이 - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 랑데부 포인트 - - - 릴레이 - - - - - 입구 - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/ko/assets/img/how-tor-works/tor-path.svg b/i18n/ko/assets/img/how-tor-works/tor-path.svg index 7f667d89..1f3b8809 100644 --- a/i18n/ko/assets/img/how-tor-works/tor-path.svg +++ b/i18n/ko/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + @@ -24,22 +24,22 @@ - 사용자 - 기기 + 사용자 + 기기 - 입구 + 입구 - 중간 + 중간 - 출구 + 출구 diff --git a/i18n/ko/basics/account-deletion.md b/i18n/ko/basics/account-deletion.md index df8fda02..be7270ef 100644 --- a/i18n/ko/basics/account-deletion.md +++ b/i18n/ko/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: 온라인 계정은 어느새 잔뜩 쌓여 있기 마련입니다. 여러분의 계정을 정리하는 데 도움이 될 몇 가지 팁을 알려드립니다. --- -온라인 계정은 시간이 지날수록 쌓여갑니다. 그리고 그 중 상당수는 더 이상 사용하지 않는 계정일 겁니다. 휴면 계정은 데이터 유출에 취약하므로 '사용하지 않는 계정을 삭제하는 것'은 프라이버시 보호에 있어서 중요합니다. 데이터 유출이란, 보호되어야 할 정보가 서비스 보안 손상으로 인해 무단으로 열람, 전송, 도난당하는 것을 말합니다. 안타깝게도 최근에는 데이터 유출 사고가 [너무 많이 발생합니다](https://haveibeenpwned.com/PwnedWebsites). 데이터 유출 사고가 여러분의 삶에 미치는 영향을 최소화하고자 한다면 디지털에서도 위생 관념을 철저히 해야 합니다. 본 내용은 온라인 상에서 여러분의 발자취를 지우기 어렵게 만드는 각종 [다크 패턴](https://www.deceptive.design/)으로 인해 복잡해진 계정 삭제 절차를 안내하는 것을 목적으로 작성되었습니다. +온라인 계정은 시간이 지날수록 쌓여갑니다. 그리고 그 중 상당수는 더 이상 사용하지 않는 계정일 겁니다. 휴면 계정은 데이터 유출에 취약하므로 '사용하지 않는 계정을 삭제하는 것'은 프라이버시 보호에 있어서 중요합니다. 데이터 유출이란, 보호되어야 할 정보가 서비스 보안 손상으로 인해 무단으로 열람, 전송, 도난당하는 것을 말합니다. 안타깝게도 최근에는 데이터 유출 사고가 [너무 많이 발생합니다](https://haveibeenpwned.com/PwnedWebsites). 데이터 유출 사고가 여러분의 삶에 미치는 영향을 최소화하고자 한다면 디지털에서도 위생 관념을 철저히 해야 합니다. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## 오래된 계정 찾기 ### 비밀번호 관리자 -디지털 생활 내내 비밀번호 관리자를 사용해 왔다면 이는 매우 간단합니다. 비밀번호 관리자는 데이터 유출로 자격 증명 노출이 발생했는지 감지하는 기능이 내장되어있는 경우도 있습니다(예시: Bitwarden [데이터 유출 보고서](https://bitwarden.com/blog/have-you-been-pwned/) 기능). +디지털 생활 내내 비밀번호 관리자를 사용해 왔다면 이는 매우 간단합니다. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden 데이터 유출 보고서 기능](../assets/img/account-deletion/exposed_passwords.png)
-비밀번호 관리자를 따로 사용한 적이 없더라도, 자신도 모르는 사이 브라우저나 휴대폰 내장 비밀번호 관리자를 사용했을 가능성이 있습니다. (예시: [Firefox 비밀번호 관리자](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google 비밀번호 관리자](https://passwords.google.com/intro), [Edge 암호 관리자](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336)) +비밀번호 관리자를 따로 사용한 적이 없더라도, 자신도 모르는 사이 브라우저나 휴대폰 내장 비밀번호 관리자를 사용했을 가능성이 있습니다. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). 데스크톱 플랫폼에도 보통 비밀번호 관리자가 있기 때문에, 잊어버린 비밀번호를 복구하는 데에 유용할 수 있습니다: -- Windows [자격 증명 관리자](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [암호](https://support.apple.com/en-us/HT211145) -- iOS [암호](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux Gnome Keyring ([Seahorse](https://wiki.gnome.org/Apps/Seahorse), [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager)로 사용 가능) ### 이메일 @@ -39,7 +39,7 @@ description: 온라인 계정은 어느새 잔뜩 쌓여 있기 마련입니다. ### GDPR (EEA 거주자만 해당) -EEA 거주자는 GDPR [제17조](https://www.gdpr.org/regulation/article-17.html)에 명시된 데이터 삭제권을 보장받습니다. EEA 거주자이신 경우, 해당 서비스의 프라이버시 정책(개인정보 처리방침)을 읽고 삭제권을 행사하는 방법을 찾아보세요. 일부 서비스는 '계정 삭제' 옵션이 계정을 비활성화할 뿐 실제 삭제를 위해서는 추가 조치가 필요하기에, 프라이버시 정책을 읽어보는 것은 중요합니다. 실제로 데이터를 삭제하려면 설문을 작성해야 하거나, 해당 서비스 데이터 보호 책임자에게 이메일을 보내야 하거나, EEA 거주자임을 증명해야 하는 경우도 있습니다. 따라서, 이 방법을 사용하고자 한다면 계정 정보 덮어쓰기를 해선 **안** 됩니다. EEA 거주자 신원이 필요할 수도 있기 때문입니다. 알아두실 점은, GDPR은 서비스 업체 위치에 무관하게 적용된다는 것입니다. GDPR은 유럽 사용자를 고객으로 삼는 서비스라면 모두 적용됩니다. 만약 서비스가 EEA 거주자의 삭제권을 존중하지 않는 경우, 여러분은 자기 나라의 [데이터 보호 기관](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en)에 연락하시면 됩니다(금전적 보상을 받을 수도 있습니다). +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. EEA 거주자이신 경우, 해당 서비스의 프라이버시 정책(개인정보 처리방침)을 읽고 삭제권을 행사하는 방법을 찾아보세요. 일부 서비스는 '계정 삭제' 옵션이 계정을 비활성화할 뿐 실제 삭제를 위해서는 추가 조치가 필요하기에, 프라이버시 정책을 읽어보는 것은 중요합니다. 실제로 데이터를 삭제하려면 설문을 작성해야 하거나, 해당 서비스 데이터 보호 책임자에게 이메일을 보내야 하거나, EEA 거주자임을 증명해야 하는 경우도 있습니다. 따라서, 이 방법을 사용하고자 한다면 계정 정보 덮어쓰기를 해선 **안** 됩니다. EEA 거주자 신원이 필요할 수도 있기 때문입니다. 알아두실 점은, GDPR은 서비스 업체 위치에 무관하게 적용된다는 것입니다. GDPR은 유럽 사용자를 고객으로 삼는 서비스라면 모두 적용됩니다. 만약 서비스가 EEA 거주자의 삭제권을 존중하지 않는 경우, 여러분은 자기 나라의 [데이터 보호 기관](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en)에 연락하시면 됩니다(금전적 보상을 받을 수도 있습니다). ### 계정 정보 덮어쓰기 @@ -59,4 +59,4 @@ EEA 거주자는 GDPR [제17조](https://www.gdpr.org/regulation/article-17.html ## 계정 새로 생성하지 않기 -"예방이 치료보다 낫다"라는 말도 있습니다. 새 계정을 가입하고 싶은 마음이 생길 때마다 한 번씩 생각해보세요. '이 계정이 정말 필요한가?' '계정 없이도 내가 원하는 작업을 할 수 있나?' 계정 생성보다 삭제가 훨씬 더 어려운 경우가 많습니다. 게다가 계정을 삭제하거나 계정 정보를 변경한 이후에도 [인터넷 아카이브](https://archive.org/) 등 외부에 캐시된 버전이 존재할 수 있습니다. 미래에 후회하지 않기 위해서는 피할 수 있을 때 유혹을 피해야 합니다. +"예방이 치료보다 낫다"라는 말도 있습니다. 새 계정을 가입하고 싶은 마음이 생길 때마다 한 번씩 생각해보세요. '이 계정이 정말 필요한가?' '계정 없이도 내가 원하는 작업을 할 수 있나?' 계정 생성보다 삭제가 훨씬 더 어려운 경우가 많습니다. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). 미래에 후회하지 않기 위해서는 피할 수 있을 때 유혹을 피해야 합니다. diff --git a/i18n/ko/basics/common-misconceptions.md b/i18n/ko/basics/common-misconceptions.md index 2c3d839b..96f5e7c6 100644 --- a/i18n/ko/basics/common-misconceptions.md +++ b/i18n/ko/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/ko/basics/common-threats.md b/i18n/ko/basics/common-threats.md index e8d9a875..ab3665b2 100644 --- a/i18n/ko/basics/common-threats.md +++ b/i18n/ko/basics/common-threats.md @@ -55,7 +55,7 @@ description: 위협 모델은 개개인마다 다르지만, 이 사이트의 방 -**물리적 공격**이 우려된다면 Android, iOS, macOS, [Windows(TPM 사용)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process) 등 보안 부팅이 구현된 운영 체제를 사용해야 합니다. 또한 드라이브를 암호화하고, 운영 체제에서 TPM/Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1)/[Element](https://developers.google.com/android/security/android-ready-se)를 이용해 암호 입력 시도를 제한해야 합니다. 대부분의 데스크톱 운영체제는 사용자별 데이터를 암호화하지 않으므로, 신뢰하지 않는 사람과 컴퓨터를 공유하지 말아야 합니다. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). 또한 드라이브를 암호화하고, 운영 체제에서 TPM/Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1)/[Element](https://developers.google.com/android/security/android-ready-se)를 이용해 암호 입력 시도를 제한해야 합니다. 대부분의 데스크톱 운영체제는 사용자별 데이터를 암호화하지 않으므로, 신뢰하지 않는 사람과 컴퓨터를 공유하지 말아야 합니다. ## 서비스 제공 업체로부터의 프라이버시 @@ -89,16 +89,16 @@ E2EE를 적용하더라도 여전히 서비스 제공 업체는 (일반적으로

Atlas of Surveillance

-감시 방법과, 미국의 특정 도시에서 어떻게 감시 체계를 운용하는지 자세히 알고 싶다면 [Electronic Frontier Foundation](https://www.eff.org/)의 [Atlas of Surveillance](https://atlasofsurveillance.org/)를 살펴보세요. +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
정부는 테러 대응 및 범죄 예방에 필요한 수단으로 대중 감시 프로그램을 정당화하는 경우가 많습니다. 하지만 이는 분명한 인권 침해일 뿐만 아니라, 대중 감시는 소수 집단과 정치적 반체제 인사 등의 대상을 집중적으로 표적삼는 데에 가장 자주 사용됩니다.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

정보 당국은 에드워드 스노든의 정부 프로그램([PRISM](https://en.wikipedia.org/wiki/PRISM), [Upstream](https://en.wikipedia.org/wiki/Upstream_collection) 등) 폭로에 직면하여, NSA가 수년간 사실상 모든 미국인의 전화 통화 기록(누가 누구랑 통화하는지, 언제 통화하는지, 얼마나 오래 통화하는지)을 비밀리에 수집해 왔음을 인정했습니다. NSA가 이러한 정보를 매일 수집할 경우, 어떤 사람이 목사, 낙태 시술자, 중독 상담사, 자살 예방 상담사와 전화했는지 등 사람들의 삶과 관계성에 대해 극도로 민감한 정보를 파악할 수 있습니다. @@ -144,7 +144,7 @@ In France you can take a look at the [Technopolice website](https://technopolice '온라인 검열'은 전체주의 정부, 네트워크 관리자, 서비스 제공 업체 등 다양한 주체에 의해 (그 정도 또한 다양하게) 이루어질 수 있습니다. 의사소통을 통제하고 정보 접근을 제한하는 '검열'은 표현의 자유 인권과 절대 양립할 수 없습니다.[^5] -Twitter, Facebook 같은 플랫폼이 대중의 요구, 시장의 압력, 정부 기관의 압력에 굴복하면서, 기업 플랫폼에서의 검열은 점점 보편화되고 있습니다. 정부가 기업에 넣는 압력은 백악관이 YouTube에 자극적인 동영상의 [삭제를 요청한 것](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html)처럼 비밀스러운 요청일 수도 있고, 중국 정부가 기업에 검열 제도 준수를 요구하는 것 처럼 노골적인 요청일 수도 있습니다. +Twitter, Facebook 같은 플랫폼이 대중의 요구, 시장의 압력, 정부 기관의 압력에 굴복하면서, 기업 플랫폼에서의 검열은 점점 보편화되고 있습니다. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. 검열 위협이 우려될 경우, [Tor](../advanced/tor-overview.md) 등의 기술을 사용해 검열을 우회할 수 있으며, [Matrix](../real-time-communication.md#element) 처럼 중앙 집중식 계정 시스템이 없는(플랫폼이 독단적으로 누군가의 계정을 차단할 수 없는) 검열 방지 통신 플랫폼을 지원할 수 있습니다. @@ -162,5 +162,5 @@ Twitter, Facebook 같은 플랫폼이 대중의 요구, 시장의 압력, 정부 [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: 미국 프라이버시 및 시민 자유 감독 위원회: [*215조항에 따라 수행된 전화 통화 기록 프로그램에 대한 보고서*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. 다른 완화 기술도 추가로 사용해야 합니다. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. 다른 완화 기술도 추가로 사용해야 합니다. [^5]: UN: [*세계 인권 선언*](https://www.un.org/en/about-us/universal-declaration-of-human-rights) diff --git a/i18n/ko/basics/email-security.md b/i18n/ko/basics/email-security.md index 0ac11bdd..1171c3a7 100644 --- a/i18n/ko/basics/email-security.md +++ b/i18n/ko/basics/email-security.md @@ -13,7 +13,7 @@ description: 이메일은 태생적으로 여러 가지 면에서 안전하지 서로 다른 이메일 제공 업체 간의 이메일에 E2EE를 적용하는 표준 방법은 OpenPGP를 사용하는 것입니다. OpenPGP 표준에는 여러 구현체가 존재하며, [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard)와 [OpenPGP.js](https://openpgpjs.org)가 보편적입니다. -비즈니스에서 널리 사용되는 [S/MIME](https://en.wikipedia.org/wiki/S/MIME) 표준도 있으나, S/MIME는 [인증 기관](https://en.wikipedia.org/wiki/Certificate_authority)(모든 인증 기관이 S/MIME 인증서를 발급하지는 않습니다)에서 발급한 인증서가 필요합니다. S/MIME는 [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731), [웹용 Outlook 또는 Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480)에서 지원됩니다. +비즈니스에서 널리 사용되는 [S/MIME](https://en.wikipedia.org/wiki/S/MIME) 표준도 있으나, S/MIME는 [인증 기관](https://en.wikipedia.org/wiki/Certificate_authority)(모든 인증 기관이 S/MIME 인증서를 발급하지는 않습니다)에서 발급한 인증서가 필요합니다. It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). OpenPGP를 사용하더라도 [순방향 비밀성(Forward secrecy)](https://en.wikipedia.org/wiki/Forward_secrecy)을 지원하지 않으므로, 본인 혹은 수신자의 개인 키가 도난당할 경우 해당 키로 암호화된 이전 메시지가 전부 노출됩니다. 따라서, 개인 간 의사소통에는 이메일보다는 순방향 비밀성이 구현된 [메신저](../real-time-communication.md)를 이용하실 것을 권장드립니다. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ IMAP, SMTP 등 표준 접속 프로토콜을 사용할 수 있는 이메일 제 ### 개인 키를 어떻게 보호해야 하나요? -스마트카드([YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP), [Nitrokey](https://www.nitrokey.com) 등)는 기기(스마트폰, 태블릿, PC 등)에서 실행하는 이메일/웹메일 클라이언트가 암호화된 메일을 수신했을 때 작동합니다. 암호화된 메일 내용은 스마트카드에서 복호화되며, 복호화된 내용이 스마트카드로부터 기기로 전달됩니다. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. 암호화된 메일 내용은 스마트카드에서 복호화되며, 복호화된 내용이 스마트카드로부터 기기로 전달됩니다. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/ko/basics/multi-factor-authentication.md b/i18n/ko/basics/multi-factor-authentication.md index 9edaa2b5..0ee1adde 100644 --- a/i18n/ko/basics/multi-factor-authentication.md +++ b/i18n/ko/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP(시간 기반 일회용 비밀번호, Time-based One-time Password)는 널 시간 제한 코드는 공유 비밀과 현재 시간 정보를 기반으로 만들어집니다. 코드는 짧은 시간 동안만 유효하므로 공격자는 공유 비밀에 접근하지 않고서는 새로운 코드를 생성할 수 없습니다. -TOTP를 지원하는 하드웨어 보안 키를 가지고 계실 경우, '공유 비밀'을 해당 하드웨어 보안 키에 저장하실 것을 권장드립니다. YubiKey 등의 하드웨어 보안 키는 '공유 비밀'을 추출하거나 복사하는 것을 어렵게 만들기 위해서 개발되었습니다. 또한, TOTP 앱이 설치된 휴대폰과 달리 YubiKey는 인터넷에 연결되어 있지 않기 때문에 더 안전합니다. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. YubiKey 등의 하드웨어 보안 키는 '공유 비밀'을 추출하거나 복사하는 것을 어렵게 만들기 위해서 개발되었습니다. 또한, TOTP 앱이 설치된 휴대폰과 달리 YubiKey는 인터넷에 연결되어 있지 않기 때문에 더 안전합니다. [WebAuthn](#fido-fast-identity-online)과 달리, TOTP는 [피싱](https://ko.wikipedia.org/wiki/%ED%94%BC%EC%8B%B1) 혹은 재사용 공격으로부터 보호하는 기능을 제공하지 않습니다. 만약 공격자가 여러분의 유효 코드를 탈취해낸다면, 공격자는 해당 코드가 만료될 때까지(보통 60초) 몇 번이고 사용할 수 있습니다. @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### 하드웨어 보안 키 -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### TOTP(시간 기반 일회용 비밀번호) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/ko/basics/passwords-overview.md b/i18n/ko/basics/passwords-overview.md index 93748c50..24c3d622 100644 --- a/i18n/ko/basics/passwords-overview.md +++ b/i18n/ko/basics/passwords-overview.md @@ -54,13 +54,13 @@ description: These are some tips and tricks on how to create the strongest passw

Note

-본 내용에서는 [EEF 대규모 단어 목록](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt)를 활용해 단어당 5번씩 주사위를 굴려 패스프레이즈를 생성한다고 가정합니다. 다른 단어 목록을 사용할 경우에는 주사위를 굴려야 하는 횟수 혹은 동일한 엔트로피를 달성하기 위해 필요한 단어의 양이 달라질 수 있습니다. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. 다른 단어 목록을 사용할 경우에는 주사위를 굴려야 하는 횟수 혹은 동일한 엔트로피를 달성하기 위해 필요한 단어의 양이 달라질 수 있습니다.
1. 6면체 주사위를 5번 굴려서 각 주사위를 굴릴 때마다 숫자를 적습니다. -2. 예를 들어, `2-5-2-6-6`가 나왔다고 가정해 보겠습니다. [EEF 대규모 단어 목록](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt)에서 `25266`에 해당하는 단어를 찾아봅시다. +2. 예를 들어, `2-5-2-6-6`가 나왔다고 가정해 보겠습니다. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. `encrypt` 단어를 찾았습니다. 이 단어를 받아 적습니다. @@ -75,20 +75,20 @@ description: These are some tips and tricks on how to create the strongest passw 실물 주사위가 없거나 사용하고 싶지 않은 경우, 비밀번호 관리자에 내장된 비밀번호 생성기를 사용하면 됩니다. 대부분의 비밀번호 관리자는 일반적인 패스워드 방식뿐만 아니라 다이스웨어 패스프레이즈도 지원합니다. -저희는 원본 목록과 동일한 수준의 보안을 제공하면서 외우기 쉬운 단어로 이루어진 [EEF 대규모 단어 목록](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt)을 활용해 다이스웨어 패스프레이즈를 생성할 것을 권장드립니다. 영어 외 언어로 패스프레이즈를 생성하고자 하시는 경우 [다른 언어 단어 목록](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline)도 있습니다. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. 영어 외 언어로 패스프레이즈를 생성하고자 하시는 경우 [다른 언어 단어 목록](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline)도 있습니다.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. 다이스웨어 패스프레이즈 강도를 결정하는 지표 한 가지는 엔트로피의 크기입니다. 다이스웨어 패스프레이즈의 단어당 엔트로피는 $\text{log}_2(\text{WordsInList})$, 전체 패스프레이즈 엔트로피는 $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$로 계산됩니다. 따라서, 앞서 언급한 목록 내 각 단어는 ~12.9비트 엔트로피($\text{log}_2(7776)$)를, 7 단어 패스프레이즈는 ~90.47비트 엔트로피($\text{log}_2(7776^7)$)를 갖습니다. -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. 만들어질 수 있는 패스프레이즈의 양을 계산하면 $\text{WordsInList}^\text{WordsInPhrase}$, 즉 $7776^7$입니다. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. 만들어질 수 있는 패스프레이즈의 양을 계산하면 $\text{WordsInList}^\text{WordsInPhrase}$, 즉 $7776^7$입니다. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. 평균적으로, 누군가의 패스프레이즈를 알아맞히려면 가능한 모든 조합의 50%를 시도해야만 합니다. 이 점을 고려하여 계산해보면 공격자가 만약 초당 1,000,000,000,000번 시도한다고 가정해도 여러분의 패스프레이즈를 알아맞히는 데에는 27,255,689년이 걸립니다. 심지어 이는 다음 조건을 충족하는 경우의 이야기입니다: diff --git a/i18n/ko/basics/vpn-overview.md b/i18n/ko/basics/vpn-overview.md index 7a8cd256..7df31776 100644 --- a/i18n/ko/basics/vpn-overview.md +++ b/i18n/ko/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## VPN 관련 추가 정보 -- [(영문) VPN 및 프라이버시 리뷰 사이트의 문제점](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [(영문) 무료 VPN 앱 조사 내용](https://www.top10vpn.com/free-vpn-app-investigation/) -- [(영문) 드러나지 않았던 VPN 운영의 실체: 단 23개의 회사가 101개 VPN 제품을 운영하고 있습니다](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [(영문) 인기 앱 24개에 파고들어 위험한 권한을 요구하고 있는 어떤 중국 회사](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- (영문) Dennis Schubert - [VPN - 매우 위험한 홍보 문구(Very Precarious Narrative)](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) +- [(영문) VPN 및 프라이버시 리뷰 사이트의 문제점](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [(영문) 무료 VPN 앱 조사 내용](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [(영문) 드러나지 않았던 VPN 운영의 실체: 단 23개의 회사가 101개 VPN 제품을 운영하고 있습니다](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [(영문) 인기 앱 24개에 파고들어 위험한 권한을 요구하고 있는 어떤 중국 회사](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/ko/basics/why-privacy-matters.md b/i18n/ko/basics/why-privacy-matters.md index 992acab1..a1877f22 100644 --- a/i18n/ko/basics/why-privacy-matters.md +++ b/i18n/ko/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ All of these concepts overlap, but it is possible to have any combination of the ## 출처 -- Neil Richards - [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/ko/calendar.md b/i18n/ko/calendar.md index 7f8ae830..d38b5952 100644 --- a/i18n/ko/calendar.md +++ b/i18n/ko/calendar.md @@ -13,7 +13,7 @@ cover: calendar.webp ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). 여러 캘린더 및 확장된 공유 기능은 유료 구독자 전용입니다. @@ -21,18 +21,18 @@ cover: calendar.webp [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ cover: calendar.webp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/ko/cloud.md b/i18n/ko/cloud.md index c49cbd2a..0b27b7f4 100644 --- a/i18n/ko/cloud.md +++ b/i18n/ko/cloud.md @@ -56,15 +56,15 @@ Proton Drive의 새로운 모바일 클라이언트는 아직 제3자에 의해 **Tresorit**은 2011년에 설립된 스위스-헝가리의 암호화 클라우드 스토리지 제공 업체입니다. Tresorit은 스위스 국영 우편 서비스인 스위스 포스트(스위스 우체국)가 소유하고 있습니다. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive의 새로운 모바일 클라이언트는 아직 제3자에 의해 Tresorit은 독립적인 보안 감사를 여러 차례 받았습니다. -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): TÜV Rheinland InterCert Kft ISO/IEC 27001:2013[^1] 준수 [인증](https://www.certipedia.com/quality_marks/9108644476) -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Computest 모의 침투 테스트 +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - 해당 검토에서는 Tresorit 웹 클라이언트, Android/Windows 앱 및 관련 인프라 보안을 평가했습니다. - Computest는 취약점을 2개 발견했으며, 이 취약점은 해결되었습니다. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Ernst & Young 모의 침투 테스트 +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - 해당 검토에서는 Tresorit의 전체 소스 코드를 분석하여, Tresorit [백서](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf)에서 설명한 개념과 구현이 일치하는지 검증했습니다. - Ernst & Young은 추가로 웹, 모바일, 데스크톱 클라이언트를 검사했습니다. "검사 결과, Tresorit이 주장하는 데이터 기밀성과 차이가 없는 것으로 나타났습니다." -추가적으로, [스위스 디지털 이니셔티브(Swiss Digital Initiative)](https://www.swiss-digital-initiative.org/digital-trust-label/)의 보안, 프라이버시, 신뢰성 관련 [35개 평가 기준](https://digitaltrust-label.swiss/criteria/)을 통과해야 하는 Digital Trust Label 인증을 받았습니다. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## 평가 기준 diff --git a/i18n/ko/cryptocurrency.md b/i18n/ko/cryptocurrency.md index 42918a99..2f9e69b8 100644 --- a/i18n/ko/cryptocurrency.md +++ b/i18n/ko/cryptocurrency.md @@ -24,10 +24,10 @@ cover: cryptocurrency.webp **Monero**는 거래를 난독화하여 익명성을 확보하는 프라이버시 강화 기술이 적용된 블록체인을 사용합니다. 모든 Monero 거래는 거래 금액, 송수신 주소, 자금 출처가 숨겨지므로 암호화폐 초심자에게 이상적인 선택입니다. -[:octicons-home-16: 홈페이지](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=문서} -[:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=기여 } +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ Monero를 사용할 경우, Monero를 거래하는 주소, 거래 금액, 주소 최적의 프라이버시를 챙기고자 할 경우, View Key를 기기에서 관리하는 방식인 비수탁형 지갑(Non-Custodial Wallet)을 사용해야 합니다. 비수탁형 지갑은 사용자 본인 외에는 자금 지출은 물론이고, 들어오고 나가는 트랜잭션을 볼 수 없습니다. 만약 수탁형 지갑(Custodial Wallet)을 사용할 경우, 여러분이 하는 **모든 행동**을 제공 업체가 볼 수 있습니다. 경량 지갑(Lightweight Wallet)을 사용할 경우에는 제공 업체가 여러분의 View 개인 키를 보관하며, 여러분이 하는 행동을 거의 전부 볼 수 있습니다. 비수탁형 지갑으로는 이러한 것들이 있습니다: - [공식 Monero 클라이언트](https://getmonero.org/downloads) (데스크톱) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet은 여러 암호화폐를 지원합니다. Monero 전용 버전 Cake Wallet은 [Monero.com](https://monero.com/)에서 찾을 수 있습니다. -- [Feather Wallet](https://featherwallet.org/) (데스크톱) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet은 여러 암호화폐를 지원합니다. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) (비수탁형 지갑을 사용하더라도) 프라이버시를 극대화하려면 자체 Monero 노드를 운용해야 합니다. 다른 사람의 노드를 사용할 경우 해당 노드에 연결할 때 사용한 IP 주소, 지갑을 동기화한 시각, 지갑에서 전송된 트랜잭션(해당 트랜잭션에 대한 자세한 정보는 알 수 없음) 등 일부 정보가 해당 노드에 노출됩니다. 다른 사람의 Monero 노드에 연결할 때에 Tor 혹은 i2p를 사용하는 것이 대안이 될 수 있습니다. -2021년 8월, CipherTrace는 정부 기관을 위해 향상된 Monero 추적 기능을 [발표했습니다](https://ciphertrace.com/enhanced-monero-tracing/). 공개 포스트에 따르면, 미국 재무부의 금융 범죄 단속 네트워크(Financial Crimes Enforcement Network)는 2022년 말 CipherTrace의 'Monero 모듈'에 라이선스 자격을 [부여했습니다](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view). +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. 공개 포스트에 따르면, 미국 재무부의 금융 범죄 단속 네트워크(Financial Crimes Enforcement Network)는 2022년 말 CipherTrace의 'Monero 모듈'에 라이선스 자격을 [부여했습니다](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view). -Monero 트랜잭션 그래프는 프라이버시 면에서 제한적입니다. 상대적으로 작은 링 서명(Ring Signature)으로 인해, 표적 공격에 취약합니다. 이 외에도 Monero의 프라이버시 기능은 일부 보안 연구자들에 의해 [의문이 제기된 바 있으며](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/), 과거에는 여러 심각한 취약점이 발견되어 패치되기도 했습니다. 따라서 CipherTrace 같은 단체의 주장은 충분히 일리가 있습니다. 비트코인이나 다른 암호화폐처럼 대규모 감시 도구가 Monero에도 존재할 가능성은 낮지만, 추적 툴이 표적 수사에 효과가 있을 것은 확실합니다. +Monero 트랜잭션 그래프는 프라이버시 면에서 제한적입니다. 상대적으로 작은 링 서명(Ring Signature)으로 인해, 표적 공격에 취약합니다. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. 비트코인이나 다른 암호화폐처럼 대규모 감시 도구가 Monero에도 존재할 가능성은 낮지만, 추적 툴이 표적 수사에 효과가 있을 것은 확실합니다. 종합적으로, Monero는 가장 뛰어난 프라이버시 친화 암호화폐라고 충분히 말할 수 있지만, 프라이버시 주장은 (좋은 쪽으로든 나쁜 쪽으로든) 확실하게 입증된 바 **없습니다**. Monero가 항상 적절한 프라이버시를 보장할 수 있을 만큼 공격에 대한 복원력이 충분한지를 평가하기 위해서는 더 많은 시간과 연구가 필요합니다. diff --git a/i18n/ko/data-redaction.md b/i18n/ko/data-redaction.md index c28376b7..553e14e7 100644 --- a/i18n/ko/data-redaction.md +++ b/i18n/ko/data-redaction.md @@ -88,12 +88,12 @@ ExifEraser로 이미지 메타데이터를 제거하는 방법은 다양합니 **Metapho**는 날짜, 파일명, 파일 크기, 카메라 모델, 셔터 속도, 위치 등 사진 메타데이터를 간단하고 깔끔하게 볼 수 있는 애플리케이션입니다. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ ExifEraser로 이미지 메타데이터를 제거하는 방법은 다양합니 **PrivacyBlur**는 사진을 온라인에 공유하기 전에 민감한 부분을 흐릿하게 만들 수 있는 무료 앱입니다. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ ExifEraser로 이미지 메타데이터를 제거하는 방법은 다양합니 Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/ko/desktop-browsers.md b/i18n/ko/desktop-browsers.md index 54b147d9..2d8b2ab8 100644 --- a/i18n/ko/desktop-browsers.md +++ b/i18n/ko/desktop-browsers.md @@ -70,8 +70,8 @@ schema: **Mullvad Browser**는 [Tor 브라우저](tor.md#tor-browser)에서 Tor 네트워크 통합을 제거한 버전입니다. Tor 브라우저의 핑거프린팅 방지 브라우저 기술을 VPN 사용자에게 제공하는 것을 주된 목적으로 합니다. Tor 프로젝트에서 개발하고 [Mullvad](vpn.md#mullvad)에서 배포합니다. Mullvad VPN 사용이 필수적이지 **않습니다**. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ schema: -[Tor 브라우저](tor.md)와 마찬가지로, Mullvad Browser는 브라우저 핑거프린트를 모든 Mullvad Browser 사용자끼리 동일하게 만들어 핑거프린팅을 방지하도록 설계되었습니다. 기본 보안 등급(*Standard*, *Safer*, *Safest*)에 따라 자동으로 설정되는 기본 설정 및 확장 프로그램을 포함하고 있습니다. 여러분은 브라우저의 기본 [보안 등급](https://tb-manual.torproject.org/security-settings/) 외에 추가적인 수정을 해서는 안 됩니다. 추가적인 수정을 할 경우 고유한 핑거프린트를 갖게 됩니다. 즉 이 브라우저를 쓰는 의미가 사라집니다. 만약 핑거프린팅을 신경 쓰지 않고 자유로운 브라우저 설정을 원하실 경우, [Firefox](#firefox)를 추천드립니다. +[Tor 브라우저](tor.md)와 마찬가지로, Mullvad Browser는 브라우저 핑거프린트를 모든 Mullvad Browser 사용자끼리 동일하게 만들어 핑거프린팅을 방지하도록 설계되었습니다. 기본 보안 등급(*Standard*, *Safer*, *Safest*)에 따라 자동으로 설정되는 기본 설정 및 확장 프로그램을 포함하고 있습니다. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). 추가적인 수정을 할 경우 고유한 핑거프린트를 갖게 됩니다. 즉 이 브라우저를 쓰는 의미가 사라집니다. 만약 핑거프린팅을 신경 쓰지 않고 자유로운 브라우저 설정을 원하실 경우, [Firefox](#firefox)를 추천드립니다. ### 핑거프린팅 방지 @@ -116,17 +116,17 @@ Mullvad 브라우저는 DuckDuckGo가 기본 [검색 엔진](search-engines.md) **Firefox**는 [다양한 추적](https://support.mozilla.org/ko/kb/enhanced-tracking-protection-firefox-desktop#w_hyangsangdoen-cujeog-bangji-gineungi-cadanhaneun-geos)을 방지하는 [향상된 추적 방지 기능](https://support.mozilla.org/ko/kb/enhanced-tracking-protection-firefox-desktop) 등 강력한 프라이버시 설정을 제공합니다. [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad 브라우저는 DuckDuckGo가 기본 [검색 엔진](search-engines.md)

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug ##### Firefox Suggest (미국 한정) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) 기능은 검색 제안과 유사한 기능이며, 현재 미국에서만 사용 가능합니다. 검색 제안 사용을 비활성화한 것과 마찬가지 이유로 해당 기능을 비활성화할 것을 권장드립니다. **주소 표시줄** 헤더에 이러한 옵션이 표시되지 않는 경우 이는 무시하셔도 좋습니다. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. 검색 제안 사용을 비활성화한 것과 마찬가지 이유로 해당 기능을 비활성화할 것을 권장드립니다. **주소 표시줄** 헤더에 이러한 옵션이 표시되지 않는 경우 이는 무시하셔도 좋습니다. - [ ] **웹에서 제안** 비활성화 - [ ] **스폰서에서 제안** 비활성화 @@ -183,7 +183,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug > Firefox는 사용자의 Firefox 버전 및 언어, 기기 운영 체제 및 하드웨어 구성, 메모리, 충돌 및 오류에 대한 기본 정보, 업테이트 및 세이프 브라우징 같은 자동화 프로세스의 결과, 활성화 여부 등의 데이터를 당사(Mozilla)로 전송합니다. Firefox가 당사에 데이터를 전송할 때 사용자의 IP 주소는 당사 서버 로그의 일부로 일시적으로 수집됩니다. -또한 Firefox 계정 서비스는 [일부 기술 데이터](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts)를 수집합니다. Firefox 계정을 이용하는 경우 이를 거부할 수 있습니다. +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). Firefox 계정을 이용하는 경우 이를 거부할 수 있습니다. 1. [accounts.firefox.com 프로필 설정](https://accounts.firefox.com/settings#data-collection) 열기 2. **데이터 수집 및 사용** > **Firefox 계정 개선에 참여** 비활성화 @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/)를 이용하면 자신의 모든 기기에서 브라우저 데이터(탐색 기록, 북마크 등)를 동기화할 수 있으며, E2EE로 보호됩니다. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (고급) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -[Arkenfox 프로젝트](https://github.com/arkenfox/user.js)는 신중하게 고려된 Firefox용 옵션 모음을 제공합니다. Arkenfox를 [사용하기로 결정한](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) 경우, [일부 옵션](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common])은 주관적으로 판단했을 때 지나치게 엄격하거나 웹사이트가 올바르게 작동하지 않을 수 있습니다. 옵션은 필요한 경우 [손쉽게 변경 가능합니다](https://github.com/arkenfox/user.js/wiki/3.1-Overrides). 저희는 전체 [위키](https://github.com/arkenfox/user.js/wiki) 내용을 읽어보실 것을 **강력히 권장드립니다**. Arkenfox에는 [컨테이너](https://support.mozilla.org/ko/kb/containers) 지원 활성화 또한 포함되어 있습니다. +[Arkenfox 프로젝트](https://github.com/arkenfox/user.js)는 신중하게 고려된 Firefox용 옵션 모음을 제공합니다. Arkenfox를 [사용하기로 결정한](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) 경우, [일부 옵션](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common])은 주관적으로 판단했을 때 지나치게 엄격하거나 웹사이트가 올바르게 작동하지 않을 수 있습니다. 옵션은 필요한 경우 [손쉽게 변경 가능합니다](https://github.com/arkenfox/user.js/wiki/3.1-Overrides). 저희는 전체 [위키](https://github.com/arkenfox/user.js/wiki) 내용을 읽어보실 것을 **강력히 권장드립니다**. Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox는 캔버스 무작위화(Randomization)와 Firefox에 기본 탑재된 핑거프린트 방지 구성 설정을 통해 기본적이거나 순진한(Naive) 추적 스크립트를 차단하는 것만 목표로 합니다. Mullvad 브라우저나 Tor 브라우저에서 사용하는 방식이자, 고급 핑거프린트 추적 스크립트를 막을 수 있는 유일한 방법인 '다른 사용자들 사이에 섞여들게 하는 것'은 Arkenfox의 목표가 아닙니다. 물론, 여러분은 여러 브라우저를 사용할 수 있습니다. 로그인이 유지되어야 하는 사이트나 믿을 만한 사이트는 Firefox+Arkenfox를 사용하고, 그 외 일반적인 브라우저 탐색에는 Mullvad 브라우저를 사용하는 방법도 있습니다. @@ -223,25 +223,25 @@ Arkenfox는 캔버스 무작위화(Randomization)와 Firefox에 기본 탑재된
-![Brave 로고](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave 브라우저**에는 콘텐츠 차단기와 [프라이버시 기능](https://brave.com/privacy-features/)이 내장되어 있으며, 이 중 상당수가 기본적으로 활성화되어 있습니다. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brace는 Chromium 웹 브라우저 프로젝트 기반으로 구축되었으므로, 친숙하며 웹사이트 호환성 문제가 적습니다. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ Brave adds a "[referral code](https://github.com/brave/brave-browser/wiki/Brave% ##### 보호 -Brave 브라우저의 [보호](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) 기능에는 핑거프린팅 방지 조치가 포함되어 있습니다. 방문하는 모든 페이지에 [전역적으로](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) 옵션을 설정하는 것이 좋습니다. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. 필요에 따라 사이트별로 보호 옵션을 낮출 수 있으나, 기본적으로 다음과 같이 설정할 것을 권장드립니다: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave
-1. 해당 옵션은 uBlock Origin의 고급 [차단 모드](https://github.com/gorhill/uBlock/wiki/Blocking-mode)나 [NoScript](https://noscript.net/) 확장 프로그램과 유사한 기능을 제공합니다. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### 개인 정보 보호 및 보안
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave 브라우저의 핑거프린팅 방지 기능은 Tor 브라우저만큼 강력하지 **않습니다**. 또한 Brave에서 Tor를 사용하는 사람은 훨씬 적기 때문에, 더욱 눈에 띄게 됩니다. [강력한 익명성이 필요한 경우라면](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) [Tor 브라우저](tor.md#tor-browser)를 사용해야 합니다. +1. Brave 브라우저의 핑거프린팅 방지 기능은 Tor 브라우저만큼 강력하지 **않습니다**. 또한 Brave에서 Tor를 사용하는 사람은 훨씬 적기 때문에, 더욱 눈에 띄게 됩니다. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave의 Web3 기능은 잠재적으로 브라우저의 핑거프린트와 공 #### 동기화 -[Brave 동기화](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync)를 이용하면 계정을 생성하지 않고도 자신의 모든 기기에서 브라우저 데이터(탐색 기록, 북마크 등)를 동기화할 수 있으며, E2EE로 보호됩니다. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards 및 Brave 월렛 @@ -371,7 +371,7 @@ Brave의 Web3 기능은 잠재적으로 브라우저의 핑거프린트와 공
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ Privacy Guides 팀은 사이트의 모든 항목마다 명확한 평가 기준 - Linux, macOS, Windows에서 사용할 수 있어야 합니다. - 브라우저의 프라이버시를 강화하는 데에 필요한 모든 변경 사항은 사용자 경험에 부정적인 영향을 미치지 않아야 합니다. - 타사 쿠키를 기본적으로 차단해야 합니다. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### 우대 사항 평가 기준에서 '우대 사항'은 해당 부문에서 완벽한 프로젝트에 기대하는 바를 나타냅니다. 다음의 우대 사항에 해당하지 않더라도 권장 목록에 포함될 수 있습니다. 단, 우대 사항에 해당할수록 이 페이지의 다른 항목보다 높은 순위를 갖습니다. - 콘텐츠 차단 기능을 내장해야 합니다. -- 쿠키 구획화를 지원해야 합니다. (예시: [멀티 컨테이너](https://support.mozilla.org/ko/kb/containers)) +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. 브라우저의 정기적인 보안 업데이트 혜택을 받을 수 있으므로 Electron 기반 앱보다 유리한 점이 있습니다. - 사용자 프라이버시에 이점을 주지 않는 애드온 기능(블로트웨어)을 포함하지 않아야 합니다. - 원격 분석 데이터를 기본적으로 수집하지 않아야 합니다. @@ -462,4 +462,4 @@ Privacy Guides 팀은 사이트의 모든 항목마다 명확한 평가 기준 - 사용자 프라이버시에 직접적인 이점을 제공해야 합니다. 단순 정보 제공은 기준 미달입니다. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/ko/desktop.md b/i18n/ko/desktop.md index b4fece75..4eadaddd 100644 --- a/i18n/ko/desktop.md +++ b/i18n/ko/desktop.md @@ -17,17 +17,17 @@ cover: desktop.webp ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora는 보통 다른 배포판보다 먼저 최신 기술([Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org) 등)을 채택합니다. 최신 기술은 대개 보안, 프라이버시, 사용성을 개선하는 효과를 가져옵니다. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). 최신 기술은 대개 보안, 프라이버시, 사용성을 개선하는 효과를 가져옵니다. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora는 반-롤링 릴리스 방식입니다. [GNOME](https://www.gnome.org) 등 일부 패키지는 다음 Fedora 릴리스 전까지 고정되지만, 커널을 포함한 대부분의 패키지는 릴리스 수명 기간 동안 자주 업데이트됩니다. 각각의 Fedora 릴리스는 1년간 지원되며, 6개월마다 새 버전이 출시됩니다. +Fedora는 반-롤링 릴리스 방식입니다. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. 각각의 Fedora 릴리스는 1년간 지원되며, 6개월마다 새 버전이 출시됩니다. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora는 반-롤링 릴리스 방식입니다. [GNOME](https://www.gnome.org) **openSUSE Tumbleweed**는 안정적인 롤링 릴리스 배포판입니다. -openSUSE Tumbleweed에는 [Btrfs](https://en.wikipedia.org/wiki/Btrfs), [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial)를 사용한 [트랜잭션 업데이트](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) 시스템이 존재하기 때문에 문제가 발생할 경우 스냅샷 롤백이 가능합니다. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: 홈페이지](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=문서} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=기여 } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed는 각 업데이트가 배포판 스냅샷으로 릴리스되는 롤 **Arch Linux**는 여러분이 원하는 것만 설치해서 사용할 수 있는, 간결함과 DIY(Do It Yourself) 특성을 지닌 배포판입니다. 자세한 내용은 Arch Linux [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions)를 참고해 주세요. -[:octicons-home-16: 홈페이지](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=문서} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=기부 } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ DIY 배포판이므로 여러분은 자신의 시스템을 여러분 자신이 [ **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,9 +108,9 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS는 재현성과 안전성에 중점을 둔 Nix 패키지 관리자를 기반으로 하는 독립 배포판입니다. -[:octicons-home-16: 홈페이지](https://nixos.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=문서} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=기부 } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: 홈페이지](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion 서비스" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=문서} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=기부 } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: 홈페이지](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=문서} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=기부 } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## 보안성 중점 배포판 @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/ko/device-integrity.md b/i18n/ko/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/ko/device-integrity.md +++ b/i18n/ko/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/ko/dns.md b/i18n/ko/dns.md index bee56b00..1827bdd9 100644 --- a/i18n/ko/dns.md +++ b/i18n/ko/dns.md @@ -11,14 +11,14 @@ cover: dns.webp ## 권장 제공 업체 -| DNS 제공 업체 | 프라이버시 정책 | 프로토콜 | 로그 보관 | ECS | 필터링 | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------- | ----- | ----------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | 일부[^1] | Yes | 개인 설정에 따라 달라집니다. 필터 목록은 여기에서 확인할 수 있습니다. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | 평문
DoH/3
DoT | 일부[^2] | 비활성화 | 개인 설정에 따라 달라집니다. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | 평문
DoH/3
DoT
DoQ | 선택적[^3] | 비활성화 | 개인 설정에 따라 달라집니다. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | 없음[^4] | 비활성화 | 개인 설정에 따라 달라집니다. 필터 목록은 여기에서 확인할 수 있습니다. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | 평문
DoH/3
DoT
DoQ | 선택적[^5] | 선택 사항 | 개인 설정에 따라 달라집니다. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | 평문
DoH
DoT
DNSCrypt | 일부[^6] | 선택 사항 | 개인 설정에 따라 달라지지만, 멀웨어는 기본적으로 차단됩니다. | +| DNS 제공 업체 | 프라이버시 정책 | 프로토콜 | 로그 보관 | ECS | 필터링 | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------- | ----- | ----------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | 일부[^1] | Yes | 개인 설정에 따라 달라집니다. 필터 목록은 여기에서 확인할 수 있습니다. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | 평문
DoH/3
DoT | 일부[^2] | 비활성화 | 개인 설정에 따라 달라집니다. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | 평문
DoH/3
DoT
DoQ | 선택적[^3] | 비활성화 | 개인 설정에 따라 달라집니다. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | 없음[^4] | 비활성화 | 개인 설정에 따라 달라집니다. 필터 목록은 여기에서 확인할 수 있습니다. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | 평문
DoH/3
DoT
DoQ | 선택적[^5] | 선택 사항 | 개인 설정에 따라 달라집니다. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | 평문
DoH
DoT
DNSCrypt | 일부[^6] | 선택 사항 | 개인 설정에 따라 달라지지만, 멀웨어는 기본적으로 차단됩니다. | ### 평가 기준 @@ -50,7 +50,7 @@ iOS, iPadOS, tvOS, macOS 최신 버전은 DoT, DoH를 모두 지원합니다. #### 서명된 프로필 -Apple은 암호화 DNS 프로필 생성을 위한 기본 인터페이스를 제공하지 않습니다. [보안 DNS 프로필 생성기(Secure DNS profile creator)](https://dns.notjakob.com/tool.html)는 자신만의 암호화 DNS 프로필을 생성할 수 있는 비공식 툴이지만, 프로필 서명은 불가능합니다. 프로필 서명은 프로필 출처 확인 및 무결성 보장에 도움이 되므로, 서명된 프로필이 선호됩니다. 서명된 구성 프로필에는 '확인 완료' 표시가 나타납니다. 코드 서명에 대한 자세한 내용은 [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html)을 참고하세요. **서명된 프로필**은 [AdGuard](https://adguard.com/ko/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/)에서 제공합니다. +Apple은 암호화 DNS 프로필 생성을 위한 기본 인터페이스를 제공하지 않습니다. [보안 DNS 프로필 생성기(Secure DNS profile creator)](https://dns.notjakob.com/tool.html)는 자신만의 암호화 DNS 프로필을 생성할 수 있는 비공식 툴이지만, 프로필 서명은 불가능합니다. 프로필 서명은 프로필 출처 확인 및 무결성 보장에 도움이 되므로, 서명된 프로필이 선호됩니다. 서명된 구성 프로필에는 '확인 완료' 표시가 나타납니다. 코드 서명에 대한 자세한 내용은 [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html)을 참고하세요. **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Apple은 암호화 DNS 프로필 생성을 위한 기본 인터페이스를 제 [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -123,9 +123,9 @@ Apple은 암호화 DNS 프로필 생성을 위한 기본 인터페이스를 제
-![AdGuard Home 로고](assets/img/dns/adguard-home.svg){ align=right } +![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home**은 [DNS 필터링](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/)을 사용하여 광고 등의 원치 않는 웹 콘텐츠를 차단하는 오픈 소스[DNS 싱크홀](https://wikipedia.org/wiki/DNS_sinkhole)입니다. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. 세련된 웹 인터페이스를 통해 쉽고 빠른 분석 및 차단 콘텐츠 관리가 가능합니다. @@ -142,25 +142,25 @@ Apple은 암호화 DNS 프로필 생성을 위한 기본 인터페이스를 제
-![Pi-hole 로고](assets/img/dns/pi-hole.svg){ align=right } +![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole**은 [DNS 필터링](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/)을 사용하여 광고 등의 원치 않는 웹 콘텐츠를 차단하는 오픈 소스 [DNS 싱크홀](https://wikipedia.org/wiki/DNS_sinkhole)입니다. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole은 라즈베리 파이에서 호스팅되도록 설계되었지만, 그 외 하드웨어에서도 사용할 수 있습니다. 친절한 웹 인터페이스를 통해 쉽고 빠른 분석 및 차단 콘텐츠 관리가 가능합니다. -[:octicons-home-16: 홈페이지](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="프라이버시 정책" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=문서} -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=기부 } +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
[^1]: AdGuard는 특정 서버의 완료된 요청 수, 차단된 요청 수, 요청 처리 속도 등 DNS 서버의 집계 성능 지표를 저장합니다. 또한, 지난 24시간 이내의 도메인 요청 데이터베이스를 보관 및 저장합니다. "해당 정보는 새로운 추적기 및 위협을 식별하고 차단하기 위해 필요합니다." "각 추적기가 차단된 횟수 또한 기록합니다. 이는 오래되어 불필요한 규칙을 필터에서 제거하기 위해 필요합니다." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare는 1.1.1.1 리졸버로 전송되는 DNS 쿼리의 제한된 데이터만 수집 및 저장합니다. 1.1.1.1 리졸버는 개인 데이터를 기록하지 않으며, 개인 식별이 불가능하도록 제한된 쿼리 데이터는 대부분 25시간 동안만 저장됩니다. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare는 1.1.1.1 리졸버로 전송되는 DNS 쿼리의 제한된 데이터만 수집 및 저장합니다. 1.1.1.1 리졸버는 개인 데이터를 기록하지 않으며, 개인 식별이 불가능하도록 제한된 쿼리 데이터는 대부분 25시간 동안만 저장됩니다. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D는 사용자 정의 프로필이 있는 프리미엄 리졸버에 대해서만 로그를 기록합니다. 무료 리졸버는 데이터를 기록하지 않습니다. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad DNS 서비스는 Mullvad VPN 가입자/비가입자 모두 이용 가능합니다. 프라이버시 정책 상, 어떤 방식으로든 DNS 요청을 기록하지 않는다고 명시되어 있습니다. [https://mullvad.net/ko/help/no-logging-data-policy/](https://mullvad.net/ko/help/no-logging-data-policy/) +[^4]: Mullvad DNS 서비스는 Mullvad VPN 가입자/비가입자 모두 이용 가능합니다. 프라이버시 정책 상, 어떤 방식으로든 DNS 요청을 기록하지 않는다고 명시되어 있습니다. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. 보관하기로 선택한 모든 로그는 각각 보존 기간과 로그 저장 위치를 선택 가능합니다. 따로 요청하지 않을 경우, 어떤 데이터도 기록되지 않습니다. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9은 위협 모니터링 및 대응 목적으로 일부 데이터를 수집합니다. 해당 데이터는 보안 연구 등의 목적으로 변형 후 공유될 수 있습니다. Quad9은 개인 식별 용도로 쓰일 수 있다고 판단되는 IP 주소 및 기타 데이터를 수집하거나 기록하지 않습니다. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9은 위협 모니터링 및 대응 목적으로 일부 데이터를 수집합니다. 해당 데이터는 보안 연구 등의 목적으로 변형 후 공유될 수 있습니다. Quad9은 개인 식별 용도로 쓰일 수 있다고 판단되는 IP 주소 및 기타 데이터를 수집하거나 기록하지 않습니다. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/ko/email-clients.md b/i18n/ko/email-clients.md index 5a3a4ca9..c63bc718 100644 --- a/i18n/ko/email-clients.md +++ b/i18n/ko/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -74,9 +74,9 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Apple Mail**은 macOS에 기본 포함되어 있으며, PGP 암호화 이메일 전송 기능을 추가하는 [GPG Suite](encryption.md#gpg-suite)를 통해 OpenPGP를 지원하도록 확장 가능합니다. -[:octicons-home-16: 홈페이지](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="프라이버시 정책" } -[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=문서} +[:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail은 외부 콘텐츠를 백그라운드에서 로드하거나, 완전 [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canay Mail은 오픈 소스가 아닙니다. iOS에서 PGP E2EE를 지원하는 [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canay Mail은 오픈 소스가 아닙니다. iOS에서 PGP E2EE를 지원하는 ![Evolution 로고](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** 메일, 캘린더, 연락처 기능을 통합적으로 제공하는 개인 정보 관리 애플리케이션입니다. 시작하는 데에 도움이 되는 방대한 [문서](https://help.gnome.org/users/evolution/stable/)가 존재합니다. +**Evolution** 메일, 캘린더, 연락처 기능을 통합적으로 제공하는 개인 정보 관리 애플리케이션입니다. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ K-9 Mail은 [공식적으로 Thunderbird 브랜드에 통합되었으며](https: [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ K-9 Mail은 [공식적으로 Thunderbird 브랜드에 통합되었으며](https: [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ K-9 Mail은 [공식적으로 Thunderbird 브랜드에 통합되었으며](https: **Mailvelope**는 OpenPGP 암호화 표준에 따라 암호화된 이메일을 주고받을 수 있게 해주는 브라우저 확장 프로그램입니다. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ K-9 Mail은 [공식적으로 Thunderbird 브랜드에 통합되었으며](https: NeoMutt은 텍스트 기반 클라이언트로, 사용법을 익히기 매우 어렵습니다. 하지만 자유로운 커스텀이 가능합니다. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/ko/email.md b/i18n/ko/email.md index 63a97bb9..f31e6107 100644 --- a/i18n/ko/email.md +++ b/i18n/ko/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail에는 내부 충돌 보고서가 존재하며, 이는 제3자와 공 #### :material-check:{ .pg-green } 사용자 지정 도메인 및 별칭 -Proton Mail 유료 이용자는 서비스에서 자신의 도메인을 사용하거나 [Catch-all](https://proton.me/support/catch-all) 주소를 사용할 수 있습니다. 도메인을 자신이 직접 구매하지 않더라도, Proton Mail이 지원하는 [보조 주소](https://proton.me/support/creating-aliases)를 유용하게 사용할 수 있습니다. +Proton Mail 유료 이용자는 서비스에서 자신의 도메인을 사용하거나 [Catch-all](https://proton.me/support/catch-all) 주소를 사용할 수 있습니다. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } 비공개 결제 수단 @@ -129,7 +129,7 @@ Proton Mail은 디지털 유산 상속 기능을 제공하지 않습니다. #### :material-check:{ .pg-green } 사용자 지정 도메인 및 별칭 -Mailbox.org는 자신의 도메인을 사용할 수 있으며, [Catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) 주소를 지원합니다. 도메인을 자신이 직접 구매하지 않더라도, Mailbox.org가 지원하는 [보조 주소](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it)를 유용하게 사용할 수 있습니다. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } 비공개 결제 수단 @@ -137,17 +137,17 @@ Mailbox.org는 BitPay 결제 처리업체가 독일에서 운영을 중단함에 #### :material-check:{ .pg-green } 계정 보안 -Mailbox.org는 웹메일에 한해 [이중 인증](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA)을 지원합니다. TOTP 혹은 ([YubiCloud](https://www.yubico.com/products/services-software/yubicloud)를 통한) [YubiKey](https://en.wikipedia.org/wiki/YubiKey)를 사용할 수 있습니다. [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) 등의 웹 표준은 아직 지원되지 않습니다. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) 등의 웹 표준은 아직 지원되지 않습니다. #### :material-information-outline:{ .pg-blue } 데이터 보안 -Mailbox.org는 [암호화된 메일함](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox)을 이용하여 수신 메일을 암호화할 수 있습니다. 새로 수신하는 메시지는 즉시 공개 키로 암호화됩니다. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). 새로 수신하는 메시지는 즉시 공개 키로 암호화됩니다. -하지만 Mailbox.org에서 사용하는 소프트웨어 플랫폼인 [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange)는 주소록 및 캘린더 암호화를 [지원하지 않습니다.](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) 해당 데이터에 대해서는 [다른 솔루션](calendar.md)을 찾는것이 적합할 수 있습니다. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. 해당 데이터에 대해서는 [다른 솔루션](calendar.md)을 찾는것이 적합할 수 있습니다. #### :material-check:{ .pg-green } 이메일 암호화 -Mailbox.org의 웹메일에는 [암호화 기능이 내장](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard)되어 있어 공개 OpenPGP키를 가진 사람들에게 메일을 간편하게 보낼 수 있습니다. 또한, [수신자가 직접 Mailbox.org에 있는 메일을 복호화](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP)하게 하는 기능도 있습니다. OpenPGP가 없어 수신자가 자신의 메일함에서 직접 복호화할 수 없을 경우에 이 기능을 사용할 수 있습니다. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. OpenPGP가 없어 수신자가 자신의 메일함에서 직접 복호화할 수 없을 경우에 이 기능을 사용할 수 있습니다. 또한, Mailbox.org는 [웹 키 디렉터리(WKD)](https://wiki.gnupg.org/WKD)에서 HTTP를 통한 공개 키 검색을 지원합니다. Mailbox.org를 사용하지 않는 사람들은 Mailbox.org 계정의 OpenPGP 공개키를 쉽게 찾을 수 있고, 플랫폼과 무관하게 종단간 암호화를 할 수 있습니다. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Mailbox.org의 웹메일에는 [암호화 기능이 내장](https://kb.mailbox.o #### :material-information-outline:{ .pg-blue } 추가 기능 -[.onion을 이용하여](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org) Mailbox.org 계정을 IMAP/SMTP로 접근할 수 있습니다. Onion 서비스를 통한 웹메일 인터페이스 접근은 불가능하며, TLS 인증서 오류가 발생할 수 있습니다. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). Onion 서비스를 통한 웹메일 인터페이스 접근은 불가능하며, TLS 인증서 오류가 발생할 수 있습니다. -모든 계정에는 [암호화 가능한](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive) 클라우드 스토리지가 제한적으로 제공됩니다. Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org는 모든 플랜에 디지털 유산 상속 기능을 제공합니다. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ Mailbox.org는 모든 플랜에 디지털 유산 상속 기능을 제공합니 [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } 사용자 지정 도메인 및 별칭 -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } 비공개 결제 수단 @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). 이는 고객의 비즈니스 연락에 E2EE 적용을 보장합니다. 해당 기능의 가격은 연간 240유로입니다. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). 이는 고객의 비즈니스 연락에 E2EE 적용을 보장합니다. 해당 기능의 가격은 연간 240유로입니다. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Privacy Guides 권장 이메일 별칭 제공 업체는 해당 업체에서 관 - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). 주요 무료 기능: @@ -310,8 +310,8 @@ The number of shared aliases (which end in a shared domain like @addy.io) that y **SimpleLogin**는 여러 공통 도메인 이름에 이메일 별칭을 제공하는 무료 서비스입니다. 유료 기능으로는 무제한 별칭 및 사용자 지정 도메인을 사용할 수 있습니다. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ The number of shared aliases (which end in a shared domain like @addy.io) that y - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin은 [2022년 4월 8일자로 Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces)에 인수되었습니다. Proton Mail을 주로 사용하고 계신다면 SimpleLogin은 훌륭한 선택입니다. 이제 두 제품 모두 동일한 회사에서 소유하고 있으므로, 신뢰해야 할 업체의 개수가 하나로 줄어듭니다. SimpleLogin은 향후 Proton 제품과 더욱 긴밀하게 통합될 것으로 기대하고 있습니다. SimpleLogin은 사용자가 선택한 어떤 이메일 제공업체든 계속 전달을 지원합니다. SimpleLogin은 2022년 초 Securitum으로부터 [감사받았으며](https://simplelogin.io/blog/security-audit/), 당시 제기된 문제는 이후 모두 [해결되었습니다](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin은 [2022년 4월 8일자로 Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces)에 인수되었습니다. Proton Mail을 주로 사용하고 계신다면 SimpleLogin은 훌륭한 선택입니다. 이제 두 제품 모두 동일한 회사에서 소유하고 있으므로, 신뢰해야 할 업체의 개수가 하나로 줄어듭니다. SimpleLogin은 향후 Proton 제품과 더욱 긴밀하게 통합될 것으로 기대하고 있습니다. SimpleLogin은 사용자가 선택한 어떤 이메일 제공업체든 계속 전달을 지원합니다. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). Proton 계정과 SimpleLogin 계정 연결은 설정에서 가능합니다. Proton Unlimited, Business, Visionary 플랜을 이용 중이라면 SimpleLogin 프리미엄도 무료로 제공됩니다. @@ -351,10 +351,10 @@ Proton 계정과 SimpleLogin 계정 연결은 설정에서 가능합니다. Prot **Mailcow**는 Linux 사용 경험이 많은 분에게 적합한 고급 메일 서버입니다. DKIM 지원 메일 서버, 안티바이러스, 스팸 모니터링, SOGo 웹메일 및 ActiveSync, 이중 인증 지원 웹 기반 관리 등 필요한 모든 것을 Docker 컨테이너에 갖추고 있습니다. -[:octicons-home-16: 홈페이지](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=문서} -[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=기여 } +[:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Proton 계정과 SimpleLogin 계정 연결은 설정에서 가능합니다. Prot 보다 수동적인 접근 방식을 찾으신다면 다음 두 아티클을 추천드립니다: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## 평가 기준 @@ -386,7 +386,7 @@ Proton 계정과 SimpleLogin 계정 연결은 설정에서 가능합니다. Prot **최소 요구 사항:** - Zero Access Encryption을 통해 이메일 계정 데이터를 암호화해야 합니다. -- [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) 표준을 사용해 [Mbox](https://en.wikipedia.org/wiki/Mbox) 혹은 개별 .eml 내보내기 기능을 지원해야 합니다. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - 사용자가 자신의 [도메인 이름](https://en.wikipedia.org/wiki/Domain_name)을 사용할 수 있어야 합니다. Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - 자체 인프라에서 운영되어야 합니다. 다른 이메일 서비스 제공 업체의 인프라를 기반으로 만들어진 서비스여선 안 됩니다. @@ -397,7 +397,7 @@ Proton 계정과 SimpleLogin 계정 연결은 설정에서 가능합니다. Prot - [WKD](https://wiki.gnupg.org/WKD)를 지원하여 HTTP를 통한 공개 OpenPGP 키 검색 편의를 제공해야 합니다. GnuPG 사용자는 `gpg --locate-key example_user@example.com`를 입력하여 키를 얻을 수 있습니다. - 외부 사용자를 위해 임시 메일함을 지원해야 합니다. 수신자에게 실제 사본을 보내지 않고 암호화된 이메일을 보내고자 할 때 유용합니다. 이러한 이메일은 보통 수명이 제한돼 있으며 이후 자동으로 삭제됩니다. 수신자가 OpenPGP 등의 암호화를 설정할 필요가 없습니다. - [Onion 서비스](https://en.wikipedia.org/wiki/.onion)를 통해 이메일 서비스를 이용할 수 있어야 합니다. -- [보조 주소](https://en.wikipedia.org/wiki/Email_address#Subaddressing)를 지원해야 합니다. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - 자체 도메인을 소유한 사용자를 위해 Catch-all 이나 별칭 기능을 제공해야 합니다. - IMAP, SMTP, [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol) 등 표준 이메일 접근 프로토콜을 사용해야 합니다. 표준 액세스 프로토콜을 사용함으로써, 사용자는 다른 서비스 제공 업체로 전환하고자 할 경우 모든 이메일을 쉽게 다운로드할 수 있습니다. @@ -425,13 +425,13 @@ Privacy Guides이 권장하는 제공자들은 최소한의 데이터만을 수 - 웹메일은 2FA(TOTP 등)로 보호되어야 합니다. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions)를 지원해야 합니다. -- [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), [Qualys SSL Labs](https://www.ssllabs.com/ssltest) 등의 툴로 분석했을 때 TLS 에러나 취약점이 없어야 합니다. 여기에는 [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security))으로 이어진 것과 같은 인증서 관련 오류 및 DH 파라미터도 포함됩니다. +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Privacy Guides이 권장하는 제공자들은 최소한의 데이터만을 수 - 버그 바운티 프로그램 또는 체계적인 취약점 공개 프로세스가 있음 - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### 신뢰 diff --git a/i18n/ko/encryption.md b/i18n/ko/encryption.md index 1e99b787..f497086a 100644 --- a/i18n/ko/encryption.md +++ b/i18n/ko/encryption.md @@ -21,15 +21,15 @@ cover: encryption.webp [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -44,7 +44,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (파일) @@ -80,15 +80,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -110,15 +110,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://learn.microsoft.com/ko-kr/windows/security/information-protection/bitlocker/bitlocker-overview){ .card-link title=문서} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -135,7 +135,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -182,9 +182,9 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form **LUKS**는 Linux에서 기본으로 사용하는 FDE 방식입니다. 전체 볼륨, 파티션을 암호화하거나 암호화 컨테이너를 만들 수 있습니다. -[:octicons-home-16: 홈페이지](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=문서} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="소스 코드" } +[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -230,20 +230,20 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im ![Kryptor 로고](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor**는 현대적이고 안전한 암호화 알고리즘을 사용하는 무료 오픈 소스 툴로, 파일 암호화 및 서명 기능을 제공합니다. [age](https://github.com/FiloSottile/age)와 [Minisign](https://jedisct1.github.io/minisign/)을 개선하여 GPG를 대체할 수 있는 쉽고 간편한 대안을 제공하는 것을 목표로 합니다. +**Kryptor**는 현대적이고 안전한 암호화 알고리즘을 사용하는 무료 오픈 소스 툴로, 파일 암호화 및 서명 기능을 제공합니다. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -257,10 +257,10 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im **Tomb**는 LUKS의 커맨드라인 Shell 래퍼(Wrapper)입니다. [외부 툴](https://github.com/dyne/Tomb#how-does-it-work)을 통해 스테가노그래피(Steganography)를 지원합니다. -[:octicons-home-16: 홈페이지](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=문서} -[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=기부 } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -270,12 +270,12 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -289,7 +289,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -368,11 +368,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/ko/file-sharing.md b/i18n/ko/file-sharing.md index 26151db8..77121883 100644 --- a/i18n/ko/file-sharing.md +++ b/i18n/ko/file-sharing.md @@ -15,7 +15,7 @@ cover: file-sharing.webp ![Send 로고](assets/img/file-sharing-sync/send.svg){ align=right } -**Send**는 Mozilla가 중단했던 Firefox Send 서비스를 포크한 프로젝트입니다. 링크를 통해 다른 사람에게 파일을 전송할 수 있습니다. 파일은 기기에서 암호화되기 때문에 서버에서는 읽을 수 없으며, 원하는 경우 비밀번호로 보호할 수도 있습니다. Send 프로젝트의 메인테이너는 [공개 인스턴스](https://send.vis.ee/)를 직접 호스팅하고 있습니다. 다른 공개 인스턴스를 사용할 수도 있으며, 여러분이 직접 Send를 호스팅하는 것도 가능합니다. +**Send**는 Mozilla가 중단했던 Firefox Send 서비스를 포크한 프로젝트입니다. 링크를 통해 다른 사람에게 파일을 전송할 수 있습니다. 파일은 기기에서 암호화되기 때문에 서버에서는 읽을 수 없으며, 원하는 경우 비밀번호로 보호할 수도 있습니다. The maintainer of Send hosts a [public instance](https://send.vis.ee). 다른 공개 인스턴스를 사용할 수도 있으며, 여러분이 직접 Send를 호스팅하는 것도 가능합니다. [:octicons-home-16: 홈페이지](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="공개 인스턴스"} @@ -80,10 +80,10 @@ Privacy Guides 팀은 사이트의 모든 항목마다 명확한 평가 기준 **FreedomBox**는 [SBC(Single Board Computer)](https://ko.wikipedia.org/wiki/%EB%8B%A8%EC%9D%BC_%EB%B3%B4%EB%93%9C_%EC%BB%B4%ED%93%A8%ED%84%B0)에서 구동되도록 설계된 운영체제입니다. 자체 호스팅 서버 애플리케이션을 간편하게 설정할 수 있도록 하는 것이 FreedomBox의 목표입니다. -[:octicons-home-16: 홈페이지](https://freedombox.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=문서} -[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=기부 } +[:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} +[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ Privacy Guides 팀은 사이트의 모든 항목마다 명확한 평가 기준 [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ Privacy Guides는 Nextcloud용 [E2EE 앱](https://apps.nextcloud.com/apps/end_to [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/ko/financial-services.md b/i18n/ko/financial-services.md index 7f4f25d3..01e3a5f2 100644 --- a/i18n/ko/financial-services.md +++ b/i18n/ko/financial-services.md @@ -28,9 +28,9 @@ Many banks and credit card providers offer native virtual card functionality. If **Privacy.com**'s free plan allows you to create up to 12 virtual cards per month, set spend limits on those cards, and shut off cards instantly. Their paid plan allows you to create up to 36 cards per month, get 1% cash back on purchases, and hide transaction information from your bank. -[:octicons-home-16: 홈페이지](https://privacy.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="프라이버시 정책" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=문서} +[:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: 홈페이지](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="프라이버시 정책" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=문서} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: 홈페이지](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="프라이버시 정책" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=문서} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/ko/frontends.md b/i18n/ko/frontends.md index 5b4c247d..fda43af4 100644 --- a/i18n/ko/frontends.md +++ b/i18n/ko/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -190,11 +190,11 @@ When using NewPipe, your IP address will be visible to the video providers used. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. -[:octicons-home-16: 홈페이지](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="공개 인스턴스"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=문서} -[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=기부 } +[:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -224,11 +224,11 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Piped requires JavaScript in order to function and there are a number of public instances. -[:octicons-repo-16: 저장소](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="공개 인스턴스"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=문서} -[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=기부 } +[:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } +[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute }
diff --git a/i18n/ko/index.md b/i18n/ko/index.md index a966edbc..1725037e 100644 --- a/i18n/ko/index.md +++ b/i18n/ko/index.md @@ -62,12 +62,12 @@ schema: ## 여러분의 도움이 필요합니다! 참여 방법은 다음과 같습니다: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="포럼 참여" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Mastodon 팔로우" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="사이트 기여하기" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="사이트 번역 돕기" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Matrix 채팅 참여하기" } -[:material-information-outline:](about/index.md){ title="Privacy Guides에 대해 알아보기" } -[:material-hand-coin-outline:](about/donate.md){ title="프로젝트 후원하기" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } Privacy Guides와 같은 사이트는 언제나 최신 정보를 제공하는 것이 중요합니다. 사이트에서 안내된 프로그램의 업데이트를 주시하고, 추천한 제공 업체 관련 최신 뉴스를 따라가기 위해서는 여러분들의 집단 지성이 필요합니다. 인터넷의 빠른 변화를 따라잡기는 쉽지 않지만, 우린 최선을 다하고 있습니다. 사이트에서 오류를 발견하셨거나, 특정 제공 업체가 목록에서 제외되어야 한다고 생각하시거나, 혹은 적절한 제공 업체가 누락되었거나, 브라우저 플러그인이 더 이상 훌륭한 선택이 아니라고 생각하시는 등 각종 문제를 발견한 경우 알려주시기 바랍니다. diff --git a/i18n/ko/kb-archive.md b/i18n/ko/kb-archive.md index f99785e4..4666c69a 100644 --- a/i18n/ko/kb-archive.md +++ b/i18n/ko/kb-archive.md @@ -8,10 +8,10 @@ description: 본래 지식 기반에서 다루었던 일부 페이지는 현재 이하 페이지는 본래 지식 기반에서 다루었으나, 현재는 블로그로 이동되었습니다. -- [GrapheneOS vs CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal 보안 강화 설정](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - 시스템 보안 강화](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - 애플리케이션 샌드박스 격리](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [데이터를 안전하게 삭제하는 방법](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [메타데이터 제거 툴을 시스템에 통합하는 방법](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS 설정 가이드](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal 보안 강화 설정](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - 시스템 보안 강화](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - 애플리케이션 샌드박스 격리](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [데이터를 안전하게 삭제하는 방법](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [메타데이터 제거 툴을 시스템에 통합하는 방법](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS 설정 가이드](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/ko/meta/admonitions.md b/i18n/ko/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/ko/meta/admonitions.md +++ b/i18n/ko/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/ko/meta/translations.md b/i18n/ko/meta/translations.md index 1f6ac241..e8c8fea9 100644 --- a/i18n/ko/meta/translations.md +++ b/i18n/ko/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/ko/meta/uploading-images.md b/i18n/ko/meta/uploading-images.md index 1203bdab..15e81713 100644 --- a/i18n/ko/meta/uploading-images.md +++ b/i18n/ko/meta/uploading-images.md @@ -17,7 +17,7 @@ title: 이미지 업로드 방법 ### PNG -PNG 이미지는 [OptiPNG](https://sourceforge.net/projects/optipng/)를 이용해 최적화하세요. +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/ko/meta/writing-style.md b/i18n/ko/meta/writing-style.md index 9b30bbec..e2b7c216 100644 --- a/i18n/ko/meta/writing-style.md +++ b/i18n/ko/meta/writing-style.md @@ -4,11 +4,11 @@ title: 작성 스타일 (역주: 본 내용은 Privacy Guides '영어 원문'의 내용을 번역한 것입니다. 한국어 번역본의 스타일은 언어/문화의 차이로 인해 상당히 달라질 수밖에 없습니다.) Privacy Guides는 미국 영문으로 작성되었습니다. 기본적인 문법은 [APA Style Guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar)를 참고하시기 바랍니다. -일반적으로 [Federal plain language guidelines](https://www.plainlanguage.gov/guidelines/)는 명확하고 간결하게 작성하는 방법에 대한 훌륭한 개요를 제공합니다. 다음 내용은 해당 가이드라인 내에서 몇 가지 중요한 사항을 강조한 것입니다. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. 다음 내용은 해당 가이드라인 내에서 몇 가지 중요한 사항을 강조한 것입니다. ## 청중을 위한 글쓰기 -Privacy Guides에서 가정하고 있는 '[청중](https://www.plainlanguage.gov/guidelines/audience/)'이란, 주로 '기술에 대한 평균적인 지식을 갖춘 성인'을 의미합니다. 중학생에게 설명하는 것처럼 쉽게 설명할 필요는 없지만, 일반 컴퓨터 사용자에게 익숙치 않은 개념을 설명할 때 어려운 용어를 남용해서도 안 됩니다. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. 중학생에게 설명하는 것처럼 쉽게 설명할 필요는 없지만, 일반 컴퓨터 사용자에게 익숙치 않은 개념을 설명할 때 어려운 용어를 남용해서도 안 됩니다. ### 사람들이 알고 싶어 하는 내용만 다루세요 @@ -24,7 +24,7 @@ Privacy Guides에서 가정하고 있는 '[청중](https://www.plainlanguage.gov > > 사용자를 지칭할 때 '당신'을 사용하면 사용자가 자신의 책임에 대해 더 잘 이해할 수 있습니다. -출처: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### '사용자'라는 표현을 지양하세요 @@ -37,7 +37,7 @@ Privacy Guides에서 가정하고 있는 '[청중](https://www.plainlanguage.gov - 문서의 섹션을 5~6개 정도로 제한하세요. 긴 문서는 여러 페이지로 나눠서 작성하는 편이 좋습니다. - 중요한 아이디어는 **Bold**나 *Italic*으로 표시해야 합니다. -출처: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### 주제문부터 시작하세요 @@ -45,7 +45,7 @@ Privacy Guides에서 가정하고 있는 '[청중](https://www.plainlanguage.gov > > 우리는 간혹 전제를 먼저 제시하고 결론을 내리는 방식으로 글을 작성합니다. 생각을 전개하는 과정으로서는 자연스러울 수 있지만, 이는 주제문이 문단의 끝에 위치하는 결과를 낳습니다. 주제문을 맨 앞으로 이동함으로써 독자에게 길을 잡아줄 수 있습니다. 독자가 요점을 파악하지 못한 상태에서 많은 정보를 머릿속에 담아두게 만들지 마세요. -출처: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## 단어는 신중하게 선택하세요 @@ -65,7 +65,7 @@ Privacy Guides에서 가정하고 있는 '[청중](https://www.plainlanguage.gov > 불필요한 단어는 청중의 시간을 낭비합니다. 훌륭한 글쓰기는 대화와 같습니다. 청중에게 있어서 불필요한 정보는 생략하세요. 이는 어떤 주제의 전문가로서는 어려울 수도 있지만, 중요한 것은 청중의 관점에서 정보를 살펴보는 것입니다. -출처: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## 대화하듯이 글을 작성하세요 @@ -77,7 +77,7 @@ Privacy Guides에서 가정하고 있는 '[청중](https://www.plainlanguage.gov > 능동 표현은 '누가 무엇을 해야 하는지'를 명확히 합니다. 이는 혼동을 방지합니다. '이와 같은 식으로 되어야 합니다' 대신 '이렇게 하셔야 합니다'라고 작성해야 합니다. -출처: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### 요구 사항에는 "해야 합니다"라고 작성하세요 diff --git a/i18n/ko/mobile-browsers.md b/i18n/ko/mobile-browsers.md index 3c4ab2d9..1c73f526 100644 --- a/i18n/ko/mobile-browsers.md +++ b/i18n/ko/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,22 +41,22 @@ schema: ## Android -Android에서, Firefox는 Chrome 기반 대체제보다 보안성이 떨어집니다. Mozilla의 Android 브라우저 엔진인 [GeckoView](https://mozilla.github.io/geckoview/)는 아직 [사이트 격리](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture)를 지원하지 않고 [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196)가 활성화되어 있지 않습니다. +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave
-![Brave 로고](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave 브라우저**에는 콘텐츠 차단기와 [프라이버시 기능](https://brave.com/privacy-features/)이 내장되어 있으며, 이 중 상당수가 기본적으로 활성화되어 있습니다. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brace는 Chromium 웹 브라우저 프로젝트 기반으로 구축되었으므로, 친숙하며 웹사이트 호환성 문제가 적습니다. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ Brace는 Chromium 웹 브라우저 프로젝트 기반으로 구축되었으므 ##### Shields -Brave 브라우저는 [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) 기능 내에 핑거프린팅 방지가 포함되어 있습니다. 방문하는 모든 페이지에 [전역적으로](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) 옵션을 설정하는 것이 좋습니다. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave Shields 전역 기본값 @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. 해당 옵션은 uBlock Origin의 고급 [차단 모드](https://github.com/gorhill/uBlock/wiki/Blocking-mode)나 [NoScript](https://noscript.net/) 확장 프로그램과 유사한 기능을 제공합니다. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### 인터넷 사용 기록 삭제 @@ -115,13 +115,13 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] [WebRTC IP 처리 방침](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc)을 **프록시가 아닌 UDP 비활성화하기**로 설정 -- [ ] **사이트에서 저장된 결제 수단이 있는지 확인하도록 허용** 비활성화 -- [ ] **IPFS 게이트웨이** 비활성화 (1) -- [x] **나갈 때 탭 닫기** 활성화 -- [ ] **프라이버시 보호 제품 분석(P3A) 허용** 비활성화 -- [ ] **진단 보고서 자동 전송** 비활성화 -- [ ] **일일 사용 Ping을 Brave에 자동으로 보내기** 비활성화 +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Allow sites to check if you have payment methods saved** +- [ ] Uncheck **IPFS Gateway** (1) +- [x] Select **Close tabs on exit** +- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** +- [ ] Uncheck **Automatically send diagnostic reports** +- [ ] Uncheck **Automatically send daily usage ping to Brave**
@@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave 동기화 -[Brave 동기화](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync)를 이용하면 계정을 생성하지 않고도 자신의 모든 기기에서 브라우저 데이터(탐색 기록, 북마크 등)를 동기화할 수 있으며, E2EE로 보호됩니다. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,11 +141,11 @@ iOS에서는 웹 브라우징이 가능한 모든 앱이 Apple에서 제공하 ![Safari 로고](assets/img/browsers/safari.svg){ align=right } -**Safari**는 iOS 기본 브라우저입니다. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari**는 iOS 기본 브라우저입니다. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: 홈페이지](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/kr/legal/privacy/data/ko/safari/){ .card-link title="프라이버시 정책" } -[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=문서} +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ The **Advanced Tracking and Fingerprinting Protection** setting will randomize c - [ ] **개인 정보 보호 광고 측정** 비활성화 -광고 클릭 측정에는 사용자 개인정보를 침해하는 추적 기술이 사용되는 것이 일반적입니다. Webkit 기능이자 웹 표준으로 제안된 [비공개 클릭 측정](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) 기능은 광고주가 사용자의 프라이버시를 침해하지 않으면서도 웹 캠페인 효과를 측정할 수 있도록 하는 것을 목표로 합니다. +광고 클릭 측정에는 사용자 개인정보를 침해하는 추적 기술이 사용되는 것이 일반적입니다. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. 해당 기능은 프라이버시 관련 우려가 거의 없으므로 활성화해둘 수도 있으나, 개인정보 보호 브라우징에서 이 기능이 자동으로 비활성화된다는 점을 고려하여, 비활성화할 것으로 명시하였습니다. @@ -201,9 +201,9 @@ Safari 개인정보 보호 브라우징 모드는 추가적인 프라이버시 ##### iCloud 동기화 -Safari 방문 기록, 탭 그룹, iCloud 탭, 저장된 암호는 E2EE 동기화됩니다. 하지만, 책갈피는 기본적으로 [종단 간 암호화되지 않습니다](https://support.apple.com/ko-kr/HT202303). Apple은 [개인정보 처리방침](https://www.apple.com/kr/legal/privacy/kr/)에 따라 복호화하고 접근할 수 있습니다. +Safari 방문 기록, 탭 그룹, iCloud 탭, 저장된 암호는 E2EE 동기화됩니다. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -[고급 데이터 보호](https://support.apple.com/ko-kr/HT212520)를 활성화하면 Safari 책갈피 및 다운로드 항목에도 E2EE를 적용할 수 있습니다. **Apple 사용자 이름 → iCloud → 고급 데이터 보호**로 이동하세요. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). **Apple 사용자 이름 → iCloud → 고급 데이터 보호**로 이동하세요. - [x] **고급 데이터 보호** 활성화 @@ -227,7 +227,7 @@ iOS용 AdGuard에는 몇 가지 프리미엄 기능이 있지만, 표준 Safari
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/ko/multi-factor-authentication.md b/i18n/ko/multi-factor-authentication.md index 7c4f003a..834ac4e6 100644 --- a/i18n/ko/multi-factor-authentication.md +++ b/i18n/ko/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. YubiKey는 모델에 따라 [U2F(Universal 2nd Factor)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 및 WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [PIV(Personal Identity Verification)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP 및 HOTP](https://developers.yubico.com/OATH) 인증 등의 기능을 제공합니다. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: 홈페이지](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="프라이버시 정책" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=문서} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-여러 YubiKey 모델 간 기능 비교는 [YubiKey 비교 표](https://www.yubico.com/store/compare/)에서 확인하실 수 있습니다. Privacy Guides에서는 YubiKey 5 시리즈를 사용하실 것을 권장드립니다. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. Privacy Guides에서는 YubiKey 5 시리즈를 사용하실 것을 권장드립니다. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: 홈페이지](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="프라이버시 정책" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=문서} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation} -The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/ko/news-aggregators.md b/i18n/ko/news-aggregators.md index f949b546..3938a381 100644 --- a/i18n/ko/news-aggregators.md +++ b/i18n/ko/news-aggregators.md @@ -21,7 +21,7 @@ cover: news-aggregators.webp [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ cover: news-aggregators.webp [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ cover: news-aggregators.webp **NetNewsWire**는 네이티브 디자인 및 기능에 중점을 둔 macOS, iOS용 무료 오픈소스 피드 리더입니다. 일반적인 피드 형식과 함께 Reddit 피드를 기본 지원합니다. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit에서는 RSS를 이용해 서브레딧을 구독할 수 있습니다. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ YouTube에 로그인하거나 여러분의 Google 계정에 사용 정보를 남 RSS 클라이언트로 Youtube 채널을 구독하려면 [채널 코드](https://support.google.com/youtube/answer/6180214)를 확인해야 합니다. The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/ko/notebooks.md b/i18n/ko/notebooks.md index 00260d3a..f1f7dc24 100644 --- a/i18n/ko/notebooks.md +++ b/i18n/ko/notebooks.md @@ -34,7 +34,7 @@ cover: notebooks.webp - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ cover: notebooks.webp ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. 모든 플랫폼에서 종단 간 암호화를 지원하고, 강력한 동기화 기능을 제공하여 언제 어디서든 노트를 작성할 수 있습니다. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. 모든 플랫폼에서 종단 간 암호화를 지원하고, 강력한 동기화 기능을 제공하여 언제 어디서든 노트를 작성할 수 있습니다. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ cover: notebooks.webp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin**은 기능이 완벽하게 갖춰진 무료 오픈 소스 노트 작성/할 일 관리 애플리케이션입니다. 노트북 분류와 태그로 정리하여 수많은 마크다운 노트를 관리할 수 있습니다. E2EE를 제공하며, Nextcloud, Dropbox 등을 통해 동기화 가능합니다. Evernote나 일반 텍스트 노트에서 간편하게 가져올 수 있는 기능도 제공합니다. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -135,9 +135,9 @@ Cryptee는 100MB 저장 공간을 무료로 제공하며, 유료 결제를 통
-![Org-mode 로고](assets/img/notebooks/org-mode.svg){ align=right } +![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode**는 GNU Emacs의 [메이저 모드(Major Mode)](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html)입니다. 빠르고 효과적인 일반 텍스트 시스템으로 노트 작성, 할 일 목록 관리, 프로젝트 계획, 문서 작성이 가능합니다. [파일 동기화](file-sharing.md#file-sync) 툴을 이용하면 동기화 가능합니다. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. 빠르고 효과적인 일반 텍스트 시스템으로 노트 작성, 할 일 목록 관리, 프로젝트 계획, 문서 작성이 가능합니다. [파일 동기화](file-sharing.md#file-sync) 툴을 이용하면 동기화 가능합니다. [:octicons-home-16: 홈페이지](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=문서} diff --git a/i18n/ko/os/android-overview.md b/i18n/ko/os/android-overview.md index 1bedc444..371b0619 100644 --- a/i18n/ko/os/android-overview.md +++ b/i18n/ko/os/android-overview.md @@ -60,7 +60,7 @@ Android 10 이상부터는 기존의 전체 디스크 암호화보다 유연한 펌웨어 업데이트는 보안에 있어 매우 중요합니다. 펌웨어 업데이트가 없으면 기기 보안을 유지할 수 없습니다. OEM은 자신들의 협력체와 지원 계약을 맺고 제한된 기간 동안 비공개 소스로 된 구성 요소를 제공합니다. 관련 내용은 [Android 보안 게시판](https://source.android.com/security/bulletin)에 자세히 설명되어 있습니다. -휴대폰을 구성하는 요소(프로세서, 무선 기술 등)은 비공개 소스로 된 구성 요소에 의존하기 때문에, 업데이트는 각각의 제조업체로부터 제공받아야 합니다. 지원 기간 내의 기기를 구매해야 하는 이유가 바로 이것입니다. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and), [Samsung](https://news.samsung.com/kr/%EC%82%BC%EC%84%B1%EC%A0%84%EC%9E%90-%EA%B0%A4%EB%9F%AD%EC%8B%9C-%EB%AA%A8%EB%B0%94%EC%9D%BC-%EA%B8%B0%EA%B8%B0-%EB%B3%B4%EC%95%88-%EC%97%85%EB%8D%B0%EC%9D%B4%ED%8A%B8-%EC%B5%9C%EC%86%8C-4%EB%85%84)은 4년 이상의 기기 지원 기간을 가지고 있습니다. 지원 기간은 업체, 제품마다 다르지만, 저렴한 제품일수록 지원 기간이 짧은 경향이 있습니다. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +휴대폰을 구성하는 요소(프로세서, 무선 기술 등)은 비공개 소스로 된 구성 요소에 의존하기 때문에, 업데이트는 각각의 제조업체로부터 제공받아야 합니다. 지원 기간 내의 기기를 구매해야 하는 이유가 바로 이것입니다. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. SoC 제조업체에서 더 이상 지원하지 않는 EOL 기기는 OEM 업체나 애프터 마켓 Android 배포자로부터 펌웨어 업데이트를 받는 것이 불가능합니다. 즉, 해당 기기의 보안 문제는 해결될 일이 없습니다. @@ -97,19 +97,19 @@ Android 13: 앱은 특정 기능에 대한 권한을 요청할 수 있습니다. 예를 들어, QR 코드를 스캔할 수 있는 모든 앱에는 카메라 권한이 필요합니다. 일부 앱은 해당 앱에 필요한 권한보다 더 많은 권한을 요청하는 경우도 있습니다. -[Exodus](https://exodus-privacy.eu.org/)는 유사한 용도의 앱을 비교하는 데에 유용합니다. 앱이 과도한 권한을 요구하고 광고 및 분석 기능이 많다면, 해당 앱은 피해야 할지도 모릅니다. Privacy Guides는 각 항목의 차이를 보지 않고 **단순히 총합 수치로 비교**하기보다는 각각의 추적기와 그 설명을 하나씩 읽어보실 것을 권장드립니다. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. 앱이 과도한 권한을 요구하고 광고 및 분석 기능이 많다면, 해당 앱은 피해야 할지도 모릅니다. Privacy Guides는 각 항목의 차이를 보지 않고 **단순히 총합 수치로 비교**하기보다는 각각의 추적기와 그 설명을 하나씩 읽어보실 것을 권장드립니다.

Warning

-앱의 상당 부분이 웹 기반 서비스로 이루어진 경우, 추적은 서버 측에서 이루어질 수도 있습니다. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/)은 '추적기 없음'이라 표시되어 있지만, 사이트 전반에서 사용자의 관심사와 행동을 추적하는 것은 틀림없습니다. 앱이 광고 업계에서 제작한 표준 광고 라이브러리 외의 수단을 사용함으로써 탐지에서 벗어나는 것도 있을 수 있는 일이지만, 가능성은 낮습니다. +앱의 상당 부분이 웹 기반 서비스로 이루어진 경우, 추적은 서버 측에서 이루어질 수도 있습니다. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. 앱이 광고 업계에서 제작한 표준 광고 라이브러리 외의 수단을 사용함으로써 탐지에서 벗어나는 것도 있을 수 있는 일이지만, 가능성은 낮습니다.

Note

-[Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) 처럼 프라이버시 친화적인 앱에서도 [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/) 등의 일부 추적기가 표시될 수 있습니다. 해당 라이브러리는 앱에서 [푸시 알림](https://ko.wikipedia.org/wiki/%ED%91%B8%EC%8B%9C_%EA%B8%B0%EB%B2%95)을 제공할 수 있는 [Firebase 클라우드 메시징(FCM)](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging)이 포함되어 있습니다. Bitwarden이 바로 [이러한 경우](https://fosstodon.org/@bitwarden/109636825700482007)에 해당합니다. Bitwarden에서 Google Firebase Analytics 트래커가 발견됐다는 사실이 Bitwarden에서 Google Firebase Analytics의 모든 분석 기능을 사용한다는 것을 의미하지는 않습니다. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). 해당 라이브러리는 앱에서 [푸시 알림](https://ko.wikipedia.org/wiki/%ED%91%B8%EC%8B%9C_%EA%B8%B0%EB%B2%95)을 제공할 수 있는 [Firebase 클라우드 메시징(FCM)](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging)이 포함되어 있습니다. Bitwarden이 바로 [이러한 경우](https://fosstodon.org/@bitwarden/109636825700482007)에 해당합니다. Bitwarden에서 Google Firebase Analytics 트래커가 발견됐다는 사실이 Bitwarden에서 Google Firebase Analytics의 모든 분석 기능을 사용한다는 것을 의미하지는 않습니다.
@@ -145,20 +145,20 @@ Android 7 and above supports a VPN kill switch, and it is available without the ### 고급 보호 프로그램 -Google 계정을 가지고 있다면 [고급 보호 프로그램](https://landing.google.com/advancedprotection/)에 등록하시는 것을 권장드립니다. [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online)를 지원하는 하드웨어 보안 키를 2개 이상 가지고 있다면 누구나 무료로 이용할 수 있습니다. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online)를 지원하는 하드웨어 보안 키를 2개 이상 가지고 있다면 누구나 무료로 이용할 수 있습니다. 고급 보호 프로그램은 향상된 위협 모니터링 기능을 제공합니다. - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Google 및 인증된 제3자 앱만이 계정 데이터에 접근 가능 - Google 계정의 받은 편지함에서 [피싱](https://en.wikipedia.org/wiki/Phishing#Email_phishing) 시도 스캔 -- Google Chrome의 더 엄격한 [세이프 브라우징 검사](https://www.google.com/chrome/privacy/whitepaper.html#malware) +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - 계정 자격 증명 손실 시 더 엄격한 복구 절차 - Google Play에 샌드박스가 적용되지 않은 환경의 경우(기본 운영 체제는 대부분 이 경우입니다), 고급 보호 프로그램은 다음과 같은 [추가 이점](https://support.google.com/accounts/answer/9764949?hl=ko)을 제공합니다. + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- [Play 프로텍트](https://support.google.com/googleplay/answer/2812853?hl=ko#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work%2C%EA%B0%9C%EC%9D%B8%EC%A0%95%EB%B3%B4-%EB%B3%B4%ED%98%B8-%EC%95%8C%EB%A6%BC-%EC%9E%91%EB%8F%99-%EB%B0%A9%EC%8B%9D)에 의한 필수적인 자동 기기 스캔 +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - 검증되지 않은 애플리케이션에 대한 경고 표시 ### Google Play 시스템 업데이트 @@ -169,7 +169,7 @@ Google 계정을 가지고 있다면 [고급 보호 프로그램](https://landin ### 광고 ID -Google Play 서비스가 설치된 모든 기기는 타겟 광고에 사용되는 [광고 ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=ko)가 자동으로 생성됩니다. 이 기능을 비활성화하여 수집되는 데이터를 제한할 수 있습니다. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. 이 기능을 비활성화하여 수집되는 데이터를 제한할 수 있습니다. [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play)가 존재하는 Android 배포판의 경우, :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, *Delete advertising ID*를 선택하세요. diff --git a/i18n/ko/os/ios-overview.md b/i18n/ko/os/ios-overview.md index 2b23e7f5..92cfb4de 100644 --- a/i18n/ko/os/ios-overview.md +++ b/i18n/ko/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/ko/os/linux-overview.md b/i18n/ko/os/linux-overview.md index efdcda3b..d3b75df2 100644 --- a/i18n/ko/os/linux-overview.md +++ b/i18n/ko/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - 독점 소프트웨어에 자주 따라오는 데이터 수집을 피하고 싶을 때 -- [자유 소프트웨어](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms)를 사용하고 싶은 경우 -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## 배포판 선택하기 @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/ko/os/macos-overview.md b/i18n/ko/os/macos-overview.md index ce54d939..2c97f5ba 100644 --- a/i18n/ko/os/macos-overview.md +++ b/i18n/ko/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## 권장 설정 Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/ko/os/qubes-overview.md b/i18n/ko/os/qubes-overview.md index c76924d9..fcea270b 100644 --- a/i18n/ko/os/qubes-overview.md +++ b/i18n/ko/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/ko/passwords.md b/i18n/ko/passwords.md index e19ac004..aae71933 100644 --- a/i18n/ko/passwords.md +++ b/i18n/ko/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: 비밀번호 관리자 operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: 비밀번호 관리자 operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: 비밀번호 관리자 operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: 비밀번호 관리자 operatingSystem: - Windows @@ -127,7 +127,7 @@ schema: 브라우저나 운영 체제 등에 내장된 비밀번호 관리자는 전용 비밀번호 관리자 소프트웨어에 비해 부족한 경우가 있습니다. 내장된 비밀번호 관리자는 본체 소프트웨어와 잘 통합되어 있다는 장점이 있지만, 기능이 매우 단조롭고 프라이버시 및 보안 기능이 부족한 경우가 많습니다. -예를 들어, Microsoft Edge 내의 비밀번호 관리자는 E2EE를 전혀 제공하지 않습니다. Google 비밀번호 관리자는 [선택적](https://support.google.com/accounts/answer/11350823) E2EE를 제공하며, Apple은 [기본적으로](https://support.apple.com/ko-kr/HT202303) E2EE를 제공합니다. +예를 들어, Microsoft Edge 내의 비밀번호 관리자는 E2EE를 전혀 제공하지 않습니다. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ schema: [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ schema:
-Bitwarden은 [종단 간 암호화를 적용해](https://bitwarden.com/help/send-encryption) 텍스트 및 파일을 안전하게 공유할 수 있는 [Bitwarden Send](https://bitwarden.com/products/send/) 기능도 제공합니다. Send 링크에 [비밀번호를 설정](https://bitwarden.com/help/send-privacy/#send-passwords)할 수도 있습니다. [자동 삭제](https://bitwarden.com/help/send-lifespan) 기능 또한 지원합니다. +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). Send 링크에 [비밀번호를 설정](https://bitwarden.com/help/send-privacy/#send-passwords)할 수도 있습니다. [자동 삭제](https://bitwarden.com/help/send-lifespan) 기능 또한 지원합니다. 파일 공유 기능은 [프리미엄 요금제](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans)에만 제공됩니다. 무료 플랜은 텍스트 공유만 가능합니다. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password 로고](assets/img/password-management/1password.svg){ align=right } -**1Password**는 보안과 사용 편의성에 중점을 둔 비밀번호 관리자입니다. 비밀번호, 카드, 소프트웨어 라이선스를 비롯한 민감한 정보를 안전한 디지털 보관함에 저장 가능합니다. 보관함은 [월 사용료](https://1password.com/sign-up/)를 지불하여 1Password 서버에서 호스팅됩니다. 1Password는 정기적으로 [보안 감사](https://support.1password.com/security-assessments/)를 받고 있으며, 우수한 고객 지원을 제공합니다. 1Password는 오픈 소스가 아니지만, 제품의 보안은 [보안 백서](https://1passwordstatic.com/files/security/1password-white-paper.pdf)에 철저하게 문서화되어 있습니다. +**1Password**는 보안과 사용 편의성에 중점을 둔 비밀번호 관리자입니다. 비밀번호, 카드, 소프트웨어 라이선스를 비롯한 민감한 정보를 안전한 디지털 보관함에 저장 가능합니다. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password는 오픈 소스가 아니지만, 제품의 보안은 [보안 백서](https://1passwordstatic.com/files/security/1password-white-paper.pdf)에 철저하게 문서화되어 있습니다. -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ Bitwarden 대비 1Password 장점 중 하나는 네이티브 클라이언트 지 Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ Privacy Guides 팀은 사이트의 모든 항목마다 명확한 평가 기준 [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC는 데이터 내보내기 시 [CSV](https://en.wikipedia.org/wiki/Comm **KeePassDX**는 Android용 가벼운 비밀번호 관리자입니다. 암호화된 데이터를 KeePass 형식 단일 파일로 편집할 수 있으며, 안전한 방식으로 입력 항목을 채울 수 있습니다. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro)를 결제하면 프로젝트 개발에 큰 도움을 주는 동시에, 추가 디자인 테마 및 비표준 프로토콜 기능을 사용할 수 있습니다. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC는 데이터 내보내기 시 [CSV](https://en.wikipedia.org/wiki/Comm ![Strongbox 로고](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox**는 iOS, macOS용 네이티브 오픈 소스 비밀번호 관리자입니다. KeePass, Password Safe 형식을 지원하므로, Apple 외 플랫폼에서는 KeePassXC 등의 다른 비밀번호 관리자와 함께 사용할 수 있습니다. Strongbox는 [부분 유료화](https://strongboxsafe.com/pricing/) 모델을 채택하고 있습니다. 무료 플랜에서도 대부분의 기능을 제공하나, 생체 인증 등 [편의 기능](https://strongboxsafe.com/comparison/)은 구독/영구 플랜에만 제공됩니다. +**Strongbox**는 iOS, macOS용 네이티브 오픈 소스 비밀번호 관리자입니다. KeePass, Password Safe 형식을 지원하므로, Apple 외 플랫폼에서는 KeePassXC 등의 다른 비밀번호 관리자와 함께 사용할 수 있습니다. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-[Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638)라는 오프라인 전용 버전 또한 제공됩니다. 해당 버전은 공격 표면을 최소화하기 위해 만들어졌습니다. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). 해당 버전은 공격 표면을 최소화하기 위해 만들어졌습니다. ### 커맨드라인 @@ -356,7 +356,7 @@ KeePassXC는 데이터 내보내기 시 [CSV](https://en.wikipedia.org/wiki/Comm **gopass**는 Go 언어로 작성된 커맨드라인용 비밀번호 관리자입니다. 모든 주요 데스크톱 및 서버 운영 체제(Linux, macOS, BSD, Windows)에서 작동합니다. -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ KeePassXC는 데이터 내보내기 시 [CSV](https://en.wikipedia.org/wiki/Comm
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/ko/photo-management.md b/i18n/ko/photo-management.md index 39341e7a..47d37343 100644 --- a/i18n/ko/photo-management.md +++ b/i18n/ko/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/ko/productivity.md b/i18n/ko/productivity.md index eb369229..8ad20d37 100644 --- a/i18n/ko/productivity.md +++ b/i18n/ko/productivity.md @@ -19,9 +19,9 @@ cover: productivity.webp [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -52,11 +52,11 @@ Privacy Guides는 Nextcloud용 [E2EE 앱](https://apps.nextcloud.com/apps/end_to **CryptPad**는 보편적으로 쓰이는 오피스 툴의 프라이버시 중심 대체제입니다. CryptPad 웹 서비스의 모든 콘텐츠는 종단 간 암호화되며, 다른 사용자와의 공유도 간편합니다. -[:octicons-home-16: 홈페이지](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="프라이버시 정책" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=문서} -[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=기부 } +[:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute }
@@ -99,20 +99,20 @@ Privacy Guides 팀은 사이트의 모든 항목마다 명확한 평가 기준 **LibreOffice**는 다양한 기능을 갖춘 무료 오픈 소스 오피스 프로그램 제품군입니다. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Privacy Guides 팀은 사이트의 모든 항목마다 명확한 평가 기준 **OnlyOffice**는 클라우드 기반 무료 오픈 소스 오피스 프로그램 제품군입니다. Nextcloud 연동 등 다양한 기능을 제공합니다. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Privacy Guides 팀은 사이트의 모든 항목마다 명확한 평가 기준 - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -175,10 +175,10 @@ Privacy Guides 팀은 사이트의 모든 항목마다 명확한 평가 기준 **PrivateBin**은 서버에 어떠한 정보도 공유되지 않는 미니멀한 오픈 소스 온라인 텍스트 공유 서비스입니다. 데이터는 브라우저에서 AES-256으로 암호화/복호화됩니다. ZeroBin을 개선한 버전의 서비스이기도 합니다. -[:octicons-home-16: 홈페이지](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="공개 인스턴스"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=문서} -[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="소스 코드" } +[:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
diff --git a/i18n/ko/real-time-communication.md b/i18n/ko/real-time-communication.md index a215d052..91c81a8c 100644 --- a/i18n/ko/real-time-communication.md +++ b/i18n/ko/real-time-communication.md @@ -22,18 +22,18 @@ cover: real-time-communication.webp **Signal**은 Signal Messenger LLC에서 개발한 모바일 앱입니다. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. 개인 프로필 또한 암호화되어 여러분이 대화하는 상대에게만 공유됩니다. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. 메타데이터를 최소화하는 [Sealed Sender](https://signal.org/blog/sealed-sender/) 기능도 존재합니다. 해당 기능을 사용할 경우, 발신자 주소는 메시지 본문과 함께 암호화되어 서버에서는 수신자 주소만 볼 수 있습니다. Sealed Sender는 연락처 목록에 있는 사람들에게만 활성화되지만, 스팸 수신 위험성이 높아짐에 따라 모든 수신자에게 활성화하는 것도 가능합니다. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. 개인 프로필 또한 암호화되어 여러분이 대화하는 상대에게만 공유됩니다. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. 해당 기능을 사용할 경우, 발신자 주소는 메시지 본문과 함께 암호화되어 서버에서는 수신자 주소만 볼 수 있습니다. Sealed Sender는 연락처 목록에 있는 사람들에게만 활성화되지만, 스팸 수신 위험성이 높아짐에 따라 모든 수신자에게 활성화하는 것도 가능합니다. -Signal 프로토콜은 2016년에 독립적으로 [감사를 받았습니다](https://eprint.iacr.org/2016/1013.pdf). Signal 프로토콜 사양은 [문서](https://signal.org/docs/)에서 확인할 수 있습니다. +Signal 프로토콜은 2016년에 독립적으로 [감사를 받았습니다](https://eprint.iacr.org/2016/1013.pdf). The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). Signal 설치 구성 및 보안 강화 관련 도움말이 필요하신 분은 다음 내용을 참고하세요. -[Signal 설정 및 보안 강화 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal 설정 및 보안 강화 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ Signal 설치 구성 및 보안 강화 관련 도움말이 필요하신 분은 Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -96,22 +96,22 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and
-![Briar 로고](assets/img/messengers/briar.svg){ align=right } +![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar**는 Tor 네트워크를 이용해 다른 클라이언트에 연결하는 방식으로 [작동하는](https://briarproject.org/how-it-works/) 암호화 메신저입니다. 근거리에 있는 경우 Wi-Fi 혹은 Bluetooth를 통해 연결하는 것도 가능합니다. Briar 로컬 메시 모드는 인터넷을 제대로 사용할 수 없는 상황에도 유용합니다. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. 근거리에 있는 경우 Wi-Fi 혹은 Bluetooth를 통해 연결하는 것도 가능합니다. Briar 로컬 메시 모드는 인터넷을 제대로 사용할 수 없는 상황에도 유용합니다. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and Briar 연락처에 누군가를 등록하려면 서로가 모두 서로를 연락처에 추가해야 합니다. `briar://` 링크를 서로 교환하거나, (가까운 거리에 있는 경우) 연락처에서 QR 코드를 스캔하여 추가할 수 있습니다. -클라이언트 소프트웨어는 제3자로부터 [보안 감사를 받았습니다](https://briarproject.org/news/2017-beta-released-security-audit/). 메신저의 익명 라우팅 프로토콜은 마찬가지로 보안 감사가 진행된 바 있는 Tor 네트워크가 사용됩니다. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar [사양 문서](https://code.briarproject.org/briar/briar-spec)는 전체 공개되어 있습니다. @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. 비공개 대화방(초대가 필요한 대화방)에서 이루어지는 메시지 및 파일 공유는 기본적으로 E2EE가 적용되며, 일대일 음성 및 영상 통화도 마찬가지입니다. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -Matrix 프로토콜은 2016년에 독립적으로 [감사를 받았습니다](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last). Matirx 프로토콜 사양은 [문서](https://spec.matrix.org/latest/)에서 확인할 수 있습니다. The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +Matrix 프로토콜은 2016년에 독립적으로 [감사를 받았습니다](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last). The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ Matrix 프로토콜은 2016년에 독립적으로 [감사를 받았습니다](ht **Session**는 비공개, 보안, 익명 대화에 중점을 둔 탈중앙화 메신저입니다. Session은 개인 메시지, 그룹 채팅, 음성 통화를 지원합니다. -Session은 탈중앙화된 [Oxen Service Node Network](https://oxen.io/)를 이용해 메시지 저장 및 라우팅을 수행합니다. 모든 암호화 메시지는 Oxen 서비스 노드 네트워크의 노드 3개를 이용해 라우팅되므로, 특정 노드가 사용자에 대한 의미 있는 정보를 수집하는 것은 불가능에 가깝습니다. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. 모든 암호화 메시지는 Oxen 서비스 노드 네트워크의 노드 3개를 이용해 라우팅되므로, 특정 노드가 사용자에 대한 의미 있는 정보를 수집하는 것은 불가능에 가깝습니다. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/ko/router.md b/i18n/ko/router.md index 5ff444e4..808a1850 100644 --- a/i18n/ko/router.md +++ b/i18n/ko/router.md @@ -35,10 +35,10 @@ cover: router.webp **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense는 일반적으로 경계 방화벽(Perimeter Firewall), 라우터, 무선 액세스 포인트, DHCP 서버, DNS 서버, VPN 엔드포인트상에 배포됩니다. -[:octicons-home-16: 홈페이지](https://opnsense.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=문서} -[:octicons-code-16:](https://github.com/opnsense){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=기부 } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/ko/search-engines.md b/i18n/ko/search-engines.md index 65e021cb..5b7a6e63 100644 --- a/i18n/ko/search-engines.md +++ b/i18n/ko/search-engines.md @@ -10,7 +10,7 @@ cover: search-engines.webp 본 권장 목록은 각 서비스의 프라이버시 정책을 기반으로 장점을 판단하여 선정되었습니다. 실제로 해당 서비스에서 프라이버시 정책이 제대로 지켜진다는 **보장은 없습니다**. -여러분의 위협 모델에 따라, 검색 제공 업체에게 IP 노출을 원치 않을 경우에는 [VPN](vpn.md)이나 [Tor](https://www.torproject.org/)를 사용하세요. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,10 +24,10 @@ Brave Search는 포럼 게시물 같은 대화 중심 결과를 강조 표시하 기본 활성화된 [익명 사용량 지표](https://search.brave.com/help/usage-metrics)는 설정에서 비활성화 가능하므로, 비활성화 할 것을 추천드립니다. -[:octicons-home-16: 홈페이지](https://search.brave.com/){ .md-button .md-button--primary } -[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion 서비스" } -[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="프라이버시 정책" } -[:octicons-info-16:](https://search.brave.com/help){ .card-link title=문서} +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search 본사는 미국에 위치하고 있습니다. [프라이버시 정 ![DuckDuckGo 로고](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo**는 대표적인 비공개 검색 엔진 중 하나입니다. 주요 검색 기능으로는 [Bang](https://duckduckgo.com/bang) 및 다양한 [즉각적 답변(Instant Answers)](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/) 등이 있습니다. 상업용 Bing API를 이용해 대부분의 결과를 제공하지만, 즉각적 답변 및 (주요 검색 결과 외의) 기타 결과에는 [수많은 소스](https://help.duckduckgo.com/results/sources/)를 이용합니다. +**DuckDuckGo**는 대표적인 비공개 검색 엔진 중 하나입니다. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo는 Tor 브라우저의 기본 검색 엔진이며, Apple Safari 브라우저에서 사용 가능한 몇 안되는 선택지 중 하나이기도 합니다. -[:octicons-home-16: 홈페이지](https://duckduckgo.com){ .md-button .md-button--primary } -[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion 서비스" } -[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="프라이버시 정책" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=문서} +[:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation} @@ -56,7 +56,7 @@ DuckDuckGo는 Tor 브라우저의 기본 검색 엔진이며, Apple Safari 브 DuckDuckGo 본사는 미국에 위치하고 있습니다. [프라이버시 정책](https://duckduckgo.com/privacy)에 따르면 제품 개선 목적으로 검색 내용을 **기록하지만**, IP 주소 및 기타 개인 식별 정보는 기록하지 않는다고 명시되어 있습니다. -DuckDuckGo는 JavaScript 없이 사용 가능한 버전을 [두 가지](https://help.duckduckgo.com/features/non-javascript/) 제공합니다. 단, JavaScript 없이 사용 가능한 버전은 기능이 완전하지 않습니다. [Tor Onion 주소](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/)에도 [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite)나 [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html)을 추가하여 사용할 수 있습니다. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. 단, JavaScript 없이 사용 가능한 버전은 기능이 완전하지 않습니다. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -66,9 +66,9 @@ DuckDuckGo는 JavaScript 없이 사용 가능한 버전을 [두 가지](https:// **SearXNG**는 자체 호스팅 가능한 오픈 소스 메타 검색 엔진입니다. 메타 검색 엔진은 자체적으로 정보를 제공하지 않고 다른 검색 엔진의 결과를 종합합니다. SearXNG는 [SearX](https://github.com/searx/searx)로부터 포크된 프로젝트로, 활발하게 유지 관리되고 있습니다. -[:octicons-home-16: 홈페이지](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="공개 인스턴스"} -[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="소스 코드" } +[:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} +[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" } @@ -84,14 +84,14 @@ SearXNG 인스턴스를 사용하는 경우에는 해당 인스턴스의 프라
-![Startpage 로고](assets/img/search-engines/startpage.svg#only-light){ align=right } -![Startpage 로고](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } +![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } +![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage**는 [Google, Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) 검색 결과를 제공하는 것으로 유명한 비공개 검색 엔진입니다. 독특한 기능 중 하나로 '[익명 보기(Anonymous View)](https://www.startpage.com/en/anonymous-view/)'라는, 사용자 활동을 표준화해 고유 식별을 어렵게 만드는 기능이 있습니다. 이 기능은 네트워크, 브라우저 관련 [일부 속성](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details)을 감추는 데에 유용할 수 있습니다. 단, 명칭과는 다르게 해당 기능은 익명성 면에서 의존해서는 안 됩니다. 익명성이 필요한 경우에는 [Tor 브라우저](tor.md#tor-browser)를 사용하세요. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. 단, 명칭과는 다르게 해당 기능은 익명성 면에서 의존해서는 안 됩니다. 익명성이 필요한 경우에는 [Tor 브라우저](tor.md#tor-browser)를 사용하세요. -[:octicons-home-16: 홈페이지](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="프라이버시 정책" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=문서} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} @@ -104,9 +104,9 @@ Startpage는 VPN이나 Tor에서 쓰이는 IP 등 특정 IP 주소를 자주 차
-Startpage 본사는 네덜란드에 위치하고 있습니다. [프라이버시 정책](https://www.startpage.com/en/privacy-policy/)에 따르면, 운영 체제, 브라우저 유형, 언어 등 세부 정보를 기록합니다. IP 주소, 검색 쿼리 및 그 외 개인 식별 정보는 기록하지 않습니다. +Startpage 본사는 네덜란드에 위치하고 있습니다. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. IP 주소, 검색 쿼리 및 그 외 개인 식별 정보는 기록하지 않습니다. -Startpage 대주주는 System1이라는 애드테크 회사입니다. 별도의 [프라이버시 정책](https://system1.com/terms/privacy-policy)을 가지고 있으므로 문제가 되지는 않을 것으로 판단됩니다. Privacy Guides 팀은 Startpage가 System1으로부터 큰 투자를 받은 것에 대한 우려를 해소하기 위해, [2020년 Startpage측에 연락했습니다](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/). Privacy Guides 팀은 해당 답변에 납득했습니다. +Startpage 대주주는 System1이라는 애드테크 회사입니다. 별도의 [프라이버시 정책](https://system1.com/terms/privacy-policy)을 가지고 있으므로 문제가 되지는 않을 것으로 판단됩니다. The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. Privacy Guides 팀은 해당 답변에 납득했습니다. ## 평가 기준 diff --git a/i18n/ko/tools.md b/i18n/ko/tools.md index d35934ab..1d5c10a5 100644 --- a/i18n/ko/tools.md +++ b/i18n/ko/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS 제공 업체 -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [자세히 알아보기 :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/ko/tor.md b/i18n/ko/tor.md index 2835933f..2e6206b4 100644 --- a/i18n/ko/tor.md +++ b/i18n/ko/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor 브라우저 image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://ko.wikipedia.org/wiki/%ED%86%A0%EB%A5%B4_(%EB%84%A4%ED%8A%B8%EC%9B%8C%ED%81%AC) applicationCategory: 웹 브라우저 operatingSystem: @@ -27,11 +27,11 @@ schema: **Tor** 네트워크는 자원 봉사 형태로 운영되는 서버 그룹으로, 무료로 연결하여 인터넷에서 프라이버시와 보안을 향상시킬 수 있습니다. 개인 및 단체는 'Onion hidden 서비스'를 통해, 프라이버시를 침해받는 일 없이 Tor 네트워크에서 정보를 공유할 수 있습니다. Tor 트래픽은 차단 및 추적이 어렵기 때문에 검열 우회에 효과적입니다. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=홈페이지 } -[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion 서비스" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title="관련 문서"} -[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="소스 코드" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=기여하기 } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } +[:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor는 방문하려는 사이트에 직접 연결하는 방식이 아닌, 자원 봉사자가 운영하는 서버를 통해 인터넷 트래픽을 전송합니다. 이러한 방식을 통해 트래픽의 출처를 알 수 없게 만들고, 연결 경로상의 서버 또한 트래픽의 전체 경로는 볼 수 없으므로, 연결에 사용한 서버조차도 여러분의 익명성을 깨트릴 수 없습니다. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor 브라우저**는 익명성이 필요한 경우 선택해야 할 브라우저입니다. 이 브라우저는 Tor 네트워크와 브릿지에 접근할 수 있도록 해주며, 기본 보안 수준인 Standard, Safer, Safest에 따라 자동으로 구성되는 기본 설정과 확장 기능을 탑재하고 있습니다. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ Tor 브라우저에서는 **절대로** 추가 확장 프로그램을 설치하 -Tor 브라우저는 핑거프린팅 및 브라우저 설정 기반 사용자 식별을 방지하도록 설계되었습니다. 따라서, 브라우저를 기본 [보안 수준](https://tb-manual.torproject.org/security-settings/)을 벗어나는 수정을 해서는 **안 됩니다**. +Tor 브라우저는 핑거프린팅 및 브라우저 설정 기반 사용자 식별을 방지하도록 설계되었습니다. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). Tor Browser를 컴퓨터에 설치해서 연결하는 방법도 있지만, [Qubes OS](desktop.md#qubes-os)의 [Whonix](desktop.md#whonix)처럼 Tor 네트워크에 연결하기 위한 용도로 만들어진 운영 체제도 있습니다. 이러한 연결 방식은 Tor Browser를 사용하는 것보다 더 강력한 보안을 제공합니다. @@ -98,7 +98,7 @@ Tor Browser를 컴퓨터에 설치해서 연결하는 방법도 있지만, [Qube **Orbot**는 기기의 어떤 앱이든 해당 앱의 트래픽을 Tor 네트워크를 통해 라우팅하는 스마트폰용 무료 Tor VPN입니다. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ Tor Browser를 컴퓨터에 설치해서 연결하는 방법도 있지만, [Qube Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) @@ -134,7 +134,7 @@ Guardian Project [F-Droid 저장소](https://guardianproject.info/fdroid), [Goog ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ Guardian Project [F-Droid 저장소](https://guardianproject.info/fdroid), [Goog 검열을 받고 있는 사람들은 Snowflake 프록시를 사용해 Tor 네트워크에 접속할 수 있습니다. Snowflake는 Tor 릴레이나 브리지를 운영할 기술적 노하우가 없더라도 네트워크에 기여할 수 있는 좋은 방법입니다. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake는 어떤 방식으로도 여러분의 프라이버시를 침해하지 Snowflake 프록시 구동의 위험성은 매우 낮습니다. Tor 릴레이/브리지 구동(이 또한 특별히 위험하지 않습니다)보다도 훨씬 위험성이 낮습니다. 물론 여러분의 네트워크를 통해 프록시 트래픽이 전달되기 때문에, 네트워크 대역폭이 제한된 경우 등에는 여러분에게 영향을 끼칠 수 있습니다. 프록시 구동 여부를 결정하기 전에 [Snowflake 작동 방식](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home)을 이해해 두세요. -[^1]: `IsolateDestAddr` 설정은 [Tor 메일링 리스트](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html), [Whonix Stream Isolation 문서](https://www.whonix.org/wiki/Stream_Isolation)에서 논의되었으며, 두 프로젝트 모두 해당 설정은 대부분의 사람들에게 추천하지 않았습니다. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/ko/vpn.md b/i18n/ko/vpn.md index 2adca459..bcdbc7fb 100644 --- a/i18n/ko/vpn.md +++ b/i18n/ko/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. 만약 추가적인 보안이 필요하다면, 연결된 웹사이트가 HTTPS를 사용하는지 꼭 확인해야 합니다. VPN은 올바른 보안 관행을 대체할 수 없습니다. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Privacy Guides 권장 제공 업체는 암호화 사용, Monero 결제 지원, W **Proton VPN**은 VPN 분야의 강력한 경쟁자로, 2016년부터 운영되고 있습니다. Proton AG 본사는 스위스에 위치하고 있으며, 제한된 무료 플랜과 더 많은 기능을 갖춘 프리미엄 옵션을 제공합니다. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ Proton VPN has [servers in 71 countries](https://protonvpn.com/vpn-servers) [or #### :material-check:{ .pg-green } 독립 감사 여부 -2020년 1월에 Proton VPN은 SEC Consult로부터 독립 감사를 받았습니다. SEC Consult는 Proton VPN의 Windows, Android와 iOS 클라이언트에서 취약점을 찾았으며, 이 취약점들은 감사 레포트가 공개되기 전에 모두 적절히 고쳤다고 합니다. 확인된 취약점 중에서 공격자가 사용자의 기기 또는 트래픽에 원격으로 접속하는 것을 허용하는 것은 없습니다. 각 플랫폼에 대한 보고서는 [protonvpn.com](https://protonvpn.com/blog/open-source/)에서 확인할 수 있습니다. 2022년 4월에는 [또 다른 감사](https://protonvpn.com/blog/no-logs-audit/)를 받았으며, [Securitum이](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf) 관련 레포트를 작성했습니다. A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +2020년 1월에 Proton VPN은 SEC Consult로부터 독립 감사를 받았습니다. SEC Consult는 Proton VPN의 Windows, Android와 iOS 클라이언트에서 취약점을 찾았으며, 이 취약점들은 감사 레포트가 공개되기 전에 모두 적절히 고쳤다고 합니다. 확인된 취약점 중에서 공격자가 사용자의 기기 또는 트래픽에 원격으로 접속하는 것을 허용하는 것은 없습니다. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } 오픈 소스 클라이언트 @@ -84,31 +84,31 @@ Proton VPN은 신용카드, 체크카드, 페이팔 외에도 [비트코인](adv #### :material-check:{ .pg-green } WireGuard 지원 -Proton VPN은 일반적으로 WireGuard® 프로토콜을 지원합니다. [WireGuard](https://www.wireguard.com)는 최신식 [암호화](https://www.wireguard.com/protocol/)를 사용하는 최신 프로토콜입니다. 또한, WireGuard는 보다 단순하면서도 더 나은 성능을 목표로 합니다. +Proton VPN은 일반적으로 WireGuard® 프로토콜을 지원합니다. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). 또한, WireGuard는 보다 단순하면서도 더 나은 성능을 목표로 합니다. -Proton VPN은 자신들의 서비스에서 WireGuard 사용을 [권장](https://protonvpn.com/blog/wireguard/)합니다. WireGuard 프로토콜은 Windows, macOS, iOS, Android, ChromeOS, Android TV의 Proton VPN 앱에서는 기본으로 설정되어 있지만, Linux 앱에서는 [지원되지 않습니다](https://protonvpn.com/support/how-to-change-vpn-protocols/). +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } 원격 포트 포워딩 -Proton VPN은 현재 NAT-PMP를 통한 임시적인 원격 [포트포워딩](https://protonvpn.com/support/port-forwarding/)만을 허용하며, 이는 60초동안 유지됩니다. Windows 앱은 쉽게 접근할 수 있는 옵션을 제공하지만, 다른 운영체제의 경우에는 직접 [NAT-PMP 클라이언트](https://protonvpn.com/support/port-forwarding-manual-setup/)를 실행해야 합니다. 토렌트 애플리케이션은 대부분 NAT-PMP를 지원합니다. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). 토렌트 애플리케이션은 대부분 NAT-PMP를 지원합니다. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } 모바일 클라이언트 -Proton VPN은 표준 OpenVPN 설정 파일 외에도, 간편하게 Proton VPN 서버와 연결 가능한 모바일 클라이언트를 [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), [GitHub](https://github.com/ProtonVPN/android-app/releases)에서 제공하고 있습니다. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } 추가 기능 -Proton VPN 클라이언트는 Linux를 제외한 모든 플랫폼에서 2단계 인증을 지원합니다. Proton VPN은 스위스, 아이슬란드와 스웨덴에 자체 서버와 데이터 센터를 보유하고 있습니다. They offer content blocking and known-malware blocking with their DNS service. 추가적으로, Proton VPN은 onion 사이트를 쉽게 접속할 수 있도록 "Tor" 서버를 제공하지만, 이런 목적으로는 [공식 토르 브라우저](https://www.torproject.org/)를 사용하는 것을 추천합니다. +Proton VPN 클라이언트는 Linux를 제외한 모든 플랫폼에서 2단계 인증을 지원합니다. Proton VPN은 스위스, 아이슬란드와 스웨덴에 자체 서버와 데이터 센터를 보유하고 있습니다. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Intel 기반 Mac에서의 킬스위치 문제 -Intel 기반 Mac에서 VPN 킬스위치 기능을 사용할 경우 시스템 크래시가 [발생할 수 있습니다](https://protonvpn.com/support/macos-t2-chip-kill-switch/). 만약 이 기능이 필요하지만 Intel 기반 Mac을 사용하고 있다면, 다른 VPN 서비스를 사용하는 것을 추천합니다. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. 만약 이 기능이 필요하지만 Intel 기반 Mac을 사용하고 있다면, 다른 VPN 서비스를 사용하는 것을 추천합니다. ### IVPN @@ -118,9 +118,9 @@ Intel 기반 Mac에서 VPN 킬스위치 기능을 사용할 경우 시스템 크 **IVPN**은 유료 VPN 서비스 제공 업체입니다. 2009년부터 운영되었습니다. IVPN 본사는 지브롤터에 위치하고 있습니다. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ Intel 기반 Mac에서 VPN 킬스위치 기능을 사용할 경우 시스템 크 - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ Intel 기반 Mac에서 VPN 킬스위치 기능을 사용할 경우 시스템 크 #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. 목적지까지의 경로가 더 짧기(Hop 횟수가 적기) 때문입니다. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. 목적지까지의 경로가 더 짧기(Hop 횟수가 적기) 때문입니다. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Pi #### :material-check:{ .pg-green } 독립 감사 여부 -IVPN은 [Cure53으로부터 감사](https://cure53.de/audit-report_ivpn.pdf)를 받아 로그가 존재하지 않는다는 IVPN의 주장이 사실임을 보였습니다. 또한, 2020년 1월에 [Cure53은 IVPN 침투 테스트 결과](https://cure53.de/summary-report_ivpn_2019.pdf)를 레포트로 작성하였습니다. IVPN은 [매년 보고서](https://www.ivpn.net/blog/independent-security-audit-concluded)를 작성하여 공개할 것이라는 계획을 발표했습니다. [2022년 4월](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/)에는 Cure53으로부터 추가적인 검토가 진행되었으며, [Cure53의 웹사이트](https://cure53.de/pentest-report_IVPN_2022.pdf)에 공개되었습니다. +IVPN은 [Cure53으로부터 감사](https://cure53.de/audit-report_ivpn.pdf)를 받아 로그가 존재하지 않는다는 IVPN의 주장이 사실임을 보였습니다. 또한, 2020년 1월에 [Cure53은 IVPN 침투 테스트 결과](https://cure53.de/summary-report_ivpn_2019.pdf)를 레포트로 작성하였습니다. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } 오픈 소스 클라이언트 -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). 소스 코드는 IVPN [GitHub](https://github.com/ivpn)에서 찾아볼 수 있습니다. +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). 소스 코드는 IVPN [GitHub](https://github.com/ivpn)에서 찾아볼 수 있습니다. #### :material-check:{ .pg-green } 현금 및 Monero 결제 가능 @@ -160,25 +160,25 @@ IVPN은 신용카드, 체크카드, 페이팔과 같은 결제 수단 외에도 #### :material-check:{ .pg-green } WireGuard 지원 -IVPN은 WireGuard® 프로토콜을 지원합니다. [WireGuard](https://www.wireguard.com)는 최신식 [암호화](https://www.wireguard.com/protocol/)를 사용하는 최신 프로토콜입니다. 또한, WireGuard는 보다 단순하면서도 더 나은 성능을 목표로 합니다. +IVPN은 WireGuard® 프로토콜을 지원합니다. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). 또한, WireGuard는 보다 단순하면서도 더 나은 성능을 목표로 합니다. -IVPN은 자신들의 서비스에서 WireGuard 사용을 [권장](https://www.ivpn.net/wireguard/)하며, 모든 IVPN 앱은 WireGuard가 기본값으로 설정되어 있습니다. WireGuard [공식 앱](https://www.wireguard.com/install/)에서 사용할 수 있는 IVPN WireGuard 설정 생성기도 제공하고 있습니다. +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } 원격 포트 포워딩 -IVPN은 이전에 포트포워딩을 지원했지만, [2023년 6월](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding) 이후로 해당 기능이 삭제되었습니다. 이 기능이 없을 경우 토렌트 클라이언트와 같은 P2P 앱을 사용하는 데에 문제가 발생할 수 있습니다. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). 이 기능이 없을 경우 토렌트 클라이언트와 같은 P2P 앱을 사용하는 데에 문제가 발생할 수 있습니다. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } 모바일 클라이언트 -IVPN은 표준 OpenVPN 설정 파일 외에도, 간편하게 IVPN 서버와 연결 가능한 모바일 클라이언트를 [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), [GitHub](https://github.com/ivpn/android-app/releases)에서 제공하고 있습니다. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } 추가 기능 -IVPN 클라이언트는 이중 인증을 지원합니다(Mullvad 클라이언트는 지원하지 않습니다). 또한, IVPN은 네트워크 레벨에서 광고 네트워크 및 추적기를 차단하는 [AntiTracker](https://www.ivpn.net/antitracker)기능을 제공합니다. +IVPN 클라이언트는 이중 인증을 지원합니다(Mullvad 클라이언트는 지원하지 않습니다). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN 클라이언트는 이중 인증을 지원합니다(Mullvad 클라이언트 [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN 클라이언트는 이중 인증을 지원합니다(Mullvad 클라이언트 #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. 목적지까지의 경로가 더 짧기(Hop 횟수가 적기) 때문입니다. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. 목적지까지의 경로가 더 짧기(Hop 횟수가 적기) 때문입니다. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad의 VPN 클라이언트는 Cure53과 Assured AB의 감사를 받았으며 > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -2020년에는 두번째 감사가 [발표되었으며](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/), [최종 감사 레포트](https://cure53.de/pentest-report_mullvad_2020_v2.pdf)는 Cure53의 사이트에 공개되었습니다. +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. ... The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -2021년에는 시설 감사가 [발표되었으며](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/), [최종 감사 결과 레포트](https://cure53.de/pentest-report_mullvad_2021_v1.pdf)가 Cure53의 사이트에 공개되었습니다. [2022년 6월](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/)에 추가적인 감사가 의뢰되었으며, 해당 보고서는 [Assured의 사이트](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf)에 공개되었습니다. +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } 오픈 소스 클라이언트 @@ -239,17 +239,17 @@ Mullvad는 신용카드, 체크카드, 페이팔과 같은 결제 수단 외에 #### :material-check:{ .pg-green } WireGuard 지원 -Mullvad는 WireGuard® 프로토콜을 지원합니다. [WireGuard](https://www.wireguard.com)는 최신식 [암호화](https://www.wireguard.com/protocol/)를 사용하는 최신 프로토콜입니다. 또한, WireGuard는 보다 단순하면서도 더 나은 성능을 목표로 합니다. +Mullvad는 WireGuard® 프로토콜을 지원합니다. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). 또한, WireGuard는 보다 단순하면서도 더 나은 성능을 목표로 합니다. -Mullvad는 자신들의 서비스에서 WireGuard 사용을 [권장](https://mullvad.net/en/help/why-wireguard/)합니다. WireGuard 프로토콜은 Android, iOS, macOS, Linux의 Mullvad 앱에서는 기본으로 설정되어 있지만, Windows에서는 WireGuard 프로토콜을 [직접 활성화](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/)해야 합니다. WireGuard [공식 앱](https://www.wireguard.com/install/)에서 사용할 수 있는 Mullvad WireGuard 설정 생성기도 제공하고 있습니다. +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 지원 -Mullvad는 다른 VPN 제공자들과 달리 [IPv6에 호스팅된 서비스](https://mullvad.net/en/blog/2014/9/15/ipv6-support/)에 접속하는 것을 허용합니다. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } 원격 포트 포워딩 -Mullvad는 이전에 포트포워딩 기능을 지원했지만, [2023년 5월](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/) 이후로는 사용할 수 없습니다. 이 기능이 없을 경우 토렌트 클라이언트와 같은 P2P 앱을 사용하는 데에 문제가 발생할 수 있습니다. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). 이 기능이 없을 경우 토렌트 클라이언트와 같은 P2P 앱을 사용하는 데에 문제가 발생할 수 있습니다. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } 모바일 클라이언트 -Mullvad는 [앱 스토어](https://apps.apple.com/app/mullvad-vpn/id1488466513)와 [구글 플레이](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn)에 사용하기 쉬운 VPN 클라이언트를 제공했습니다. 안드로이드 클라이언트는 [Github](https://github.com/mullvad/mullvadvpn-app/releases)에서도 구할 수 있습니다. +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. 안드로이드 클라이언트는 [Github](https://github.com/mullvad/mullvadvpn-app/releases)에서도 구할 수 있습니다. #### :material-information-outline:{ .pg-blue } 추가 기능 -Mullvad는 자신이 [소유/임대](https://mullvad.net/en/servers/)한 노드에 대해 투명하게 공개하고 있습니다. ShadowSocks + OpenVPN 설정에 [ShadowSocks](https://shadowsocks.org/)가 있어 [심층 패킷 분석](https://en.wikipedia.org/wiki/Deep_packet_inspection)을 이용하는 방화벽을 회피할 수 있습니다. [중국은 다른 방식으로 ShadowSocks 서버를 막고 있다고 전해집니다](https://github.com/net4people/bbs/issues/22). Mullvad의 웹사이트는 Tor를 이용해서 접속할 수 있습니다. 주소는 [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion)입니다. +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. [중국은 다른 방식으로 ShadowSocks 서버를 막고 있다고 전해집니다](https://github.com/net4people/bbs/issues/22). Mullvad의 웹사이트는 Tor를 이용해서 접속할 수 있습니다. 주소는 [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion)입니다. ## 평가 기준 diff --git a/i18n/ku-IQ/CODE_OF_CONDUCT.md b/i18n/ku-IQ/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/ku-IQ/CODE_OF_CONDUCT.md +++ b/i18n/ku-IQ/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/ku-IQ/about/index.md b/i18n/ku-IQ/about/index.md index 9c3a0d47..618957d5 100644 --- a/i18n/ku-IQ/about/index.md +++ b/i18n/ku-IQ/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/ku-IQ/about/notices.md b/i18n/ku-IQ/about/notices.md index d948a76a..0ef0e6f8 100644 --- a/i18n/ku-IQ/about/notices.md +++ b/i18n/ku-IQ/about/notices.md @@ -29,7 +29,7 @@ This does not include third-party code embedded in this repository, or code wher This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* +We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ You must not conduct any systematic or automated data collection activities on o --- -*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/ku-IQ/about/privacytools.md b/i18n/ku-IQ/about/privacytools.md index 512ebb93..0c889f62 100644 --- a/i18n/ku-IQ/about/privacytools.md +++ b/i18n/ku-IQ/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/ku-IQ/advanced/communication-network-types.md b/i18n/ku-IQ/advanced/communication-network-types.md index f5a12c21..3d91223f 100644 --- a/i18n/ku-IQ/advanced/communication-network-types.md +++ b/i18n/ku-IQ/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/ku-IQ/advanced/dns-overview.md b/i18n/ku-IQ/advanced/dns-overview.md index 21889d85..2ffb67b2 100644 --- a/i18n/ku-IQ/advanced/dns-overview.md +++ b/i18n/ku-IQ/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/ku-IQ/advanced/payments.md b/i18n/ku-IQ/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/ku-IQ/advanced/payments.md +++ b/i18n/ku-IQ/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/ku-IQ/advanced/tor-overview.md b/i18n/ku-IQ/advanced/tor-overview.md index 8a6ab1ce..cc7a2fad 100644 --- a/i18n/ku-IQ/advanced/tor-overview.md +++ b/i18n/ku-IQ/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/ku-IQ/android.md b/i18n/ku-IQ/android.md index 2246c89a..b3052209 100644 --- a/i18n/ku-IQ/android.md +++ b/i18n/ku-IQ/android.md @@ -83,9 +83,9 @@ schema: **پڕۆژەی ئەندرۆیدی سەرچاوەکراوە** سیستەمی سەرچاوەکراوەی کارپێکردنی مۆبایلە کە لە لایەن گووگڵەوە بەڕێوەدەبرێت, کە زۆربەی ئامێرەکانی مۆبایل لە جیهاندا بەکاردێت. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,7 +113,7 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/ku-IQ/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/ku-IQ/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/ku-IQ/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/ku-IQ/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/ku-IQ/assets/img/how-tor-works/tor-encryption.svg b/i18n/ku-IQ/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/ku-IQ/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/ku-IQ/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/ku-IQ/assets/img/how-tor-works/tor-path-dark.svg b/i18n/ku-IQ/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/ku-IQ/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/ku-IQ/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/ku-IQ/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/ku-IQ/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/ku-IQ/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/ku-IQ/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/ku-IQ/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/ku-IQ/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/ku-IQ/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/ku-IQ/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/ku-IQ/assets/img/how-tor-works/tor-path.svg b/i18n/ku-IQ/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/ku-IQ/assets/img/how-tor-works/tor-path.svg +++ b/i18n/ku-IQ/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/ku-IQ/basics/account-deletion.md b/i18n/ku-IQ/basics/account-deletion.md index cd89ea6f..857a57d8 100644 --- a/i18n/ku-IQ/basics/account-deletion.md +++ b/i18n/ku-IQ/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/ku-IQ/basics/common-misconceptions.md b/i18n/ku-IQ/basics/common-misconceptions.md index 74650997..5aeaae95 100644 --- a/i18n/ku-IQ/basics/common-misconceptions.md +++ b/i18n/ku-IQ/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/ku-IQ/basics/common-threats.md b/i18n/ku-IQ/basics/common-threats.md index a8102469..67bd483b 100644 --- a/i18n/ku-IQ/basics/common-threats.md +++ b/i18n/ku-IQ/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacy From Service Providers @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/ku-IQ/basics/email-security.md b/i18n/ku-IQ/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/ku-IQ/basics/email-security.md +++ b/i18n/ku-IQ/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/ku-IQ/basics/multi-factor-authentication.md b/i18n/ku-IQ/basics/multi-factor-authentication.md index 75cb7e9b..92a563d7 100644 --- a/i18n/ku-IQ/basics/multi-factor-authentication.md +++ b/i18n/ku-IQ/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/ku-IQ/basics/passwords-overview.md b/i18n/ku-IQ/basics/passwords-overview.md index 63b87498..5a828342 100644 --- a/i18n/ku-IQ/basics/passwords-overview.md +++ b/i18n/ku-IQ/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/ku-IQ/basics/vpn-overview.md b/i18n/ku-IQ/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/ku-IQ/basics/vpn-overview.md +++ b/i18n/ku-IQ/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/ku-IQ/basics/why-privacy-matters.md b/i18n/ku-IQ/basics/why-privacy-matters.md index b89423e0..b48c26e5 100644 --- a/i18n/ku-IQ/basics/why-privacy-matters.md +++ b/i18n/ku-IQ/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/ku-IQ/calendar.md b/i18n/ku-IQ/calendar.md index fd26697b..8390538c 100644 --- a/i18n/ku-IQ/calendar.md +++ b/i18n/ku-IQ/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/ku-IQ/cloud.md b/i18n/ku-IQ/cloud.md index 34b98b3d..166e2dd6 100644 --- a/i18n/ku-IQ/cloud.md +++ b/i18n/ku-IQ/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/ku-IQ/cryptocurrency.md b/i18n/ku-IQ/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/ku-IQ/cryptocurrency.md +++ b/i18n/ku-IQ/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/ku-IQ/data-redaction.md b/i18n/ku-IQ/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/ku-IQ/data-redaction.md +++ b/i18n/ku-IQ/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/ku-IQ/desktop-browsers.md b/i18n/ku-IQ/desktop-browsers.md index 65743bb4..90f25c19 100644 --- a/i18n/ku-IQ/desktop-browsers.md +++ b/i18n/ku-IQ/desktop-browsers.md @@ -70,8 +70,8 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ We are working on establishing defined criteria for every section of our site, a - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -462,4 +462,4 @@ Our best-case criteria represents what we would like to see from the perfect pro - Must directly impact user privacy, i.e. must not simply provide information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/ku-IQ/desktop.md b/i18n/ku-IQ/desktop.md index 5252084a..1fac706b 100644 --- a/i18n/ku-IQ/desktop.md +++ b/i18n/ku-IQ/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/ku-IQ/device-integrity.md b/i18n/ku-IQ/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/ku-IQ/device-integrity.md +++ b/i18n/ku-IQ/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/ku-IQ/dns.md b/i18n/ku-IQ/dns.md index e151a0a8..e2b55971 100644 --- a/i18n/ku-IQ/dns.md +++ b/i18n/ku-IQ/dns.md @@ -11,14 +11,14 @@ DNSـی شفرکراو تەنها دەبێت بەکار بهێنرێت لەگە ## دابینکەرانی پێشنیارکراو -| دابینکەری DNS | سیاسەتی تایبەتێتـی | پڕۆتۆکۆڵەکان | هەڵگرتنی تۆمار | ECS | پاڵاوتن | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------------ | -------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | هەندێک[^1] | Yes | Based on personal configuration. لیستی پاڵاوتنی بەکارهێنراو لێرە دەدۆزرێتەوە. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH
DoT | هەندێک[^2] | نەخێر | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | ئارەزوومەندانە[^3] | نەخێر | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | نەخێر[^4] | نەخێر | Based on personal configuration. لیستی پاڵاوتنی بەکارهێنراو لێرە دەدۆزرێتەوە. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | ئارەزوومەندانە[^5] | ئارەزوومەندانە | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | هەندێک[^6] | ئارەزوومەندانە | Based on personal configuration, Malware blocking by default. | +| دابینکەری DNS | سیاسەتی تایبەتێتـی | پڕۆتۆکۆڵەکان | هەڵگرتنی تۆمار | ECS | پاڵاوتن | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------------ | -------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | هەندێک[^1] | Yes | Based on personal configuration. لیستی پاڵاوتنی بەکارهێنراو لێرە دەدۆزرێتەوە. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH
DoT | هەندێک[^2] | نەخێر | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | ئارەزوومەندانە[^3] | نەخێر | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | نەخێر[^4] | نەخێر | Based on personal configuration. لیستی پاڵاوتنی بەکارهێنراو لێرە دەدۆزرێتەوە. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | ئارەزوومەندانە[^5] | ئارەزوومەندانە | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | هەندێک[^6] | ئارەزوومەندانە | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ DNSـی شفرکراو تەنها دەبێت بەکار بهێنرێت لەگە #### پرۆفایلە واژۆکراوەکان -Apple ڕووکارێکی بنەچەیی دابین ناکات بۆ دروستکردنی پرۆفایلی DNSـی شفرەکراو. [ دروستکەری پرۆفایلی DNSـی پارێزراو](https://dns.notjakob.com/tool.html) ئامرازێکی نافەرمییە بۆ دروستکردنی پرۆفایلی DNSـی شفرەکراوی تایبەت بەخۆت، بەڵام هەرچۆنێک بێت ئەوان واژۆ ناکرێن. پرۆڤایلی واژۆکراو پەسندن؛ واژۆکە سەرچاوەی پرۆفایلەکە ڕوون دەکاتەوە و یارمەتیدەرە بۆ دڵنیابوون لە ڕاستی پرۆفایلەکان. نیشانەیەکی "پشتڕاستکراو" بە ڕەنگی سەوز دراوە بە پرۆفایلی شێوەپێدانی واژۆکراو. بۆ زانیاری زیاتر لەسەر هێمای واژۆکان، [ دەربارەی هێمای واژۆکان](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html) ببینە. ** پرۆفایلە واژۆکراوەکان ** پێشکەشکراون لەلایەن [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html)،[NextDNS](https://apple.nextdns.io)، لەگەڵ [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple ڕووکارێکی بنەچەیی دابین ناکات بۆ دروستکردنی پرۆفایلی DNSـی شفرەکراو. [ دروستکەری پرۆفایلی DNSـی پارێزراو](https://dns.notjakob.com/tool.html) ئامرازێکی نافەرمییە بۆ دروستکردنی پرۆفایلی DNSـی شفرەکراوی تایبەت بەخۆت، بەڵام هەرچۆنێک بێت ئەوان واژۆ ناکرێن. پرۆڤایلی واژۆکراو پەسندن؛ واژۆکە سەرچاوەی پرۆفایلەکە ڕوون دەکاتەوە و یارمەتیدەرە بۆ دڵنیابوون لە ڕاستی پرۆفایلەکان. نیشانەیەکی "پشتڕاستکراو" بە ڕەنگی سەوز دراوە بە پرۆفایلی شێوەپێدانی واژۆکراو. بۆ زانیاری زیاتر لەسەر هێمای واژۆکان، [ دەربارەی هێمای واژۆکان](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html) ببینە. **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Apple ڕووکارێکی بنەچەیی دابین ناکات بۆ دروستک [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ Apple ڕووکارێکی بنەچەیی دابین ناکات بۆ دروستک ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home**سەرچاوە-کراوەیەکی [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole)ـە، کە [پاڵاوکەری DNS](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) بەکار دێنی بۆ قەدەغەکردنی ناوەڕۆکەکانی ماڵپەڕی نەخوازراو، وەک ڕیکلامەکان. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home ڕووکارێکی ڕێک و پێک دەبەخشێتە ماڵپەرەکەی بۆ بینینی تێگەیشتنەکان و بەڕێوەنردنی ناوەڕۆکە قەدەغەکراوەکان. @@ -144,23 +144,23 @@ AdGuard Home ڕووکارێکی ڕێک و پێک دەبەخشێتە ماڵپەر ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** سەرچاوە-کراوەیەکی [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole)ـە، کە [DNS پاڵاوکەری](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) بەکاردێنێ بۆ قەدەغەکردنی ناوەڕۆکەکانی ماڵپەڕی نەخوازراو، وەک ڕیکلامەکان. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole وا دروست کراوە کە لەسەر Rasberry Pi سەرپەرشتی بکرێت ، بەڵام سنووردار نییە بۆ ئەم ڕەقەواڵەیە بە تەنها. نەرمەواڵەکە ڕووکارێکی ڕێک و پێک و ئاسان لە بەکارهێان دەبەخشێت بۆ بینینی تێگەیشتنەکان و بەڕێوەبردنی ناوەڕۆکە قەدەغەکراوەکان. -[:octicons-home-16: پەڕەی سەرەکی](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="سیاسەتی تایبەتێتی" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=دۆکیمێنتەکان} -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="سەرچاوەی کۆد" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=هاوبەشیکردن } +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
[^1]: AdGuard توانای ئەرک بەجێهێنانی ڕاژەی DNSـەکانیان کۆ دەکەنەوە، بەتایبەتی ژمارەی داواکاریە تەواوەکان بۆ ڕاژەیەکی دیاریکراو، ژمارەی داواکاریە قەدەغەکراوەکان، و خێرایی وەڵامدانەوەی داواکاریەکان. هەروەها ئەوان ئەو بنکە داتایانە هەڵدەگرن و کۆیدەکەنەوە، کە دۆمەینەکانی لێوە داواکراوە لە ماوەی 24 کاتژمێری ڕابردوو. "پێویستمان بەم زانیاریە هەیە بۆ ناسینەوە و ڕاگرتنی شوێنگران و هەڕەشە نوێیەکان" "هەروەها ئێمە تۆماری دەکەین کە چەند جار ئەم یان ئەو شوێنگرە ڕێگری لێکراوە. ئێمە پێویستمان بەم زانیاریە هەیە بۆ سڕینەوەی یاسای بەرسەرچوو لە پاڵاوتنەکانمان." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare تەنها ئەو داتایە سنووردارە کۆدەکاتەوە و هەڵیدەگرێت، کە نێردراون لایەن DNS بۆ چارەسەرکەری 1.1.1.1. خزمەتگوزاری چارەسەرکەری 1.1.1.1 داتای کەسی تۆمار ناکات، وە ئەو بەشە داتایە سنووردارە نا-کەسیە ناسراوانە تەنها بۆ ماوەی 25 کاتژمێر هەڵدەگیرێن دەکرێت. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare تەنها ئەو داتایە سنووردارە کۆدەکاتەوە و هەڵیدەگرێت، کە نێردراون لایەن DNS بۆ چارەسەرکەری 1.1.1.1. خزمەتگوزاری چارەسەرکەری 1.1.1.1 داتای کەسی تۆمار ناکات، وە ئەو بەشە داتایە سنووردارە نا-کەسیە ناسراوانە تەنها بۆ ماوەی 25 کاتژمێر هەڵدەگیرێن دەکرێت. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D تەنها داتای ناسینەوە بۆ ئەو کەسانە تۆمار دەکات کە بەژداربووی چارەسەرکانیانن، وە پرۆفایلی DNSـی تایبەتیان هەیە. چارەسەرکەرە بەخۆڕایەکان داتا تۆمار ناکەن. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: خزمەتگوزاری DNSـی Mullvad بەردەستە بۆ هەردووک لە بەکارهێنەری بەرژداربوو و نابەژداربوو. سیاسەتی تایبەتێتی ئەوان بە ڕوونی بانگەشەی ئەوە دەکات، کە بە هیچ شێوازێک داواکاریەکانی DNSـەکانیان تۆمار ناکەن. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: خزمەتگوزاری DNSـی Mullvad بەردەستە بۆ هەردووک لە بەکارهێنەری بەرژداربوو و نابەژداربوو. سیاسەتی تایبەتێتی ئەوان بە ڕوونی بانگەشەی ئەوە دەکات، کە بە هیچ شێوازێک داواکاریەکانی DNSـەکانیان تۆمار ناکەن. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. دەتوانی ماوەی هێشتنەوە هەڵبژێریت و ئەو شوێنی هەڵگرتنی تۆمارەکان دیاری بکەیت بۆ هەر جۆرێکی تۆمارەکە کە هەڵیدەبژێریت بۆ هێشتنەوە. ئەگەر بە تایبەتی داوانەکرابێت، هیچ داتایەک تۆمار ناکرێت. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 هەندێک داتا کۆ دەکاتەوە بۆ مەبەستی ئاگاداربوون لە هەڕەشە و وەڵامدانەوە. ئەو داتایە لەوانەیە دواتر دووبارە ببەسترێتەوە و هاوبەشی پێ بکرێت، بۆ مەبەستی لێکۆڵینەوەی ئاسایشی. Quad9 ناونیشانی IP یان ئەو داتایانەی تر کۆناکاتەوە و تۆماریان ناکات، کە بە داتای ناسینەوەی کەسی دادەنێرن. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 هەندێک داتا کۆ دەکاتەوە بۆ مەبەستی ئاگاداربوون لە هەڕەشە و وەڵامدانەوە. ئەو داتایە لەوانەیە دواتر دووبارە ببەسترێتەوە و هاوبەشی پێ بکرێت، بۆ مەبەستی لێکۆڵینەوەی ئاسایشی. Quad9 ناونیشانی IP یان ئەو داتایانەی تر کۆناکاتەوە و تۆماریان ناکات، کە بە داتای ناسینەوەی کەسی دادەنێرن. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/ku-IQ/email-clients.md b/i18n/ku-IQ/email-clients.md index 7434f6bb..c7051cdb 100644 --- a/i18n/ku-IQ/email-clients.md +++ b/i18n/ku-IQ/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/ku-IQ/email.md b/i18n/ku-IQ/email.md index ebd3293f..38833ced 100644 --- a/i18n/ku-IQ/email.md +++ b/i18n/ku-IQ/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail ڕاپۆرتی تێکچوونە ناوخۆییەکانی هەیە، #### :material-check:{ .pg-green } دۆمەینە تایبەتیەکان و نازناوەکان -بەژداربووانی Proton Mail دەتوانن دۆمەینی خۆیان بەکاربێنن لەگەل خزمەتگوزاریەکە یان هەموو نامەیەک بگرنەوە. هەروەها Proton Mail پشتگیری دەکات لە [ناونیشانی دووەمی](https://proton.me/support/creating-aliases)، کە بەسوودە بۆ ئەو کەسانەی نایانەوێت دۆمەین بکڕن. +بەژداربووانی Proton Mail دەتوانن دۆمەینی خۆیان بەکاربێنن لەگەل خزمەتگوزاریەکە یان هەموو نامەیەک بگرنەوە. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green }شێوازی پارەدانی نهێنی @@ -129,7 +129,7 @@ Poton Mail کرداری میراتی دیجیتاڵی پێشکەش ناکات. #### :material-check:{ .pg-green } دۆمەینە تایبەتیەکان و نازناوەکان -Mailbox.org ڕێگەت پێ دەدات دۆمەینی خۆت خۆت بەکاربێنی، وە پشتگیری لە [گرتنەوەی هەموو نامەکان](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) دەکات. هەروەها Mailbox.org پشتگیری دەکات لە [ناونیشانی دووەمی](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it)، کە بەسوودە ئەگەر ناتەوێت دۆمەین بکڕیت. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green }شێوازی پارەدانی نهێنی @@ -137,17 +137,17 @@ Mailbox.org هیچ جۆرە دراوێکی دیجیتاڵی قبوڵ ناکات #### :material-check:{ .pg-green }پارێزراوێتی هەژمار -Mailbox.org تەنها پشتگیری لە [سەلماندنی دووانی](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) بۆ ماڵپەری پۆستەی ئەلکتڕۆنییەکەیان دەکات. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). شیوازە باوەکانی وەک [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) هێشتا پشتگیری نەکراون. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). شیوازە باوەکانی وەک [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) هێشتا پشتگیری نەکراون. #### :material-information-outline:{ .pg-blue }پارێزراوێتی زانیاری -Mailbox.org ڕیگ دەدات بە شفرکردنی پۆستە هاتتووەکان بە بەکارهێنانی [سندوقی پۆستەی شفراوی](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox) ئەوان. نامە نوێکانی کە تۆ وەریدەگری ڕاستەوخۆ بە کلیلی گشتیت شفر دەکرێن. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). نامە نوێکانی کە تۆ وەریدەگری ڕاستەوخۆ بە کلیلی گشتیت شفر دەکرێن. -هەرچۆنێك بێت، [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange)، ئەو نەرمەواڵەی لەلایەن Mailbox.org بەکاردەهێندرێت, [پشتگیری ناکات](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) لە شفرەکردنی پەرتووکی ناونیشانەکانت و ڕۆژژمێرەکەت. [بژاردەیەکی سەربەخۆ](calendar.md) لەوانەیە گونجاوتر بێت بۆ ئەم زانیاریە. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. [بژاردەیەکی سەربەخۆ](calendar.md) لەوانەیە گونجاوتر بێت بۆ ئەم زانیاریە. #### :material-check:{ .pg-green } شفرکردنی پۆستەی ئەلکتڕۆنی -Mailbox.org [شفرکردنی OpenPGP زیادکردووە](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) لە ماڵپەری پۆستەی ئەلکتڕۆنییەکەیان، کە ناردنی نامەکان ئاسان دەکات بۆ ئەو کەسانەی کلیلی گشتی OpenPGPـیـان هەیە. هەروەها [وەرگرەکان دەتوانن لە دوورەوە شفری پۆستە ئەلکتڕۆنێیەک لەببەن](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP)، کە لەسەر ڕاژەکارەکانی Mailbox.org. ئەم تایبەتمەندیە بەسوودە کاتێک وەرگر لە دوورەوە OpenPGPـی نییە و ناتوانێت شفرەکە لەسەر لەبەرگیراوەیەکی پۆستەکە لاببات لە سندووقی پۆستەکانی خۆیدا. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. ئەم تایبەتمەندیە بەسوودە کاتێک وەرگر لە دوورەوە OpenPGPـی نییە و ناتوانێت شفرەکە لەسەر لەبەرگیراوەیەکی پۆستەکە لاببات لە سندووقی پۆستەکانی خۆیدا. هەروەها Mailbox.org پشتگیری دۆزینەوەی کلیلە گشتیەکان دەکات لە HTTPــەوە لە ڕێگای [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). ئەمە ڕێگە بە کەسانی دەرەوەی Mailbox.org دەدات کە کلیلەکانی OpenPGP بۆ هەژمارەکانی Mailbox.org بە ئاسانی بدۆزنەوە، تا ببێتە هۆی گونجاندن لەگەڵ دابینکەرانی تری E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Mailbox.org [شفرکردنی OpenPGP زیادکردووە](https://kb.mailbox.o #### :material-information-outline:{ .pg-blue } کرداری زیادە -دەتوانیت هەژمێرەکەی Mailbox.org بەکاربێنی لەڕێگەی IMAP/SMTP بە بەکارهێنانی [خزمەتگوزاری ](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org)onian. هەرچۆنێک بێت، ناتوانیت لە ڕێگەی ڕووکاری ماڵپەڕی پۆستەی ئەلکتڕۆنییەکەیان خزمەتگوزاری .onian بەکاربهێنیت وە لەوانەیە ڕووبەڕووی هەڵەی بڕوانامەی TLS ببیتەوە. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). هەرچۆنێک بێت، ناتوانیت لە ڕێگەی ڕووکاری ماڵپەڕی پۆستەی ئەلکتڕۆنییەکەیان خزمەتگوزاری .onian بەکاربهێنیت وە لەوانەیە ڕووبەڕووی هەڵەی بڕوانامەی TLS ببیتەوە. -هەموو هەژمارەکانی کە هەورە کۆگایەکی سنوورداریان هەیە، [دەتوانرێت شفر بکرێن](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } دۆمەینە تایبەتیەکان و نازناوەکان -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criteria @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/ku-IQ/encryption.md b/i18n/ku-IQ/encryption.md index d774167a..aa3ee158 100644 --- a/i18n/ku-IQ/encryption.md +++ b/i18n/ku-IQ/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/ku-IQ/file-sharing.md b/i18n/ku-IQ/file-sharing.md index d7cd5832..f6732765 100644 --- a/i18n/ku-IQ/file-sharing.md +++ b/i18n/ku-IQ/file-sharing.md @@ -15,7 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/ku-IQ/financial-services.md b/i18n/ku-IQ/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/ku-IQ/financial-services.md +++ b/i18n/ku-IQ/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/ku-IQ/frontends.md b/i18n/ku-IQ/frontends.md index 01d5ea76..1769b24a 100644 --- a/i18n/ku-IQ/frontends.md +++ b/i18n/ku-IQ/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/ku-IQ/index.md b/i18n/ku-IQ/index.md index eb6ae3a7..2f880ad4 100644 --- a/i18n/ku-IQ/index.md +++ b/i18n/ku-IQ/index.md @@ -62,7 +62,7 @@ Trying to protect all your data from everyone all the time is impractical, expen ## We need you! Here's how to get involved: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } [:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } [:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } [:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } diff --git a/i18n/ku-IQ/kb-archive.md b/i18n/ku-IQ/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/ku-IQ/kb-archive.md +++ b/i18n/ku-IQ/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/ku-IQ/meta/admonitions.md b/i18n/ku-IQ/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/ku-IQ/meta/admonitions.md +++ b/i18n/ku-IQ/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/ku-IQ/meta/translations.md b/i18n/ku-IQ/meta/translations.md index 30b4c572..60261b1c 100644 --- a/i18n/ku-IQ/meta/translations.md +++ b/i18n/ku-IQ/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/ku-IQ/meta/uploading-images.md b/i18n/ku-IQ/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/ku-IQ/meta/uploading-images.md +++ b/i18n/ku-IQ/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/ku-IQ/meta/writing-style.md b/i18n/ku-IQ/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/ku-IQ/meta/writing-style.md +++ b/i18n/ku-IQ/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/ku-IQ/mobile-browsers.md b/i18n/ku-IQ/mobile-browsers.md index 57ae950f..e1875e1a 100644 --- a/i18n/ku-IQ/mobile-browsers.md +++ b/i18n/ku-IQ/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ These are our currently recommended mobile web browsers and configurations for s ## Android -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/ku-IQ/multi-factor-authentication.md b/i18n/ku-IQ/multi-factor-authentication.md index 830c33c8..ee60af63 100644 --- a/i18n/ku-IQ/multi-factor-authentication.md +++ b/i18n/ku-IQ/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/ku-IQ/news-aggregators.md b/i18n/ku-IQ/news-aggregators.md index 17438718..00b22c26 100644 --- a/i18n/ku-IQ/news-aggregators.md +++ b/i18n/ku-IQ/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/ku-IQ/notebooks.md b/i18n/ku-IQ/notebooks.md index 2131e5e0..0eb1ebef 100644 --- a/i18n/ku-IQ/notebooks.md +++ b/i18n/ku-IQ/notebooks.md @@ -34,7 +34,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ If you are currently using an application like Evernote, Google Keep, or Microso Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/ku-IQ/os/android-overview.md b/i18n/ku-IQ/os/android-overview.md index 1ffa3cdc..f866b6cb 100644 --- a/i18n/ku-IQ/os/android-overview.md +++ b/i18n/ku-IQ/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/ku-IQ/os/ios-overview.md b/i18n/ku-IQ/os/ios-overview.md index 949d360e..d2744bad 100644 --- a/i18n/ku-IQ/os/ios-overview.md +++ b/i18n/ku-IQ/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/ku-IQ/os/linux-overview.md b/i18n/ku-IQ/os/linux-overview.md index da9fa962..56db7195 100644 --- a/i18n/ku-IQ/os/linux-overview.md +++ b/i18n/ku-IQ/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/ku-IQ/os/macos-overview.md b/i18n/ku-IQ/os/macos-overview.md index 584d1acc..aa5541ea 100644 --- a/i18n/ku-IQ/os/macos-overview.md +++ b/i18n/ku-IQ/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Recommended Configuration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/ku-IQ/os/qubes-overview.md b/i18n/ku-IQ/os/qubes-overview.md index c76924d9..fcea270b 100644 --- a/i18n/ku-IQ/os/qubes-overview.md +++ b/i18n/ku-IQ/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/ku-IQ/passwords.md b/i18n/ku-IQ/passwords.md index da2b5d77..1514d105 100644 --- a/i18n/ku-IQ/passwords.md +++ b/i18n/ku-IQ/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/ku-IQ/photo-management.md b/i18n/ku-IQ/photo-management.md index a041bdcb..1bb46cae 100644 --- a/i18n/ku-IQ/photo-management.md +++ b/i18n/ku-IQ/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/ku-IQ/productivity.md b/i18n/ku-IQ/productivity.md index c63e28bb..1612e148 100644 --- a/i18n/ku-IQ/productivity.md +++ b/i18n/ku-IQ/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/ku-IQ/real-time-communication.md b/i18n/ku-IQ/real-time-communication.md index bb96b9c2..6a1f7de0 100644 --- a/i18n/ku-IQ/real-time-communication.md +++ b/i18n/ku-IQ/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/ku-IQ/router.md b/i18n/ku-IQ/router.md index 870cd79e..a54378c6 100644 --- a/i18n/ku-IQ/router.md +++ b/i18n/ku-IQ/router.md @@ -35,10 +35,10 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/ku-IQ/search-engines.md b/i18n/ku-IQ/search-engines.md index 7fc05e18..9ffdbb0b 100644 --- a/i18n/ku-IQ/search-engines.md +++ b/i18n/ku-IQ/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/ku-IQ/tools.md b/i18n/ku-IQ/tools.md index e10a0165..3c0afbab 100644 --- a/i18n/ku-IQ/tools.md +++ b/i18n/ku-IQ/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Learn more :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/ku-IQ/tor.md b/i18n/ku-IQ/tor.md index 04bc51b7..3c240ddc 100644 --- a/i18n/ku-IQ/tor.md +++ b/i18n/ku-IQ/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a -The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake does not increase your privacy in any way, nor is it used to connect t Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/ku-IQ/vpn.md b/i18n/ku-IQ/vpn.md index 7b1602eb..0eaeeb63 100644 --- a/i18n/ku-IQ/vpn.md +++ b/i18n/ku-IQ/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria diff --git a/i18n/nl/CODE_OF_CONDUCT.md b/i18n/nl/CODE_OF_CONDUCT.md index e1eed5aa..4fa40f83 100644 --- a/i18n/nl/CODE_OF_CONDUCT.md +++ b/i18n/nl/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ Wat we verwachten van leden van onze community: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Gedraag je op een positieve en constructieve manier** diff --git a/i18n/nl/about/index.md b/i18n/nl/about/index.md index 334c8260..007f8352 100644 --- a/i18n/nl/about/index.md +++ b/i18n/nl/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is een sociaal gemotiveerde website die [informatie biedt](/kb) voor de bescherming van jouw gegevens en privacy. Onze missie is om het publiek te informeren over de waarde van digitale privacy, en wereldwijde overheidsinitiatieven die erop gericht zijn jouw online activiteiten te controleren. Wij zijn een non-profit collectief dat volledig wordt beheerd door vrijwillige [teamleden](https://discuss.privacyguides.net/g/team) en bijdragers. Onze website is vrij van advertenties en niet geaffilieerd met andere aanbieders in de lijst. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } -[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Broncide" } -[:octicons-heart-16:](donate.md){ .card-link title=Bijdrage leveren } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } +[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } +[:octicons-heart-16:](donate.md){ .card-link title=Contribute } > Om [privacygerichte alternatieve] apps te vinden, kunt je kijken op sites als Good Reports en **Privacy Guides**, waar privacygerichte apps in verschillende categorieën worden genoemd, waaronder e-mailproviders (meestal tegen betaling) die niet worden beheerd door de grote techbedrijven. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > Als je op zoek bent naar een nieuwe vpn, kun je terecht bij de kortingscode van zowat iedere willekeurige podcast. Als je op zoek bent naar een **goéde** vpn, heb je professionele hulp nodig. Hetzelfde geldt voor e-mailclients, browsers, besturingssystemen en wachtwoordmanagers. Hoe weet je welke daarvan de beste, privacyvriendelijkste optie is? Daarvoor is er **Privacy Guides**, een platform waarop een aantal vrijwilligers dag in, dag uit zoekt naar de beste privacyvriendelijke tools om internet mee op te gaan. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) -Ook verschenen op: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), en [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## Geschiedenis @@ -41,7 +41,7 @@ Privacy Guides werd gelanceerd in september 2021 als voortzetting van het [verou In 2022 hebben we de overgang van ons belangrijkste websiteframework van Jekyll naar MkDocs voltooid, met behulp van de `mkdocs-material` documentatiesoftware. Deze wijziging maakte open-sourcebijdragen aan onze site aanzienlijk eenvoudiger voor buitenstaanders, omdat in plaats van ingewikkelde syntaxis te moeten kennen om berichten effectief te kunnen schrijven, bijdragen nu net zo eenvoudig is als het schrijven van een standaard Markdown-document. -Daarnaast lanceerden we ons nieuwe discussieforum op [discuss.privacyguides.net](https://discuss.privacyguides.net/) als een gemeenschapsplatform om ideeën te delen en vragen te stellen over onze missie. Dit vergroot onze bestaande community op Matrix, en vervangt ons vorige GitHub Discussieplatform, waardoor we minder afhankelijk worden van discussieplatformen van derden. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. Dit vergroot onze bestaande community op Matrix, en vervangt ons vorige GitHub Discussieplatform, waardoor we minder afhankelijk worden van discussieplatformen van derden. Tot nu toe hebben we in 2023 internationale vertalingen van onze website gelanceerd in [Frans](/fr/), [Hebreeuws](/he/), en [Nederlands](/nl/), met meer talen op komst, mogelijk gemaakt door ons uitstekende vertaalteam op [Crowdin](https://crowdin.com/project/privacyguides). We zijn van plan onze missie van voorlichting en educatie voort te zetten en manieren te vinden om de gevaren van een gebrek aan privacybewustzijn in het moderne digitale tijdperk en de prevalentie en schade van beveiligingsinbreuken in de technologie-industrie duidelijker te benadrukken. diff --git a/i18n/nl/about/notices.md b/i18n/nl/about/notices.md index 746aa15d..0e9d76e7 100644 --- a/i18n/nl/about/notices.md +++ b/i18n/nl/about/notices.md @@ -29,7 +29,7 @@ Dit geldt niet voor code van derden die in dit archief is opgenomen, of code waa Dit betekent dat je de menselijk leesbare inhoud in deze repository kunt gebruiken voor je eigen project, volgens de voorwaarden in de CC0 1.0 Universele tekst. U **mag de Privacy Guides branding niet** gebruiken in uw eigen project zonder uitdrukkelijke toestemming van dit project. De handelsmerken van Privacy Guides omvatten het woordmerk "Privacy Guides" en het schildlogo. De handelsmerken van Privacy Guides omvatten het woordmerk "Privacy Guides" en het schildlogo. -Wij zijn van mening dat de logo's en andere afbeeldingen in `activa` verkregen van derde leveranciers ofwel in het publieke domein zijn of **eerlijk gebruik**. In een notendop staat de juridische [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) het gebruik toe van auteursrechtelijk beschermde afbeeldingen om het onderwerp aan te duiden met het oog op openbaar commentaar. Deze logo's en andere afbeeldingen kunnen echter nog steeds onderworpen zijn aan het merkenrecht in een of meer rechtsgebieden. Alvorens deze inhoud te gebruiken, dien je zich ervan te vergewissen dat de entiteit of organisatie die eigenaar is van het handelsmerk wordt geïdentificeerd en dat je het recht hebt het te gebruiken volgens de wetten die van toepassing zijn in de omstandigheden van het door je beoogde gebruik. *Wanneer je inhoud van deze website kopieert, bent je er als enige verantwoordelijk voor dat je geen inbreuk maakt op het handelsmerk of auteursrecht van iemand anders.* +Wij zijn van mening dat de logo's en andere afbeeldingen in `activa` verkregen van derde leveranciers ofwel in het publieke domein zijn of **eerlijk gebruik**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. Deze logo's en andere afbeeldingen kunnen echter nog steeds onderworpen zijn aan het merkenrecht in een of meer rechtsgebieden. Alvorens deze inhoud te gebruiken, dien je zich ervan te vergewissen dat de entiteit of organisatie die eigenaar is van het handelsmerk wordt geïdentificeerd en dat je het recht hebt het te gebruiken volgens de wetten die van toepassing zijn in de omstandigheden van het door je beoogde gebruik. *Wanneer je inhoud van deze website kopieert, bent je er als enige verantwoordelijk voor dat je geen inbreuk maakt op het handelsmerk of auteursrecht van iemand anders.* Wanneer je bijdraagt aan onze website doe je dit onder de bovenstaande licenties, en verleen je Privacy Guides een eeuwigdurende, wereldwijde, niet-exclusieve, overdraagbare, royaltyvrije, onherroepelijke licentie met het recht om dergelijke rechten in sublicentie te geven via meerdere lagen van sublicentiehouders, om jouw bijdrage te reproduceren, te wijzigen, weer te geven, uit te voeren en te distribueren als onderdeel van ons project. @@ -47,4 +47,4 @@ Je mag geen systematische of geautomatiseerde gegevensverzamelingsactiviteiten u --- -*Delen van deze mededeling zelf zijn overgenomen van [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) op GitHub. Die bron en deze pagina zelf zijn vrijgegeven onder [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Delen van deze mededeling zelf zijn overgenomen van [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) op GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/nl/about/privacytools.md b/i18n/nl/about/privacytools.md index 01801432..fc6ab8eb 100644 --- a/i18n/nl/about/privacytools.md +++ b/i18n/nl/about/privacytools.md @@ -14,13 +14,13 @@ Na de organisatorische verhuizing keerde de oprichter van PrivacyTools terug en PrivacyTools werd in 2015 opgericht door "BurungHantu", die een bron van informatie over privacy wilde maken - nuttige hulpmiddelen na de onthullingen van Snowden. De site groeide uit tot een bloeiend open-sourceproject met [veel bijdragers](https://github.com/privacytools/privacytools.io/graphs/contributors), waarvan sommigen uiteindelijk verschillende organisatorische verantwoordelijkheden kregen, zoals het beheren van online diensten als Matrix en Mastodon, het beheren en beoordelen van wijzigingen aan de site op GitHub, het vinden van sponsors voor het project, het schrijven van blogberichten en het beheren van platforms voor sociale media zoals Twitter, enz. -Vanaf 2019 nam BurungHantu steeds meer afstand van de actieve ontwikkeling van de website en de gemeenschappen, en begon hij betalingen uit te stellen waarvoor hij verantwoordelijk was in verband met de servers die we beheerden. Om te voorkomen dat onze systeembeheerder de serverkosten uit eigen zak moet betalen, hebben we de donatiemethoden die op de site staan veranderd van BurungHantu's persoonlijke PayPal- en cryptorekeningen naar een nieuwe OpenCollective-pagina op [31 oktober 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). Dit had het bijkomende voordeel dat het onze financiën volledig transparant maakte, een waarde waarin wij sterk geloven, en fiscaal aftrekbaarheid in de Verenigde Staten, omdat ze werden beheerd door de Open Collective Foundation 501(c)3. Deze wijziging werd unaniem goedgekeurd door het team en werd niet betwist. +Vanaf 2019 nam BurungHantu steeds meer afstand van de actieve ontwikkeling van de website en de gemeenschappen, en begon hij betalingen uit te stellen waarvoor hij verantwoordelijk was in verband met de servers die we beheerden. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). Dit had het bijkomende voordeel dat het onze financiën volledig transparant maakte, een waarde waarin wij sterk geloven, en fiscaal aftrekbaarheid in de Verenigde Staten, omdat ze werden beheerd door de Open Collective Foundation 501(c)3. Deze wijziging werd unaniem goedgekeurd door het team en werd niet betwist. ## Waarom we verder zijn gegaan In 2020 werd de afwezigheid van BurungHantu veel opvallender. Op een gegeven moment moesten de naamservers van het domein worden gewijzigd in naamservers die worden beheerd door onze systeembeheerder om toekomstige verstoringen te voorkomen, en deze wijziging werd pas meer dan een maand na de eerste aanvraag voltooid. Hij verdween maandenlang uit de openbare chat en de privé chatrooms van het team op Matrix. Af en toe kwam hij even langs om wat kleine feedback te geven of beloofde hij actiever te worden, voordat hij weer verdween. -In oktober 2020 verliet de systeembeheerder van PrivacyTools (Jonah) [het project](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) vanwege deze moeilijkheden, waarbij de controle werd overgedragen aan een andere vrijwilliger die al lange tijd meewerkt. Jonah had bijna elke PrivacyTools dienst beheerd en fungeerde als de *de facto* projectleider voor website ontwikkeling in BurungHantu's afwezigheid, dus zijn vertrek was een belangrijke verandering voor de organisatie. Vanwege deze belangrijke organisatorische veranderingen beloofde BurungHantu destijds aan het overblijvende team dat hij zou terugkeren om de leiding van het project over te nemen. ==Het PrivacyTools-team heeft in de daaropvolgende maanden via verschillende communicatiemethoden contact opgenomen, maar geen reactie ontvangen.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had bijna elke PrivacyTools dienst beheerd en fungeerde als de *de facto* projectleider voor website ontwikkeling in BurungHantu's afwezigheid, dus zijn vertrek was een belangrijke verandering voor de organisatie. Vanwege deze belangrijke organisatorische veranderingen beloofde BurungHantu destijds aan het overblijvende team dat hij zou terugkeren om de leiding van het project over te nemen. ==Het PrivacyTools-team heeft in de daaropvolgende maanden via verschillende communicatiemethoden contact opgenomen, maar geen reactie ontvangen.== ## Afhankelijkheid van domeinnaam @@ -34,34 +34,25 @@ Medio 2021 nam het PrivacyTools team contact op met Jonah, die ermee instemde zi ## Gemeenschaps oproep tot actie - Eind juli 2021 hebben we -de PrivacyTools gemeenschap op de hoogte gebracht van ons voornemen om een nieuwe naam te kiezen en het project voort te zetten op een nieuw domein, dat [gekozen zal worden](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) op 2 augustus 2022. Uiteindelijk werd "Privacy Guides" gekozen, met het domein `privacyguides.org` dat Jonah al bezat voor een zijproject uit 2020 dat onontwikkeld bleef.

- - +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. Uiteindelijk werd "Privacy Guides" gekozen, met het domein `privacyguides.org` dat Jonah al bezat voor een zijproject uit 2020 dat onontwikkeld bleef. ## Controle over r/privacytoolsIO -Gelijktijdig met de lopende website problemen bij privacytools.io, werd het r/privacytoolsIO moderatieteam geconfronteerd met uitdagingen bij het beheer van de subreddit. De subreddit werd altijd grotendeels onafhankelijk van de ontwikkeling van de website beheerd, maar BurungHantu was ook de primaire moderator van de subreddit, en hij was de enige moderator die "Volledige controle"-rechten kreeg. u/trai_dep was op dat moment de enige actieve moderator, en [plaatste op 28 juni 2021 een verzoek aan de beheerders van Reddit](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) met het verzoek om de primaire moderatorpositie en volledige controleprivileges te krijgen, om zo de nodige wijzigingen in de Subreddit aan te brengen. +Gelijktijdig met de lopende website problemen bij privacytools.io, werd het r/privacytoolsIO moderatieteam geconfronteerd met uitdagingen bij het beheer van de subreddit. De subreddit werd altijd grotendeels onafhankelijk van de ontwikkeling van de website beheerd, maar BurungHantu was ook de primaire moderator van de subreddit, en hij was de enige moderator die "Volledige controle"-rechten kreeg. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit vereist dat subreddits actieve moderatoren hebben. Indien de eerste moderator gedurende een lange periode (bijvoorbeeld een jaar) inactief is, kan de positie van eerste moderator opnieuw worden toegewezen aan de volgende moderator in de rij. Om dit verzoek in te willigen, moest BurungHantu volledig afwezig zijn geweest bij alle Reddit-activiteiten gedurende een lange periode, wat consistent was met zijn gedrag op andere platforms. - - > Als je als moderator van een subreddit werd verwijderd via een Reddit-verzoek is dat omdat je gebrek aan reactie en gebrek aan activiteit de subreddit kwalificeerde voor een r/redditrequest-overplaatsing. > -> r/redditrequest is Reddit's manier om ervoor te zorgen dat gemeenschappen actieve moderators hebben en maakt deel uit van de [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). - - +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Begin van de transitie -Op 14 september 2021 hebben we [](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) het begin van onze migratie naar dit nieuwe domein aangekondigd: - - +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] wij vonden het nodig deze omschakeling eerder vroeger dan later te maken om ervoor te zorgen dat de mensen zo snel mogelijk van deze overgang op de hoogte zouden zijn. Dit geeft ons voldoende tijd om de domeinnaam, die momenteel doorverwijst naar www.privacyguides.org, te veranderen en hopelijk geeft het iedereen genoeg tijd om de verandering op te merken, bladwijzers en websites bij te werken, enz. -Deze verandering [hield in:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - www.privacytools.io omleiden naar [www.privacyguides.org](https://www.privacyguides.org). - Het archiveren van de broncode op GitHub om ons werk uit het verleden en de issue tracker te bewaren, die we bleven gebruiken voor maanden van toekomstige ontwikkeling van deze site. @@ -70,35 +61,27 @@ Deze verandering [hield in:](https://www.reddit.com/r/PrivacyGuides/comments/pnh Alles leek soepel te verlopen, en het grootste deel van onze actieve gemeenschap maakte de overstap naar ons nieuwe project, precies zoals we hoopten. - - ## Volgende gebeurtenissen -Ongeveer een week na de overgang kwam BurungHantu voor het eerst in bijna een jaar weer online, maar niemand van ons team wilde terugkeren naar PrivacyTools vanwege zijn historische onbetrouwbaarheid. In plaats van zich te verontschuldigen voor zijn langdurige afwezigheid, ging hij onmiddellijk in de aanval en positioneerde de overgang naar Privacy Guides als een aanval op hem en zijn project. Vervolgens heeft hij [veel van deze berichten verwijderd](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) toen de gemeenschap hem erop wees dat hij afwezig was geweest en het project had verlaten. +Ongeveer een week na de overgang kwam BurungHantu voor het eerst in bijna een jaar weer online, maar niemand van ons team wilde terugkeren naar PrivacyTools vanwege zijn historische onbetrouwbaarheid. In plaats van zich te verontschuldigen voor zijn langdurige afwezigheid, ging hij onmiddellijk in de aanval en positioneerde de overgang naar Privacy Guides als een aanval op hem en zijn project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. Op dit punt beweerde BurungHantu dat hij alleen verder wilde werken aan privacytools.io en vroeg ons de redirect van www.privacytools.io naar [www.privacyguides.org](https://www.privacyguides.org)te verwijderen. We hebben hem gevraagd de subdomeinen voor Matrix, Mastodon en PeerTube ten minste een paar maanden actief te houden als openbare dienst voor onze gemeenschap, zodat gebruikers op deze platforms gemakkelijk naar andere accounts kunnen migreren. Door de gefedereerde aard van de diensten die wij leverden, waren deze gebonden aan specifieke domeinnamen waardoor het zeer moeilijk (en in sommige gevallen onmogelijk) was om te migreren. -Helaas, omdat de controle over de r/privacytoolsIO-subreddit niet werd teruggegeven aan BurungHantu op zijn verzoek (meer informatie hieronder), werden die subdomeinen [begin oktober afgesneden van](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/), waardoor alle migratiemogelijkheden voor gebruikers die deze diensten nog gebruikten, werden beëindigd. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Hierna heeft BurungHantu valse beschuldigingen geuit over het stelen van donaties van het project door Jonah. BurungHantu had meer dan een jaar na het vermeende incident, en toch heeft hij nooit iemand op de hoogte gebracht tot na de migratie van de Privacy Guides. BurungHantu is herhaaldelijk door het team [en de gemeenschap](https://twitter.com/TommyTran732/status/1526153536962281474)gevraagd om bewijzen en om commentaar op de reden voor zijn stilzwijgen, maar heeft dat niet gedaan. BurungHantu maakte ook een [twitter post](https://twitter.com/privacytoolsIO/status/1510560676967710728) bewerend dat een "advocaat" hem had bereikt op Twitter en advies gaf, in een andere poging om ons te intimideren om hem de controle over onze subreddit te geven, en als onderdeel van zijn lastercampagne om het water rond de lancering van Privacy Guides te vertroebelen terwijl hij zich voordoet als een slachtoffer. - - ## PrivacyTools.io Nu Vanaf 25 september 2022 zien we de algemene plannen van BurungHantu in vervulling gaan op privacytools.io, en dat is precies de reden waarom we besloten hebben vandaag deze verklarende pagina te maken. De website die hij exploiteert lijkt een zwaar SEO-geoptimaliseerde versie te zijn van de site die hulpmiddelen aanbeveelt in ruil voor financiële compensatie. Zeer recentelijk zijn IVPN en Mullvad, twee VPN-providers die door de privacygemeenschap bijna universeel [worden aanbevolen](../vpn.md) en die bekend staan om hun stellingname tegen affiliate programma's, uit PrivacyTools verwijderd. In hun plaats? NordVPN, Surfshark, ExpressVPN, en hide.me; Gigantische VPN bedrijven met onbetrouwbare platforms en zakelijke praktijken, berucht om hun agressieve marketing en affiliate programma's. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Degenen onder ons die daadwerkelijk voor privacy vechten, vechten niet tegen elkaar en krijgen hun advies niet van de hoogste bieder. - - +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Degenen onder ons die daadwerkelijk voor privacy vechten, vechten niet tegen elkaar en krijgen hun advies niet van de hoogste bieder. ## privacyTools. io Nu - Na de lancering van [r/PrivacyGuides](https://www.reddit.com/r/privacyguides)was het onpraktisch voor u/trai_dep om beide subreddits te blijven modereren, en met de gemeenschap aan boord van de overgang, werd r/privacytoolsIO een beperkt subreddit gemaakt in een post op 1 november 2021:

- - +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] De groei van deze Sub was het resultaat van grote inspanningen, gedurende meerdere jaren, door het PrivacyGuides.org team. En door ieder van jullie. > @@ -106,38 +89,30 @@ Vanaf 25 september 2022 zien we de algemene plannen van BurungHantu in vervullin Subreddits zijn van niemand, en al helemaal niet van merkhouders. Ze horen bij hun gemeenschap, en de gemeenschap en haar moderatoren hebben besloten de verhuizing naar r/PrivacyGuides te steunen. -In de maanden daarna heeft BurungHantu gedreigd en gesmeekt om de controle over de subreddit terug te geven aan zijn account in [schending](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) van Reddit regels: - - +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Vergelding door een moderator met betrekking tot verwijderingsverzoeken is niet toegestaan. Voor een gemeenschap met vele duizenden resterende abonnees, vinden we dat het ongelooflijk respectloos zou zijn om de controle over dat enorme platform terug te geven aan de persoon die het meer dan een jaar heeft verlaten en die nu een website beheert waarvan we denken dat deze informatie van zeer lage kwaliteit biedt. Het behoud van de jaren van eerdere discussies in die gemeenschap is belangrijker voor ons, en dus hebben u/trai_dep en de rest van het subreddit moderatieteam de beslissing genomen om r/privacytoolsIO as-is te houden. - - ## OpenCollective Nu Ons fondsenwervingsplatform, OpenCollective, is een andere bron van onenigheid. Ons standpunt is dat OpenCollective door ons team is opgezet en door ons team wordt beheerd om diensten te financieren die wij momenteel exploiteren en wat PrivacyTools niet langer doet. [Wij bereikten](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) al onze donateurs over onze overstap naar Privacy Guides, en we werden unaniem gesteund door onze sponsors en gemeenschap. De fondsen in OpenCollective behoren dus toe aan Privacy Guides, ze zijn gegeven aan ons project, en niet aan de eigenaar van een bekende domeinnaam. In de aankondiging aan donateurs op 17 september 2021 boden wij donateurs die het niet eens zijn met ons standpunt een terugbetaling aan, maar niemand is op dit aanbod ingegaan: - - > Als sponsors of donateurs het niet eens zijn met of zich misleid voelen door deze recente gebeurtenissen en een terugbetaling willen aanvragen gezien deze hoogst ongebruikelijke omstandigheden, neem dan contact op met onze projectbeheerder door een e-mail te sturen naar jonah@triplebit.net. - - ## Meer lezen Dit onderwerp is uitgebreid besproken binnen onze gemeenschappen op verschillende plaatsen, en het lijkt waarschijnlijk dat de meeste mensen die deze pagina lezen al bekend zijn met de gebeurtenissen die hebben geleid tot de overgang naar Privacy Guides. Sommige van onze eerdere berichten over deze kwestie hebben mogelijk extra details die we hier voor de beknoptheid hebben weggelaten. Voor de volledigheid zijn ze hieronder gelinkt. -- [28 juni 2021 verzoek om controle van r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [27 juli 2021 aankondiging van onze intenties om te verhuizen op de PrivacyTools blog, geschreven door het team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [13 september 2021 aankondiging van het begin van onze overgang naar privacyguides op r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [28 juni 2021 verzoek om controle van r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [27 juli 2021 aankondiging van onze intenties om te verhuizen op de PrivacyTools blog, geschreven door het team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [13 september 2021 aankondiging van het begin van onze overgang naar privacyguides op r/privacytoolsIO](https://reddit.com/pnql46) - [17 sept 2021 aankondiging op OpenCollective van Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [30 september 2021 Twitter-draad met details over de meeste gebeurtenissen die nu op deze pagina worden beschreven](https://twitter.com/privacy_guides/status/1443633412800225280) -- [1 okt 2021 bericht door u/dng99 met vermelding van subdomeinfout](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [2 apr 2022 reactie van u/dng99 op beschuldigende blogpost van PrivacyTools](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [1 okt 2021 bericht door u/dng99 met vermelding van subdomeinfout](https://reddit.com/comments/pymthv/comment/hexwrps) +- [2 apr 2022 reactie van u/dng99 op beschuldigende blogpost van PrivacyTools](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [16 mei 2022 reactie door @TommyTran732 op Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post op Techlore's forum door @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/nl/advanced/communication-network-types.md b/i18n/nl/advanced/communication-network-types.md index 7f0ee06f..059dd47b 100644 --- a/i18n/nl/advanced/communication-network-types.md +++ b/i18n/nl/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Bij sommige zelf gehoste berichten diensten kun je je eigen server opzetten. Zel - Kan [beperkte controle of toegang](https://drewdevault.com/2018/08/08/Signal.html)omvatten. Dit kan dingen inhouden zoals: - Het is [verboden om clients van derden](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) aan te sluiten op het gecentraliseerde netwerk, wat zou kunnen zorgen voor meer maatwerk of een betere ervaring. Vaak gedefinieerd in de gebruiksvoorwaarden. - Slechte of geen documentatie voor externe ontwikkelaars. -- De [eigendom](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), het privacybeleid en de verrichtingen van de dienst kunnen gemakkelijk veranderen wanneer één enkele entiteit de dienst controleert, waardoor de dienst later in gevaar kan worden gebracht. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Zelf-hosting vergt inspanning en kennis van het opzetten van een dienst. ## Gefedereerde netwerken @@ -60,7 +60,7 @@ Bij zelf-hosting kunnen leden van een federatieve server leden van andere server P2P berichten diensten maken verbinding met een [gedistribueerd netwerk](https://en.wikipedia.org/wiki/Distributed_networking) van knooppunten om een bericht door te geven aan de ontvanger zonder een server van derden. -Cliënten (peers) vinden elkaar meestal via een [gedistribueerd computernetwerk](https://en.wikipedia.org/wiki/Distributed_computing). Voorbeelden hiervan zijn [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), gebruikt door [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) en [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) bijvoorbeeld. Een andere benadering is op nabijheid gebaseerde netwerken, waarbij een verbinding tot stand wordt gebracht via WiFi of Bluetooth (bijvoorbeeld Briar of het [Scuttlebutt](https://www.scuttlebutt.nz) sociale netwerkprotocol). +Cliënten (peers) vinden elkaar meestal via een [gedistribueerd computernetwerk](https://en.wikipedia.org/wiki/Distributed_computing). Voorbeelden hiervan zijn [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), gebruikt door [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) en [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) bijvoorbeeld. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Zodra een peer via een van deze methoden een route naar zijn contactpersoon heeft gevonden, wordt een rechtstreekse verbinding tussen hen tot stand gebracht. Hoewel berichten meestal versleuteld zijn, kan een waarnemer toch de locatie en de identiteit van de verzender en de ontvanger afleiden. diff --git a/i18n/nl/advanced/dns-overview.md b/i18n/nl/advanced/dns-overview.md index 7fe3e2d8..61c8bf4e 100644 --- a/i18n/nl/advanced/dns-overview.md +++ b/i18n/nl/advanced/dns-overview.md @@ -18,7 +18,7 @@ Hieronder bespreken we en geven we een tutorial om te bewijzen wat een externe w ### Onversleutelde DNS -1. Met [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (onderdeel van het [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) kunnen we de internet packet flow monitoren en opnemen. Dit commando registreert pakketten die aan de gespecificeerde regels voldoen: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. Dit commando registreert pakketten die aan de gespecificeerde regels voldoen: ```bash tshark -w /tmp/dns.pcap udp poort 53 en host 1.1.1.1 of host 8.8.8.8 @@ -39,7 +39,7 @@ Hieronder bespreken we en geven we een tutorial om te bewijzen wat een externe w nslookup privacyguides.org 8.8.8.8 ``` -3. Vervolgens willen wij [analyseren](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) de resultaten: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Versleutelde DNS kan verwijzen naar een van een aantal protocollen, waarvan de m ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is een andere methode voor het versleutelen van DNS-communicatie die is gedefinieerd in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Ondersteuning werd voor het eerst geïmplementeerd in Android 9, iOS 14, en op Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in versie 237. De laatste jaren is de voorkeur in de sector verschoven van DoT naar DoH, omdat DoT een [complex protocol is](https://dnscrypt.info/faq/) en de naleving van de RFC in de bestaande implementaties varieert. DoT werkt ook op een speciale poort 853 die gemakkelijk kan worden geblokkeerd door restrictieve firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is een andere methode voor het versleutelen van DNS-communicatie die is gedefinieerd in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT werkt ook op een speciale poort 853 die gemakkelijk kan worden geblokkeerd door restrictieve firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In dit voorbeeld zullen we vastleggen wat er gebeurt als we een DoH-verzoek doen wireshark -r /tmp/dns_doh.pcap ``` -We zien de [verbinding tot stand brengen](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) en [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) die bij elke versleutelde verbinding optreedt. Als we kijken naar de "toepassings gegevens" pakketten die volgen, bevat geen van hen het domein dat we hebben aangevraagd of het IP adres dat wordt teruggestuurd. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. Als we kijken naar de "toepassings gegevens" pakketten die volgen, bevat geen van hen het domein dat we hebben aangevraagd of het IP adres dat wordt teruggestuurd. ## Waarom **zou ik geen** versleutelde DNS gebruiken? @@ -158,9 +158,9 @@ Server Name Indication wordt meestal gebruikt wanneer een IP-adres veel websites tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -Dit betekent dat zelfs als we "Encrypted DNS" servers gebruiken, het domein waarschijnlijk zal worden onthuld via SNI. Het [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brengt het [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/) met zich mee, dat dit soort lekken voorkomt. +Dit betekent dat zelfs als we "Encrypted DNS" servers gebruiken, het domein waarschijnlijk zal worden onthuld via SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Regeringen, met name [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) en [Rusland](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), zijn al begonnen [met het blokkeren van](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) of hebben de wens geuit dit te doen. Onlangs is Rusland [begonnen met het blokkeren van buitenlandse websites](https://github.com/net4people/bbs/issues/108) die gebruik maken van de [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) norm. Dit komt doordat het [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol dat deel uitmaakt van HTTP/3 vereist dat `ClientHello` ook gecodeerd wordt. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Onlangs is Rusland [begonnen met het blokkeren van buitenlandse websites](https://github.com/net4people/bbs/issues/108) die gebruik maken van de [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) norm. Dit komt doordat het [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol dat deel uitmaakt van HTTP/3 vereist dat `ClientHello` ook gecodeerd wordt. ### Protocol voor onlinecertificaatstatus (PVOC/OCSP) @@ -289,7 +289,7 @@ Het DNSSEC-ondertekeningsproces is vergelijkbaar met iemand die een juridisch do DNSSEC implementeert een hiërarchisch digitaal ondertekeningsbeleid over alle lagen van DNS. Bijvoorbeeld, in het geval van een `privacyguides.org` lookup, zou een root DNS-server een sleutel ondertekenen voor de `.org` nameserver, en de `.org` nameserver zou dan een sleutel ondertekenen voor `privacyguides.org`'s gezaghebbende nameserver. -Aangepast uit [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) van Google en [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) van Cloudflare, beide met een licentie onder [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## Wat is QNAME-minimalisatie? diff --git a/i18n/nl/advanced/payments.md b/i18n/nl/advanced/payments.md index 9c7e071b..0e4a3260 100644 --- a/i18n/nl/advanced/payments.md +++ b/i18n/nl/advanced/payments.md @@ -9,7 +9,7 @@ Er is een reden waarom gegevens over jouw koopgedrag word beschouwd als de heili Eeuwenlang was **contant geld** de belangrijkste vorm van particuliere betaling. Cash heeft in de meeste gevallen uitstekende privacy-eigenschappen, wordt in de meeste landen algemeen geaccepteerd en is **vervangbaar**, wat betekent dat het niet uniek en volledig verwisselbaar is. -De wetgeving inzake contante betaling verschilt per land. In de Verenigde Staten is voor contante betalingen van meer dan 10.000 dollar een speciale melding aan de IRS vereist op [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). Het ontvangende bedrijf moet de naam, het adres, het beroep, de geboortedatum en het burgerservicenummer of een ander TIN van de begunstigde verifiëren (met enkele uitzonderingen). Lagere limieten zonder ID zoals $ 3.000 of minder bestaan voor uitwisselingen en geldoverdracht. Contant geld bevat ook serienummers. Deze worden bijna nooit door handelaren getraceerd, maar kunnen door rechtshandhavingsinstanties worden gebruikt bij gerichte onderzoeken. +De wetgeving inzake contante betaling verschilt per land. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). Het ontvangende bedrijf moet de naam, het adres, het beroep, de geboortedatum en het burgerservicenummer of een ander TIN van de begunstigde verifiëren (met enkele uitzonderingen). Lagere limieten zonder ID zoals $ 3.000 of minder bestaan voor uitwisselingen en geldoverdracht. Contant geld bevat ook serienummers. Deze worden bijna nooit door handelaren getraceerd, maar kunnen door rechtshandhavingsinstanties worden gebruikt bij gerichte onderzoeken. Toch is het meestal de beste optie. @@ -60,7 +60,7 @@ Er zijn een aantal cryptocurrency-projecten die beweren privacy te bieden door t - [Aanbevolen cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacymunten worden steeds kritischer bekeken door overheidsinstanties. In 2020 publiceerde [de IRS een bounty van $625.000](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) voor tools die het Bitcoin Lightning Network en/of de transactieprivacy van Monero kunnen doorbreken. Ze hebben uiteindelijk [twee bedrijven](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis en Integra Fec) samen 1,25 miljoen dollar betaald voor tools die dit pretenderen te doen (het is onbekend op welk cryptocurrency netwerk deze tools zich richten). Vanwege de geheimhouding rond tools zoals deze, is geen van deze methoden voor het traceren van cryptocurrencies onafhankelijk bevestigd.== Het is vrij waarschijnlijk dat er instrumenten bestaan die gericht onderzoek naar particuliere munttransacties ondersteunen, en dat privacymunten er alleen in slagen massasurveillance te dwarsbomen. +Privacymunten worden steeds kritischer bekeken door overheidsinstanties. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. Ze hebben uiteindelijk [twee bedrijven](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis en Integra Fec) samen 1,25 miljoen dollar betaald voor tools die dit pretenderen te doen (het is onbekend op welk cryptocurrency netwerk deze tools zich richten). Vanwege de geheimhouding rond tools zoals deze, is geen van deze methoden voor het traceren van cryptocurrencies onafhankelijk bevestigd.== Het is vrij waarschijnlijk dat er instrumenten bestaan die gericht onderzoek naar particuliere munttransacties ondersteunen, en dat privacymunten er alleen in slagen massasurveillance te dwarsbomen. ### Andere munten (Bitcoin, Ethereum, enz.) @@ -76,7 +76,7 @@ Bij cryptocurrency zijn er twee vormen van wallets: custodial wallets en noncust ### Aankoop -Het particulier verwerven van [cryptocurrencies](../cryptocurrency.md) zoals Monero kan moeilijk zijn. P2P-marktplaatsen zoals [LocalMonero](https://localmonero.co/), een platform dat handel tussen mensen vergemakkelijkt, zijn een optie die kan worden gebruikt. Als het gebruik van een exchange die KYC vereist een aanvaardbaar risico voor je is zolang latere transacties niet kunnen worden getraceerd, is een veel eenvoudigere optie om Monero te kopen op een exchange zoals [Kraken](https://kraken.com/), of Bitcoin/Litecoin te kopen van een KYC exchange die dan kan worden omgewisseld voor Monero. Vervolgens kun je de aangekochte Monero opnemen in jouw eigen, niet-vrijwillige portemonnee om vanaf dat moment privé te gebruiken. +Het particulier verwerven van [cryptocurrencies](../cryptocurrency.md) zoals Monero kan moeilijk zijn. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Vervolgens kun je de aangekochte Monero opnemen in jouw eigen, niet-vrijwillige portemonnee om vanaf dat moment privé te gebruiken. Als je voor deze route kiest, zorg er dan voor dat je Monero koopt op andere tijdstippen en in andere hoeveelheden dan waar je het zult uitgeven. Als je $5000 aan Monero koopt op een beurs en een uur later een aankoop van $5000 in Monero doet, kunnen die acties mogelijk gecorreleerd worden door een buitenstaander, ongeacht welke weg de Monero aflegde. Door aankopen te spreiden en vooraf grotere hoeveelheden Monero te kopen om later uit te geven aan meerdere kleinere transacties, kan deze valkuil worden vermeden. diff --git a/i18n/nl/advanced/tor-overview.md b/i18n/nl/advanced/tor-overview.md index f56b099d..03dc37be 100644 --- a/i18n/nl/advanced/tor-overview.md +++ b/i18n/nl/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: De entry node in jouw circuit wordt een "bewaker" of "Guard" genoemd. Het is een snel en stabiel node dat gedurende 2-3 maanden de eerste blijft in jouw circuit, ter bescherming tegen een bekende anonimiteitsdoorbrekende aanval. De rest van je circuit verandert bij elke nieuwe website die je bezoekt, en alles bij elkaar bieden deze relays de volledige privacybescherming van Tor. Voor meer informatie over de werking van guard nodes, zie deze [blogpost](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) en [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) over inloopbeveiliging. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: De entry node in jouw circuit wordt een "bewaker" of "Guard" genoemd. Het is een snel en stabiel node dat gedurende 2-3 maanden de eerste blijft in jouw circuit, ter bescherming tegen een bekende anonimiteitsdoorbrekende aanval. De rest van je circuit verandert bij elke nieuwe website die je bezoekt, en alles bij elkaar bieden deze relays de volledige privacybescherming van Tor. Voor meer informatie over de werking van guard nodes, zie deze [blogpost](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) en [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) over inloopbeveiliging. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relaysvlag: een speciale (dis-)kwalificatie van relais voor circuitposities (bijvoorbeeld "Guard", "Exit", "BadExit"), circuiteigenschappen (bijvoorbeeld "Fast", "Stable"), of rollen (bijvoorbeeld "Authority", "HSDir"), zoals toegewezen door de directory-autoriteiten en nader gedefinieerd in de specificatie van het directory-protocol. ([https://metrics.torproject.org/glossary.html/](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/nl/android.md b/i18n/nl/android.md index 1cfe7521..6e706101 100644 --- a/i18n/nl/android.md +++ b/i18n/nl/android.md @@ -83,9 +83,9 @@ schema: Het **Android Open Source Project** is een open-source mobiel besturingssysteem onder leiding van Google dat de meerderheid van de mobiele apparaten van de wereld aandrijft. De meeste telefoons die met Android worden verkocht zijn aangepast om invasieve integraties en apps zoals Google Play Services op te nemen, dus je kunt jouw privacy op jouw mobiele apparaat aanzienlijk verbeteren door de standaardinstallatie van jouw telefoon te vervangen door een versie van Android zonder deze invasieve functies. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } -[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentatie} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Broncode" } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } +[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } Dit zijn de Android-besturingssystemen, apparaten en apps die wij aanbevelen om de beveiliging en privacy van jouw mobiele apparaat te maximaliseren. aanbeveling @@ -113,19 +113,19 @@ End-of-life apparaten (zoals GrapheneOS of CalyxOS's apparaten met "uitgebreide GrapheneOS biedt extra [beveiligingsversteviging](https://en.wikipedia.org/wiki/Hardening_(computing)) en privacyverbeteringen. Het heeft een [geharde geheugentoewijzer](https://github.com/GrapheneOS/hardened_malloc), netwerk- en sensormachtigingen, en diverse andere [beveiligingskenmerken](https://grapheneos.org/features). GrapheneOS wordt ook geleverd met volledige firmware-updates en ondertekende builds, dus geverifieerd opstarten wordt volledig ondersteund. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacybeleid" } -[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentatie} -[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Broncode" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Bijdragen } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } -GrapheneOS ondersteunt [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), die draait [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) volledig sandboxed als elke andere gewone app. Dit betekent dat je kunt profiteren van de meeste Google Play-services, zoals [pushmeldingen](https://firebase.google.com/docs/cloud-messaging/), terwijl je volledige controle hebt over hun machtigingen en toegang, en terwijl je ze bevat in een specifiek [werkprofiel](os/android-overview.md#work-profile) of [gebruikersprofiel](os/android-overview.md#user-profiles) van jouw keuze. +GrapheneOS ondersteunt [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), die draait [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) volledig sandboxed als elke andere gewone app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel-telefoons zijn de enige apparaten die momenteel voldoen aan GrapheneOS's [hardware beveiligingseisen](https://grapheneos.org/faq#device-support). -[Waarom we GrapheneOS aanbevelen boven CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Waarom we GrapheneOS aanbevelen boven CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel-telefoons zijn de enige apparaten die momenteel voldoen aan Graphen ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is een soft-fork van [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. Het heeft ondertekende builds, waardoor het mogelijk is om [geverifieerde boot](https://source.android.com/security/verifiedboot) te hebben op sommige niet-Pixel apparaten. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS heeft geautomatiseerde kernel kwetsbaarheden ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), minder propriëtaire blobs, en een aangepaste [hosts](https://divested.dev/index.php?page=dnsbl) bestand. Zijn geharde WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), maakt [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) mogelijk voor alle architecturen en [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), en ontvangt out-of-band updates. DivestOS bevat ook kernelpatches van GrapheneOS en schakelt alle beschikbare kernelbeveiligingsfuncties in via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). Alle kernels nieuwer dan versie 3.4 bevatten volledige pagina [sanitization](https://lwn.net/Articles/334747/) en alle ~22 Clang-gecompileerde kernels hebben [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) ingeschakeld. +DivestOS heeft geautomatiseerde kernel kwetsbaarheden ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), minder propriëtaire blobs, en een aangepaste [hosts](https://divested.dev/index.php?page=dnsbl) bestand. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS bevat ook kernelpatches van GrapheneOS en schakelt alle beschikbare kernelbeveiligingsfuncties in via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implementeert enkele systeemhardingspatches die oorspronkelijk voor GrapheneOS zijn ontwikkeld. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 en hoger bevat GrapheneOS's per-netwerk volledige [MAC randomisatie](https://en.wikipedia.org/wiki/MAC_address#Randomization) optie, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) controle, en automatische reboot/Wi-Fi/Bluetooth [timeout opties](https://grapheneos.org/features). +DivestOS implementeert enkele systeemhardingspatches die oorspronkelijk voor GrapheneOS zijn ontwikkeld. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS gebruikt F-Droid als standaard app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. Voor andere apps gelden nog steeds onze aanbevolen methoden om ze te verkrijgen. +DivestOS gebruikt F-Droid als standaard app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. Voor andere apps gelden nog steeds onze aanbevolen methoden om ze te verkrijgen.

Warning

@@ -166,13 +166,13 @@ Wanneer je een apparaat koopt, raden wij je aan er een zo nieuw als mogelijk te Vermijd het kopen van telefoons van jouw mobiele provider. Deze hebben vaak een **vergrendelde bootloader** en bieden geen ondersteuning voor [OEM-ontgrendeling](https://source.android.com/devices/bootloader/locking_unlocking). Deze telefoonvarianten voorkomen dat je enige vorm van alternatieve Android-distributie installeert. -Wees zeer **voorzichtig** met het kopen van tweedehands telefoons van online marktplaatsen. Controleer altijd de reputatie van de verkoper. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). Er is ook een risico dat je in verband wordt gebracht met de activiteiten van de vorige eigenaar. +Wees zeer **voorzichtig** met het kopen van tweedehands telefoons van online marktplaatsen. Controleer altijd de reputatie van de verkoper. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). Er is ook een risico dat je in verband wordt gebracht met de activiteiten van de vorige eigenaar. Nog een paar tips met betrekking tot Android toestellen en compatibiliteit van het besturingssysteem: - Koop geen apparaten die het einde van hun levensduur hebben bereikt of bijna hebben bereikt, de fabrikant moet voor extra firmware-updates zorgen. - Koop geen voorgeladen LineageOS of /e/ OS telefoons of Android telefoons zonder de juiste [Verified Boot](https://source.android.com/security/verifiedboot) ondersteuning en firmware updates. Deze apparaten hebben ook geen manier om te controleren of er mee geknoeid is. -- Kortom, als een toestel of Android-distributie hier niet vermeld staat, is daar waarschijnlijk een goede reden voor. Kijk op ons [forum](https://discuss.privacyguides.net/) voor meer details! +- Kortom, als een toestel of Android-distributie hier niet vermeld staat, is daar waarschijnlijk een goede reden voor. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements zoals de Titan M2 zijn beperkter dan de Trusted Execution Enviro Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -De installatie van GrapheneOS op een Pixel telefoon is eenvoudig met hun [web installer](https://grapheneos.org/install/web). Als je zich niet op jouw gemak voelt om het zelf te doen en bereid bent om een beetje extra geld uit te geven, kijk dan eens naar de [NitroPhone](https://shop.nitrokey.com/shop). Deze zijn voorgeladen met GrapheneOS van het gerenommeerde bedrijf [Nitrokey](https://www.nitrokey.com/about). +De installatie van GrapheneOS op een Pixel telefoon is eenvoudig met hun [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. Nog een paar tips voor de aanschaf van een Google Pixel: @@ -220,14 +220,14 @@ Shelter ondersteunt het blokkeren van het zoeken naar contacten tussen profielen [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter wordt aanbevolen boven [Insular](https://secure-system.gitlab.io/Insular/) en [Island](https://github.com/oasisfeng/island) omdat het [blokkeren van contact zoeken](https://secure-system.gitlab.io/Insular/faq.html) ondersteunt. +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). Wanneer je Shelter gebruikt, stelt je jouw volledige vertrouwen in de ontwikkelaar, aangezien Shelter optreedt als [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) voor het werkprofiel en uitgebreide toegang heeft tot de gegevens die erin zijn opgeslagen. @@ -322,11 +322,11 @@ De metadata over de beeldoriëntatie worden niet gewist. Als je gps locatie insc
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -De app store van GrapheneOS is beschikbaar op [GitHub](https://github. com/GrapheneOS/Apps/releases). Het ondersteunt Android 12 en hoger en is in staat om zichzelf te updaten. De app store heeft losstaande applicaties gebouwd door het GrapheneOS project, zoals de [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), en [PDF-viewer](https://github.com/GrapheneOS/PdfViewer). Als je op zoek bent naar deze applicaties, raden wij je ten zeerste aan ze te halen uit de app-winkel van GrapheneOS in plaats van de Play Store, omdat de apps in hun winkel zijn ondertekend door de eigen handtekening van het GrapheneOS-project waar Google geen toegang toe heeft. +De app store van GrapheneOS is beschikbaar op [GitHub](https://github. com/GrapheneOS/Apps/releases). Het ondersteunt Android 12 en hoger en is in staat om zichzelf te updaten. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). Als je op zoek bent naar deze applicaties, raden wij je ten zeerste aan ze te halen uit de app-winkel van GrapheneOS in plaats van de Play Store, omdat de apps in hun winkel zijn ondertekend door de eigen handtekening van het GrapheneOS-project waar Google geen toegang toe heeft. ### Aurora Store @@ -338,7 +338,7 @@ De Google Play Store vereist een Google-account om in te loggen, wat de privacy **Aurora Store** is een Google Play Store-client waarvoor geen Google-account, Google Play Services of microG nodig is om apps te downloaden. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ Op GitLab, met [Aurora Store](#aurora-store) als voorbeeld, zou je naar zijn [pr Als u APK-bestanden downloadt om handmatig te installeren, kunt je hun handtekening verifiëren met de tool [`apksigner`](https://developer.android.com/studio/command-line/apksigner), die deel uitmaakt van Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Installeer [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download de [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ Als u APK-bestanden downloadt om handmatig te installeren, kunt je hun handteken ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. De resulterende hashes kunnen dan worden vergeleken met een andere bron. Sommige ontwikkelaars zoals Signal [tonen de vingerafdrukken](https://signal.org/android/apk/) op hun website. +5. De resulterende hashes kunnen dan worden vergeleken met een andere bron. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ Als u APK-bestanden downloadt om handmatig te installeren, kunt je hun handteken ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. De optie om repositories van derden toe te voegen en niet beperkt te zijn tot het ecosysteem van Google heeft geleid tot de populariteit. F-Droid heeft bovendien [reproduceerbare builds](https://f-droid.org/en/docs/Reproducible_Builds/) voor sommige toepassingen en zet zich in voor vrije en open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. De optie om repositories van derden toe te voegen en niet beperkt te zijn tot het ecosysteem van Google heeft geleid tot de populariteit. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Vanwege hun proces van het bouwen van apps lopen apps in de officiële F-Droid-repository vaak achter op updates. F-Droid maintainers hergebruiken ook pakket-ID's tijdens het ondertekenen van apps met hun eigen sleutels, wat niet ideaal is omdat het F-Droid team dan het ultieme vertrouwen krijgt. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. De IzzyOnDroid repository haalt builds rechtstreeks van GitHub en is het op één na beste optie naast het direct downloaden vanaf de eigen repositories van de ontwikkelaars. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. Hoewel dat logisch is (omdat het doel van die specifieke repository is om apps te hosten voordat ze worden geaccepteerd in de belangrijkste F-Droid-repository), kan het je achterlaten met geïnstalleerde apps die niet langer updates ontvangen. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. De IzzyOnDroid repository haalt builds rechtstreeks van GitHub en is het op één na beste optie naast het direct downloaden vanaf de eigen repositories van de ontwikkelaars. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. Hoewel dat logisch is (omdat het doel van die specifieke repository is om apps te hosten voordat ze worden geaccepteerd in de belangrijkste F-Droid-repository), kan het je achterlaten met geïnstalleerde apps die niet langer updates ontvangen. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In sommige zeldzame gevallen verspreidt de ontwikkelaar van een app deze alleen via F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is hier een voorbeeld van). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/nl/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/nl/assets/img/how-tor-works/tor-encryption-dark.svg index 26731ca9..0f1e0716 100644 --- a/i18n/nl/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/nl/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Jouw - - apparaat - - - - Gegevens verzenden naar een website - - - - - Gegevens ontvangen van een website - - - - - Jouw - - apparaat - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/nl/assets/img/how-tor-works/tor-encryption.svg b/i18n/nl/assets/img/how-tor-works/tor-encryption.svg index ab2c4b1e..f954fb0f 100644 --- a/i18n/nl/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/nl/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Jouw - - apparaat - - - - Gegevens verzenden naar een website - - - - - Gegevens ontvangen van een website - - - - - Jouw - - apparaat - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/nl/assets/img/how-tor-works/tor-path-dark.svg b/i18n/nl/assets/img/how-tor-works/tor-path-dark.svg index 782897a2..14320c6d 100644 --- a/i18n/nl/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/nl/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - + + + Jouw apparaat - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/nl/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/nl/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d017da25..ce51beee 100644 --- a/i18n/nl/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/nl/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Jouw - - - Apparaat - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/nl/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/nl/assets/img/how-tor-works/tor-path-hidden-service.svg index fd69a23a..8d008447 100644 --- a/i18n/nl/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/nl/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Jouw - - - Apparaat - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/nl/assets/img/how-tor-works/tor-path.svg b/i18n/nl/assets/img/how-tor-works/tor-path.svg index 200c9a5d..5241f8a3 100644 --- a/i18n/nl/assets/img/how-tor-works/tor-path.svg +++ b/i18n/nl/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/nl/basics/account-deletion.md b/i18n/nl/basics/account-deletion.md index 6ec0b198..03b22bb8 100644 --- a/i18n/nl/basics/account-deletion.md +++ b/i18n/nl/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: Het is gemakkelijk om een groot aantal internetaccounts op te bouwen, hier zijn enkele tips over hoe je jouw verzameling kunt snoeien. --- -Na verloop van tijd kan het gemakkelijk zijn om een aantal online accounts te verzamelen, waarvan je er vele misschien niet meer gebruikt. Het verwijderen van deze ongebruikte accounts is een belangrijke stap in het terugwinnen van jouw privacy, aangezien slapende accounts kwetsbaar zijn voor gegevensinbreuken. Van een datalek is sprake wanneer de beveiliging van een dienst wordt gecompromitteerd en beschermde informatie door onbevoegden wordt ingezien, doorgegeven of gestolen. Inbreuken op gegevens zijn tegenwoordig helaas al [te gewoon](https://haveibeenpwned.com/PwnedWebsites), en dus is een goede digitale hygiëne de beste manier om de impact ervan op jouw leven te minimaliseren. Het doel van deze gids is je door het vervelende proces van accountverwijdering te loodsen, vaak bemoeilijkt door [bedrieglijk ontwerp](https://www.deceptive.design/), ten voordele van uw online aanwezigheid. +Na verloop van tijd kan het gemakkelijk zijn om een aantal online accounts te verzamelen, waarvan je er vele misschien niet meer gebruikt. Het verwijderen van deze ongebruikte accounts is een belangrijke stap in het terugwinnen van jouw privacy, aangezien slapende accounts kwetsbaar zijn voor gegevensinbreuken. Van een datalek is sprake wanneer de beveiliging van een dienst wordt gecompromitteerd en beschermde informatie door onbevoegden wordt ingezien, doorgegeven of gestolen. Inbreuken op gegevens zijn tegenwoordig helaas al [te gewoon](https://haveibeenpwned.com/PwnedWebsites), en dus is een goede digitale hygiëne de beste manier om de impact ervan op jouw leven te minimaliseren. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Oude accounts vinden ### Wachtwoord Manager -Als u een wachtwoord manager hebt die je al jouw hele digitale leven gebruikt, is dit deel heel eenvoudig. Vaak hebben ze ingebouwde functionaliteit om te detecteren of jouw gegevens zijn blootgesteld bij een datalek, zoals het [Data Breach Report van Bitwarden](https://bitwarden.com/blog/have-you-been-pwned/). +Als u een wachtwoord manager hebt die je al jouw hele digitale leven gebruikt, is dit deel heel eenvoudig. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden 's Data Breach Report-functie](../assets/img/account-deletion/exposed_passwords.png)
-Zelfs als je nog nooit expliciet een wachtwoordmanager hebt gebruikt, is de kans groot dat je er een in jouw browser of op jouw telefoon hebt gebruikt zonder het te beseffen. Bijvoorbeeld: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) en [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Zelfs als je nog nooit expliciet een wachtwoordmanager hebt gebruikt, is de kans groot dat je er een in jouw browser of op jouw telefoon hebt gebruikt zonder het te beseffen. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktopplatforms hebben vaak ook een wachtwoordmanager waarmee je vergeten wachtwoorden kunt terugvinden: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Wachtwoorden](https://support.apple.com/en-us/HT211145) -- iOS [Wachtwoorden](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, die toegankelijk is via [Seahorse](https://wiki.gnome.org/Apps/Seahorse) of [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ Als de site een foutmelding geeft dat het e-mailadres niet gekoppeld is aan een ### GDPR (alleen inwoners van de EER) -Inwoners van de EER hebben aanvullende rechten met betrekking tot het wissen van gegevens, zoals gespecificeerd in [artikel 17](https://www.gdpr.org/regulation/article-17.html) van de GDPR. Als het op je van toepassing is, lees dan het privacybeleid voor een bepaalde dienst om informatie te vinden over hoe je jouw recht op wissing kunt uitoefenen. Het lezen van het privacybeleid kan belangrijk blijken, want sommige diensten hebben een optie "Account verwijderen" die alleen jouw account uitschakelt en voor echte verwijdering moet je extra actie ondernemen. Soms kan het daadwerkelijk wissen inhouden dat je een enquête invult, een e-mail stuurt naar de functionaris voor gegevensbescherming van de dienst of zelfs bewijst dat je in de EER woont. Als je van plan bent deze weg te gaan, overschrijf dan de accountgegevens van **niet** - jouw identiteit als inwoner van de EER kan vereist zijn. Merk op dat de locatie van de dienst er niet toe doet; GDPR is van toepassing op iedereen die Europese gebruikers bedient. Indien de dienst jouw recht op wissing niet respecteert, kunt je contact opnemen met jouw nationale [gegevensbeschermingsautoriteit](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) en kunt je recht hebben op een geldelijke vergoeding. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. Als het op je van toepassing is, lees dan het privacybeleid voor een bepaalde dienst om informatie te vinden over hoe je jouw recht op wissing kunt uitoefenen. Het lezen van het privacybeleid kan belangrijk blijken, want sommige diensten hebben een optie "Account verwijderen" die alleen jouw account uitschakelt en voor echte verwijdering moet je extra actie ondernemen. Soms kan het daadwerkelijk wissen inhouden dat je een enquête invult, een e-mail stuurt naar de functionaris voor gegevensbescherming van de dienst of zelfs bewijst dat je in de EER woont. Als je van plan bent deze weg te gaan, overschrijf dan de accountgegevens van **niet** - jouw identiteit als inwoner van de EER kan vereist zijn. Merk op dat de locatie van de dienst er niet toe doet; GDPR is van toepassing op iedereen die Europese gebruikers bedient. Indien de dienst jouw recht op wissing niet respecteert, kunt je contact opnemen met jouw nationale [gegevensbeschermingsautoriteit](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) en kunt je recht hebben op een geldelijke vergoeding. ### Overschrijven van account informatie @@ -59,4 +59,4 @@ Zelfs wanneer je een account kunt verwijderen, is er geen garantie dat al jouw i ## Vermijd nieuwe accounts -Zoals het oude gezegde luidt: "Voorkomen is beter dan genezen." Telkens wanneer je in de verleiding komt om een nieuwe account aan te maken, vraag jezelf dan af: "Heb ik dit echt nodig? Kan ik doen wat ik moet doen zonder een account?" Het kan vaak veel moeilijker zijn om een account te verwijderen dan om er een aan te maken. En zelfs na het verwijderen of wijzigen van de info op jouw account, kan er een cache-versie van een derde partij zijn, zoals het [Internet Archive](https://archive.org/). Vermijd de verleiding als je kunt. Je toekomstige ik zal je dankbaar zijn! +Zoals het oude gezegde luidt: "Voorkomen is beter dan genezen." Telkens wanneer je in de verleiding komt om een nieuwe account aan te maken, vraag jezelf dan af: "Heb ik dit echt nodig? Kan ik doen wat ik moet doen zonder een account?" Het kan vaak veel moeilijker zijn om een account te verwijderen dan om er een aan te maken. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Vermijd de verleiding als je kunt. Je toekomstige ik zal je dankbaar zijn! diff --git a/i18n/nl/basics/common-misconceptions.md b/i18n/nl/basics/common-misconceptions.md index 5aed57be..b4576d0d 100644 --- a/i18n/nl/basics/common-misconceptions.md +++ b/i18n/nl/basics/common-misconceptions.md @@ -88,7 +88,7 @@ Wanneer je online winkelt, kan het gebruik van een [pakketkluis](https://en.wiki 2. **Onbekende identiteit** - Een onbekende identiteit kan een stabiel pseudoniem zijn dat je regelmatig gebruikt. Het is niet anoniem omdat het niet verandert. Als je deel uitmaakt van een online gemeenschap, wilt je misschien een identiteit behouden dat anderen kennen. Dit pseudoniem is niet anoniem omdat - indien lang genoeg gevolgd - details over de eigenaar verdere informatie kunnen onthullen, zoals de manier waarop hij of zij schrijft, algemene kennis over interessante onderwerpen, enz. -Je kunt hiervoor eventueel een VPN gebruiken om jouw IP-adres te maskeren. Financiële transacties zijn moeilijker te maskeren: je kunt hier overwegen anonieme crypto valuta te gebruiken, zoals [Monero](https://www.getmonero.org/). Het gebruik van altcoin-shifting kan ook helpen om te verbergen waar jouw valuta vandaan komt. Doorgaans vereisen exchanges dat KYC (know your customer/ ken jouw klant) wordt ingevuld voordat zij u toestaan fiat valuta zoals euro's en dollars om te wisselen in een of andere crypto valuta. Lokale meet-ups kunnen ook een oplossing zijn; deze zijn echter vaak duurder en vereisen soms ook KYC. +Je kunt hiervoor eventueel een VPN gebruiken om jouw IP-adres te maskeren. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Het gebruik van altcoin-shifting kan ook helpen om te verbergen waar jouw valuta vandaan komt. Doorgaans vereisen exchanges dat KYC (know your customer/ ken jouw klant) wordt ingevuld voordat zij u toestaan fiat valuta zoals euro's en dollars om te wisselen in een of andere crypto valuta. Lokale meet-ups kunnen ook een oplossing zijn; deze zijn echter vaak duurder en vereisen soms ook KYC. 3. **Anonieme identiteit** - zelfs met ervaring, anonieme identiteiten zijn moeilijk te behouden voor lange perioden. Deze identiteiten horen een korte levensduur te hebben, en dienen regelmatig gerouleerd te worden. diff --git a/i18n/nl/basics/common-threats.md b/i18n/nl/basics/common-threats.md index 8843d4f9..563b1144 100644 --- a/i18n/nl/basics/common-threats.md +++ b/i18n/nl/basics/common-threats.md @@ -55,7 +55,7 @@ Gerichte aanvallen tegen een specifieke gebruiker zijn moeilijker aan te pakken. -Als je zich zorgen maakt over **fysieke aanvallen** moet je een besturingssysteem gebruiken met een veilige geverifieerde opstartimplementatie, zoals Android, iOS, macOS, [Windows (met TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). Je moet er ook voor zorgen dat jouw schijf versleuteld is, en dat het besturingssysteem een TPM of Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) of [Element](https://developers.google.com/android/security/android-ready-se) gebruikt voor het beperken van de snelheid waarmee pogingen worden gedaan om de wachtwoordzin voor de versleuteling in te voeren. Je moet voorkomen dat je jouw computer deelt met mensen die je niet vertrouwt, omdat de meeste desktopbesturingssystemen gegevens niet afzonderlijk per gebruiker versleutelen. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). Je moet er ook voor zorgen dat jouw schijf versleuteld is, en dat het besturingssysteem een TPM of Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) of [Element](https://developers.google.com/android/security/android-ready-se) gebruikt voor het beperken van de snelheid waarmee pogingen worden gedaan om de wachtwoordzin voor de versleuteling in te voeren. Je moet voorkomen dat je jouw computer deelt met mensen die je niet vertrouwt, omdat de meeste desktopbesturingssystemen gegevens niet afzonderlijk per gebruiker versleutelen. ## Privacy van dienstverleners @@ -89,16 +89,16 @@ Massasurveillance is een poging om een groot deel van of een gehele bevolking te

Atlas of Surveillance

-Als je meer wilt weten over bewakingsmethoden en hoe die in jouw stad worden toegepast, kunt je ook de [Atlas of Surveillance](https://atlasofsurveillance.org/) van de [Electronic Frontier Foundation](https://www.eff.org/) bekijken. +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Regeringen rechtvaardigen massasurveillanceprogramma's vaak als noodzakelijke middelen om terrorisme te bestrijden en misdaad te voorkomen. Het schendt echter de mensenrechten en wordt meestal gebruikt om zich buitenproportioneel te richten op onder andere minderheidsgroepen en politieke dissidenten.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

Het omzeilen van de censuur zelf is betrekkelijk eenvoudig, maar het feit dat je het censuursysteem omzeilt voor de censoren kan zeer problematisch zijn. Je moet nagaan welke aspecten van het netwerk jouw tegenstander kan waarnemen, en of je jouw acties kunt ontkennen. @@ -144,7 +144,7 @@ Censuur op bedrijfsplatforms komt steeds vaker voor nu platforms als Twitter en Censuur online kan (in verschillende mate) worden uitgeoefend door actoren zoals totalitaire regeringen, netwerkbeheerders en dienstverleners. Deze pogingen om de communicatie te controleren en de toegang tot informatie te beperken zullen altijd onverenigbaar zijn met het mensenrecht op vrijheid van meningsuiting.[^5] -Censuur op bedrijfsplatforms komt steeds vaker voor, nu platforms als Twitter en Facebook toegeven aan de vraag van het publiek, de druk van de markt en de druk van overheidsinstanties. Overheidsdruk kan bestaan uit heimelijke verzoeken aan bedrijven, zoals het verzoek van het Witte Huis [om een provocerende YouTube-video uit de lucht te halen ](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html), of uit openlijke, zoals de Chinese regering die van bedrijven eist dat zij zich houden aan een streng censuurregime. +Censuur op bedrijfsplatforms komt steeds vaker voor, nu platforms als Twitter en Facebook toegeven aan de vraag van het publiek, de druk van de markt en de druk van overheidsinstanties. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. Mensen die bezorgd zijn over de dreiging van censuur kunnen technologieën als [Tor](../advanced/tor-overview.md) gebruiken om die te omzeilen, en steun verlenen aan censuurbestendige communicatieplatforms als [Matrix](../real-time-communication.md#element), dat geen gecentraliseerde accountautoriteit heeft die willekeurig accounts kan sluiten. @@ -162,5 +162,5 @@ Je moet altijd rekening houden met de risico 's van het proberen om censuur te o [^1]: United States Privacy and Civil Liberties Oversight Board: [Rapport over het telefoongegevens programma, uitgevoerd onder Section 215](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^2]: Wikipedia: [Surveillance kapitalisme](https://en.wikipedia.org/wiki/Surveillance_capitalism) [^3]: Wikipedia: [*Surveillancekapitalisme*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Je moet ook andere mitigatietechnieken gebruiken. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Je moet ook andere mitigatietechnieken gebruiken. [^5]: Verenigde Naties: [*Universele Verklaring van de Rechten van de Mens*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/nl/basics/email-security.md b/i18n/nl/basics/email-security.md index 038d4a56..d8b65bf1 100644 --- a/i18n/nl/basics/email-security.md +++ b/i18n/nl/basics/email-security.md @@ -13,7 +13,7 @@ Als gevolg hiervan wordt e-mail het beste gebruikt voor het ontvangen van transa De standaardmanier om E2EE toe te voegen aan e-mails tussen verschillende e-mailproviders is door OpenPGP te gebruiken. Er zijn verschillende implementaties van de OpenPGP-standaard, waarvan [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) en [OpenPGP.js](https://openpgpjs.org)de meest voorkomende zijn. -Er is een andere standaard die populair is bij bedrijven, [S/MIME](https://en.wikipedia.org/wiki/S/MIME), maar deze vereist een certificaat dat is afgegeven door een [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (niet alle instanties geven S/MIME-certificaten af). Het heeft ondersteuning in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) en [Outlook for Web of Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +Er is een andere standaard die populair is bij bedrijven, [S/MIME](https://en.wikipedia.org/wiki/S/MIME), maar deze vereist een certificaat dat is afgegeven door een [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (niet alle instanties geven S/MIME-certificaten af). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Zelfs als je OpenPGP gebruikt, biedt het geen ondersteuning voor [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), wat betekent dat als jouw privésleutel of die van de ontvanger ooit wordt gestolen, alle eerdere berichten die ermee zijn versleuteld, openbaar worden. Daarom bevelen wij [instant messengers](../real-time-communication.md) aan, die indien mogelijk forward secrecy implementeren in plaats van e-mail voor communicatie van persoon tot persoon. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ E-mailproviders die je in staat stellen standaard toegangsprotocollen zoals IMAP ### Hoe bescherm ik mijn private sleutels? -Een smartcard (zoals een [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) of [Nitrokey](https://www.nitrokey.com)) werkt door een geëncrypteerd e-mailbericht te ontvangen van een apparaat (telefoon, tablet, computer, enz.) waarop een e-mail/webmailclient draait. Het bericht wordt vervolgens door de smartcard ontsleuteld en de ontsleutelde inhoud wordt teruggestuurd naar het apparaat. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Het bericht wordt vervolgens door de smartcard ontsleuteld en de ontsleutelde inhoud wordt teruggestuurd naar het apparaat. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/nl/basics/multi-factor-authentication.md b/i18n/nl/basics/multi-factor-authentication.md index 6be8157e..3755b23c 100644 --- a/i18n/nl/basics/multi-factor-authentication.md +++ b/i18n/nl/basics/multi-factor-authentication.md @@ -36,7 +36,7 @@ TOTP is een van de meest voorkomende vormen van MFB. Wanneer je TOTP instelt, mo De in de tijd beperkte code wordt dan afgeleid van het gedeelde geheim en de huidige tijd. Aangezien de code slechts korte tijd geldig is, kan een adversair zonder toegang tot het gedeelde geheim geen nieuwe codes genereren. -Als je een hardware beveiligingssleutel hebt met TOTP-ondersteuning (zoals een YubiKey met [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), raden wij je aan om jouw "gedeelde geheimen" op de hardware op te slaan. Hardware zoals de YubiKey werd ontwikkeld met de bedoeling het "gedeelde geheim" moeilijk te ontfutselen en te kopiëren te maken. Een YubiKey is ook niet verbonden met het internet, in tegenstelling tot een telefoon met een TOTP-app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware zoals de YubiKey werd ontwikkeld met de bedoeling het "gedeelde geheim" moeilijk te ontfutselen en te kopiëren te maken. Een YubiKey is ook niet verbonden met het internet, in tegenstelling tot een telefoon met een TOTP-app. In tegenstelling tot [WebAuthn](#fido-fast-identity-online)biedt TOTP geen bescherming tegen [phishing](https://en.wikipedia.org/wiki/Phishing) of hergebruikaanvallen. Als een tegenstander een geldige code van je krijgt, mag hij die zo vaak gebruiken als hij wil totdat de code is verlopen (over het algemeen 60 seconden. @@ -148,7 +148,7 @@ Naast het beveiligen van jouw website logins, kan multifactor authenticatie ook ### Windows -Yubico heeft een speciale [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) die Challenge-Response authenticatie toevoegt voor de gebruikersnaam + wachtwoord login flow voor lokale Windows accounts. Als je een YubiKey hebt met ondersteuning voor Challenge-Response authenticatie, kijk dan eens naar de [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), waarmee je MFA kunt instellen op jouw Windows-computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. @@ -156,7 +156,7 @@ Yubico heeft een speciale [Credential Provider](https://docs.microsoft.com/en-us macOS heeft [native ondersteuning](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) voor authenticatie met smartcards (PIV). Indien je een smartcard of een hardware beveiligingssleutel heeft die de PIV interface ondersteunt, zoals de YubiKey, raden wij je aan om de documentatie van jouw smartcard/hardware beveiligingsleverancier te volgen en tweede factor authenticatie voor jouw macOS computer in te stellen. -Yubico heeft een gids [je YubiKey als Smart Card gebruiken in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) die je kan helpen bij het instellen van jouw YubiKey op macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. Nadat jouw smartcard/security key is ingesteld, raden wij je aan dit commando in de Terminal uit te voeren: @@ -180,13 +180,13 @@ Als de hostnaam van jouw systeem verandert (bijvoorbeeld door DHCP), zou je niet
-De `pam_u2f` module op Linux kan twee-factor authenticatie bieden om in te loggen op de meeste populaire Linux distributies. Als je een hardware beveiligingssleutel hebt die U2F ondersteunt, kun je MFA verificatie instellen voor jouw aanmelding. Yubico heeft een gids [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) die zou moeten werken op elke distributie. De commando's van de pakketbeheerder - zoals `apt-get`- en de pakketnamen kunnen echter verschillen. Deze gids is **niet** van toepassing op Qubes OS. +De `pam_u2f` module op Linux kan twee-factor authenticatie bieden om in te loggen op de meeste populaire Linux distributies. Als je een hardware beveiligingssleutel hebt die U2F ondersteunt, kun je MFA verificatie instellen voor jouw aanmelding. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. De commando's van de pakketbeheerder - zoals `apt-get`- en de pakketnamen kunnen echter verschillen. Deze gids is **niet** van toepassing op Qubes OS. ### Qubes OS -Qubes OS heeft ondersteuning voor Challenge-Response authenticatie met YubiKeys. Als je een YubiKey heeft met ondersteuning voor Challenge-Response authenticatie, kijk dan eens naar de Qubes OS [YubiKey documentatie](https://www.qubes-os.org/doc/yubikey/) als je MFA wilt instellen op Qubes OS. +Qubes OS heeft ondersteuning voor Challenge-Response authenticatie met YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. @@ -196,16 +196,16 @@ Qubes OS heeft ondersteuning voor Challenge-Response authenticatie met YubiKeys. #### Hardware Veiligheidssleutels -SSH MFA kan worden ingesteld met behulp van meerdere verschillende authenticatiemethoden die populair zijn met hardware beveiligingssleutels. Wij raden je aan om de Yubico documentatie [te raadplegen](https://developers.yubico.com/SSH/) over hoe dit in te stellen. +SSH MFA kan worden ingesteld met behulp van meerdere verschillende authenticatiemethoden die populair zijn met hardware beveiligingssleutels. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA kan ook worden ingesteld met TOTP. DigitalOcean heeft een tutorial beschikbaar gesteld [How To Set Up MultiFactor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). De meeste dingen zouden hetzelfde moeten zijn, ongeacht de distributie, maar de commando's van de pakketbeheerder - zoals `apt-get`- en de pakketnamen kunnen verschillen. +SSH MFA kan ook worden ingesteld met TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). De meeste dingen zouden hetzelfde moeten zijn, ongeacht de distributie, maar de commando's van de pakketbeheerder - zoals `apt-get`- en de pakketnamen kunnen verschillen. ### KeePass (en KeePassXC) -KeePass en KeePassXC databases kunnen worden beveiligd met Challenge-Response of HOTP als een tweede-factor authenticatie. Yubico heeft een document beschikbaar gesteld voor KeePass [Uw YubiKey gebruiken met KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) en er is er ook een op de [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass en KeePassXC databases kunnen worden beveiligd met Challenge-Response of HOTP als een tweede-factor authenticatie. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/nl/basics/passwords-overview.md b/i18n/nl/basics/passwords-overview.md index ea6f396a..2848beb1 100644 --- a/i18n/nl/basics/passwords-overview.md +++ b/i18n/nl/basics/passwords-overview.md @@ -54,13 +54,13 @@ Volg deze stappen om een diceware passphrase te genereren met echte dobbelstenen

Note

-Deze instructies gaan ervan uit dat je [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) gebruikt om de wachtwoord zin te genereren, waarvoor vijf dobbelsteenworpen per woord nodig zijn. Andere woordenlijsten kunnen meer of minder rollen per woord vereisen, en kunnen een ander aantal woorden nodig hebben om dezelfde entropie te bereiken. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Andere woordenlijsten kunnen meer of minder rollen per woord vereisen, en kunnen een ander aantal woorden nodig hebben om dezelfde entropie te bereiken.
1. Gooi vijf keer met een zeszijdige dobbelsteen en noteer het getal na elke worp. -2. Laten we bijvoorbeeld zeggen dat u `2-5-2-6-6`heeft gerold. Zoek in de grote woordenlijst van [EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) naar het woord dat overeenkomt met `25266`. +2. Laten we bijvoorbeeld zeggen dat u `2-5-2-6-6`heeft gerold. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. U vindt het woord `gecodeerd`. Schrijf dat woord op. @@ -75,20 +75,20 @@ Je moet **niet** opnieuw woorden rollen totdat je een combinatie van woorden kri Als je geen toegang hebt tot of liever geen echte dobbelstenen gebruikt, kunt je de ingebouwde wachtwoordgenerator van jouw wachtwoord manager gebruiken, omdat de meeste daarvan de optie hebben om naast gewone wachtwoorden ook diceware wachtwoord zinnen te genereren. -Wij adviseren het gebruik van [EFF's grote woordenlijst](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) om jouw diceware wachtwoord zinnen te genereren, omdat het exact dezelfde veiligheid biedt als de originele lijst, terwijl het woorden bevat die gemakkelijker te onthouden zijn. Er zijn ook [andere woordenlijsten in verschillende talen](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), als u niet wilt dat uw wachtwoord in het Engels is. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. Er zijn ook [andere woordenlijsten in verschillende talen](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), als u niet wilt dat uw wachtwoord in het Engels is.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. Eén meting om de sterkte van een wachtwoord zin te bepalen is hoeveel entropie het heeft. De entropie per woord in een diceware wachtwoord zin wordt berekend als $\text{log}_2(\text{WordsInList})$ en de totale entropie van de wachtwoord zin wordt berekend als $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Daarom resulteert elk woord in de bovengenoemde lijst in ~12,9 bits entropie ($\text{log}_2(7776)$), en een daarvan afgeleide wachtwoord zin van zeven woorden heeft ~90,47 bits entropie ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. Om het aantal mogelijke passphrases te berekenen, hoeven we alleen maar $\text{WordsInList}^\text{WordsInPhrase}$, of in ons geval, $7776^7$, uit te rekenen. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. Om het aantal mogelijke passphrases te berekenen, hoeven we alleen maar $\text{WordsInList}^\text{WordsInPhrase}$, of in ons geval, $7776^7$, uit te rekenen. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. Gemiddeld duurt het proberen van 50% van alle mogelijke combinaties om uw zin te raden. Met dat in gedachten, zelfs als uw tegenstander in staat is tot ~1.000.000.000.000 raden per seconde, zou het hem nog steeds ~27.255.689 jaar kosten om uw wachtwoord te raden. Zelfs als de volgende dingen waar zijn: diff --git a/i18n/nl/basics/vpn-overview.md b/i18n/nl/basics/vpn-overview.md index cef5440a..4f314baf 100644 --- a/i18n/nl/basics/vpn-overview.md +++ b/i18n/nl/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. Om dit te compenseren, routeren VPN-aanbieders gewoonlijk alle niet-TCP-pakketten via hun VPN-server (je eerste hop). Dit is het geval met [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Bovendien, wanneer je deze Tor over VPN setup gebruikt, heb je geen controle over andere belangrijke Tor functies zoals [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (een ander Tor circuit gebruiken voor elk domein dat je bezoekt). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. Om dit te compenseren, routeren VPN-aanbieders gewoonlijk alle niet-TCP-pakketten via hun VPN-server (je eerste hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Verwante VPN-informatie -- [Het probleem met VPN- en privacybeoordelingssites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Gratis VPN-app onderzoek](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Verborgen VPN-eigenaars onthuld: 101 VPN-producten van slechts 23 bedrijven](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [Dit Chinese bedrijf zit in het geheim achter 24 populaire apps die gevaarlijke toestemmingen zoeken](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) door Dennis Schubert +- [Het probleem met VPN- en privacybeoordelingssites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Gratis VPN-app onderzoek](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Verborgen VPN-eigenaars onthuld: 101 VPN-producten van slechts 23 bedrijven](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [Dit Chinese bedrijf zit in het geheim achter 24 populaire apps die gevaarlijke toestemmingen zoeken](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/nl/basics/why-privacy-matters.md b/i18n/nl/basics/why-privacy-matters.md index 41f0fb51..f5591219 100644 --- a/i18n/nl/basics/why-privacy-matters.md +++ b/i18n/nl/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is iets wat we standaard in [software en diensten](../tools.md) moeten i ## Bronnen -- [Waarom privacy belangrijk is](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) door Neil Richards -- [The New Oil: Waarom privacy & veiligheid belangrijk is](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Waarom privacy & veiligheid belangrijk is](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/nl/calendar.md b/i18n/nl/calendar.md index 490820c6..3e390914 100644 --- a/i18n/nl/calendar.md +++ b/i18n/nl/calendar.md @@ -13,7 +13,7 @@ Kalenders en contactpersonen bevatten enkele van jouw gevoeligste gegevens; gebr ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Meerdere kalenders en uitgebreide functionaliteit voor delen zijn beperkt tot betalende abonnees. @@ -21,18 +21,18 @@ Meerdere kalenders en uitgebreide functionaliteit voor delen zijn beperkt tot be [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Meerdere kalenders en uitgebreide functionaliteit voor delen zijn beperkt tot be Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/nl/cloud.md b/i18n/nl/cloud.md index d9104280..325a2e17 100644 --- a/i18n/nl/cloud.md +++ b/i18n/nl/cloud.md @@ -56,15 +56,15 @@ Tresorit logo](assets/img/cloud/tresorit.svg){ align=right } **Tresorit** is een Zwitsers-Hongaarse aanbieder van versleutelde cloud-opslag, opgericht in 2011. Tresorit is eigendom van de Zwitserse Post, de nationale postdienst van Zwitserland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Tresorit logo](assets/img/cloud/tresorit.svg){ align=right } Tresorit heeft een aantal onafhankelijke beveiligingsaudits ontvangen: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Conformiteit [Certificering](https://www.certipedia.com/quality_marks/9108644476) door TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetratietesten door Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - Bij deze evaluatie is de beveiliging van de Tresorit webclient, Android app, Windows app en bijbehorende infrastructuur beoordeeld. - Computest ontdekte twee kwetsbaarheden die zijn opgelost. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetratie testen door Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - Deze evaluatie analyseerde de volledige broncode van Tresorit en bevestigde dat de implementatie overeenkomt met de concepten die zijn beschreven in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young testte bovendien de web-, mobiele en desktopclients: "Testresultaten vonden geen afwijking van Tresorit's claims over de vertrouwelijkheid van gegevens." -Ze hebben ook het Digital Trust Label ontvangen, een certificering van het [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) waarvoor ze moeten voldoen aan [35 criteria](https://digitaltrust-label.swiss/criteria/) met betrekking tot veiligheid, privacy en betrouwbaarheid. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/nl/cryptocurrency.md b/i18n/nl/cryptocurrency.md index 0ffb889d..1102c1d3 100644 --- a/i18n/nl/cryptocurrency.md +++ b/i18n/nl/cryptocurrency.md @@ -24,10 +24,10 @@ Veel zo niet de meeste cryptocurrency projecten zijn zwendel. Voer transacties z **Monero** gebruikt een blockchain met privacyverbeterende technologieën die transacties versluieren om anonimiteit te bereiken. Elke Monero-transactie verbergt het transactiebedrag, het verzenden en ontvangen van adressen en de bron van fondsen zonder hoepels om doorheen te springen, waardoor het een ideale keuze is voor beginners met cryptocurrency. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,23 +38,19 @@ Met Monero kunnen externe waarnemers geen adressen ontcijferen die handelen in M Voor optimale privacy, zorg ervoor dat je een noncustodial wallet gebruikt waar de view key op het apparaat blijft. Dit betekent dat alleen jij je geld kunt uitgeven en de inkomende en uitgaande transacties kunt zien. Als je een custodial wallet gebruikt, kan de provider **alles zien wat** je doet; als je een "lichtgewicht" wallet gebruikt waarbij de provider jouw privé view key bewaard, kan de provider bijna alles zien wat u doet. Sommige niet-custodiale wallets omvatten: - [Officiële Monero-client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet ondersteunt meerdere cryptocurrencies. Een Monero-only versie van Cake Wallet is beschikbaar op [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet ondersteunt meerdere cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) Voor maximale privacy (zelfs met een niet-custodiale wallet) moet je jouw eigen Monero-knooppunt beheren. Als je een knooppunt van een ander gebruikt, krijgt hij enige informatie, zoals het IP-adres van waaruit je verbinding maakt, de tijdstempels waarmee je jouw portemonnee synchroniseert, en de transacties die je vanuit jouw portemonnee verstuurt (maar geen andere details over die transacties). Als alternatief kun je via Tor of i2p verbinding maken met het Monero-knooppunt van iemand anders. -In augustus 2021 kondigde CipherTrace [](https://ciphertrace.com/enhanced-monero-tracing/) verbeterde Monero-tracing-mogelijkheden aan voor overheidsinstanties. Uit openbare berichten blijkt dat het Financial Crimes Enforcement Network van het Amerikaanse ministerie van Financiën [eind 2022 een licentie heeft verleend aan](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module". +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Uit openbare berichten blijkt dat het Financial Crimes Enforcement Network van het Amerikaanse ministerie van Financiën [eind 2022 een licentie heeft verleend aan](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module". -De privacy van de Monero-transactiegrafiek wordt beperkt door de relatief kleine ringhandtekeningen, vooral tegen gerichte aanvallen. De privacyfuncties van Monero zijn ook - -in twijfel getrokken door sommige beveiligingsonderzoekers, en in het verleden zijn een aantal ernstige kwetsbaarheden gevonden en gepatcht, dus de beweringen van organisaties als CipherTrace zijn niet uitgesloten. Hoewel het onwaarschijnlijk is dat er voor Monero massa surveillance instrumenten bestaan zoals voor Bitcoin en andere, is het zeker dat opsporingstools helpen bij gerichte onderzoeken.

+De privacy van de Monero-transactiegrafiek wordt beperkt door de relatief kleine ringhandtekeningen, vooral tegen gerichte aanvallen. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. Hoewel het onwaarschijnlijk is dat er voor Monero massa surveillance instrumenten bestaan zoals voor Bitcoin en andere, is het zeker dat opsporingstools helpen bij gerichte onderzoeken. Uiteindelijk is Monero de sterkste mededinger voor een privacyvriendelijke cryptocurrency, maar zijn privacyclaims zijn **niet** definitief bewezen. Er is meer tijd en onderzoek nodig om te beoordelen of Monero weerbaar genoeg is tegen aanvallen om altijd voldoende privacy te bieden. - - ## Criteria **Wij zijn niet verbonden aan de projecten die wij aanbevelen.** Naast [onze standaardcriteria](about/criteria.md)hebben wij een duidelijke reeks eisen ontwikkeld om objectieve aanbevelingen te kunnen doen. Wij stellen voor dat je jezelf vertrouwd maakt met deze lijst voordat je een project kiest, en jouw eigen onderzoek uitvoert om er zeker van te zijn dat je de juiste keuze maakt. diff --git a/i18n/nl/data-redaction.md b/i18n/nl/data-redaction.md index 3978bb5f..f20e55ef 100644 --- a/i18n/nl/data-redaction.md +++ b/i18n/nl/data-redaction.md @@ -88,12 +88,12 @@ De app biedt meerdere manieren om metadata uit afbeeldingen te wissen. Namelijk: Metapho geeft eenvoudige en nette weergave van de afbeeldingsmetadata zoals datum, bestandsnaam, grootte, camera model, sluitertijd, en locatie. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ Metapho geeft eenvoudige en nette weergave van de afbeeldingsmetadata zoals datu **PrivacyBlur** is een gratis app die gevoelige delen van foto's kan vervagen voordat je ze online deelt. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ Metapho geeft eenvoudige en nette weergave van de afbeeldingsmetadata zoals datu Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/nl/desktop-browsers.md b/i18n/nl/desktop-browsers.md index e4345e47..46a68055 100644 --- a/i18n/nl/desktop-browsers.md +++ b/i18n/nl/desktop-browsers.md @@ -70,8 +70,8 @@ Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ align=right } **Mullvad Browser** is een versie van [Tor Browser](tor.md#tor-browser) met zonder Tor netwerk integraties, gericht op het aanbieden van Tor Browser's anti-vingerafdruk browser technologieën aan VPN gebruikers. Het is ontwikkeld door het Tor Project en gedistribueerd door [Mullvad](vpn.md#mullvad), en vereist **niet** het gebruik van Mullvad's VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ Mullvad Browser logo](assets/img/browsers/mullvad_browser.svg){ align=right } -Net als [Tor Browser](tor.md), is Mullvad Browser ontworpen om fingerprinting te voorkomen door jouw browser fingerprint identiek te maken aan alle andere Mullvad Browser gebruikers, en het bevat standaard instellingen en extensies die automatisch worden geconfigureerd door de standaard beveiligingsniveaus: *Standaard*, *Veiliger* en *Veiligst*. Daarom is het noodzakelijk dat je de browser helemaal niet aanpast buiten het aanpassen van de standaard [beveiligingsniveaus](https://tb-manual.torproject.org/security-settings/). Andere wijzigingen zouden jouw vingerafdruk uniek maken, wat het doel van het gebruik van deze browser tenietdoet. Als je jouw browser zwaarder wilt configureren en fingerprinting voor jou geen probleem is, raden wij in plaats daarvan [Firefox](#firefox) aan. +Net als [Tor Browser](tor.md), is Mullvad Browser ontworpen om fingerprinting te voorkomen door jouw browser fingerprint identiek te maken aan alle andere Mullvad Browser gebruikers, en het bevat standaard instellingen en extensies die automatisch worden geconfigureerd door de standaard beveiligingsniveaus: *Standaard*, *Veiliger* en *Veiligst*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Andere wijzigingen zouden jouw vingerafdruk uniek maken, wat het doel van het gebruik van deze browser tenietdoet. Als je jouw browser zwaarder wilt configureren en fingerprinting voor jou geen probleem is, raden wij in plaats daarvan [Firefox](#firefox) aan. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser wordt geleverd met DuckDuckGo ingesteld als de standaard [zoekma **Firefox** biedt krachtige privacy-instellingen zoals [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), die kunnen helpen bij het blokkeren van verschillende [soorten tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser wordt geleverd met DuckDuckGo ingesteld als de standaard [zoekma

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Dit beschermt je door het blokkeren van social media trackers, fingerprinting sc ##### Firefox stelt voor (alleen VS) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is een functie vergelijkbaar met zoeksuggesties die alleen in de VS beschikbaar is. Wij raden aan dit uit te schakelen om dezelfde reden als waarom wij aanraden zoeksuggesties uit te schakelen. Als je deze opties niet ziet onder de kop **Adresbalk**, hebt je de nieuwe ervaring niet en kun je deze wijzigingen negeren. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. Wij raden aan dit uit te schakelen om dezelfde reden als waarom wij aanraden zoeksuggesties uit te schakelen. Als je deze opties niet ziet onder de kop **Adresbalk**, hebt je de nieuwe ervaring niet en kun je deze wijzigingen negeren. - [ ] Deselecteer **Accepteer cookies van sites** - [ ] Deselecteer **Suggesties van sponsors** @@ -183,7 +183,7 @@ Dit beschermt je tegen blijvende cookies, maar niet tegen cookies die tijdens ee > Firefox stuurt ons gegevens over jouw Firefox-versie en -taal; besturingssysteem van het apparaat en hardwareconfiguratie; geheugen, basisinformatie over crashes en fouten; resultaat van geautomatiseerde processen zoals updates, veilig browsen en activering. Wanneer Firefox gegevens naar ons verzendt, wordt uw IP-adres tijdelijk verzameld als onderdeel van onze serverlogs. -Daarnaast verzamelt de Firefox Accounts service [enkele technische gegevens](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). Als je een Firefox-account gebruikt, kun je je afmelden: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). Als je een Firefox-account gebruikt, kun je je afmelden: 1. Open jouw [profielinstellingen op accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Schakel **Gegevensverzameling en -gebruik uit** > **Help Firefox-accounts verbeteren** @@ -204,7 +204,7 @@ Max Bescherming forceert het gebruik van DNS via HTTPS. Een beveiligingswaarschu #### Synchronisatie -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) maakt jouw browsegegevens (geschiedenis, bladwijzers, enz.) toegankelijk op al jouw apparaten en beschermt ze met E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (gevorderd) @@ -215,7 +215,7 @@ Max Bescherming forceert het gebruik van DNS via HTTPS. Een beveiligingswaarschu -Het [Arkenfox-project](https://github.com/arkenfox/user.js) biedt een reeks zorgvuldig overwogen opties voor Firefox. Als je [besluit](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) om Arkenfox te gebruiken, zijn er een [paar opties](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) die subjectief streng zijn en/of ervoor kunnen zorgen dat sommige websites niet goed werken - [die je gemakkelijk kunt wijzigen](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) om aan jouw behoeften te voldoen. Wij **raden je ten zeerste aan** hun volledige [wiki](https://github.com/arkenfox/user.js/wiki)door te lezen. Arkenfox biedt ook ondersteuning voor [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users). +Het [Arkenfox-project](https://github.com/arkenfox/user.js) biedt een reeks zorgvuldig overwogen opties voor Firefox. Als je [besluit](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) om Arkenfox te gebruiken, zijn er een [paar opties](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) die subjectief streng zijn en/of ervoor kunnen zorgen dat sommige websites niet goed werken - [die je gemakkelijk kunt wijzigen](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) om aan jouw behoeften te voldoen. Wij **raden je ten zeerste aan** hun volledige [wiki](https://github.com/arkenfox/user.js/wiki)door te lezen. Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox wil alleen elementaire of naïeve volgscripts dwarsbomen via canvas randomisatie en de ingebouwde configuratie-instellingen voor vingerafdrukbestendigheid van Firefox. Het is niet de bedoeling dat jouw browser opgaat in een grote menigte van andere Arkenfox-gebruikers op dezelfde manier als Mullvad Browser of Tor Browser dat doen, wat de enige manier is om geavanceerde tracking-scripts voor vingerafdrukken te dwarsbomen. Je kunt altijd meerdere browsers gebruiken, bijvoorbeeld Firefox+Arkenfox voor een paar sites waarop je ingelogd wilt blijven of die je anderszins vertrouwt, en Mullvad Browser voor algemeen browsen. @@ -223,25 +223,25 @@ Arkenfox wil alleen elementaire of naïeve volgscripts dwarsbomen via canvas ran
-![Brave-logo](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** bevat een ingebouwde inhoudsblokker en [privacyfuncties](https://brave.com/privacy-features/), waarvan vele standaard zijn ingeschakeld. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is gebouwd op het Chromium webbrowser project, dus het zou vertrouwd moeten aanvoelen en minimale website compatibiliteitsproblemen moeten hebben. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ Deze opties zijn te vinden in :material-menu: → **Instellingen**. ##### Shields -Brave bevat enkele anti-vingerafdruk maatregelen in zijn [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) functie. Wij raden aan om deze opties [globaal te configureren](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) voor alle pagina's die je bezoekt. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. De opties van Shields kunnen naar behoefte per site worden gedowngrade, maar standaard raden wij aan de volgende opties in te stellen: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave
-1. Deze optie biedt functionaliteit die vergelijkbaar is met uBlock Origin's geavanceerde [blokkeringsmodes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) of de [NoScript](https://noscript.net/) extensie. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy en beveiliging
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **niet** zo resistent tegen vingerafdrukken als de Tor Browser en veel minder mensen gebruiken Brave met Tor, dus zal je opvallen. Wanneer [sterke anonimiteit vereist is](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) gebruik dan de [Tor Browser](tor.md#tor-browser). +1. Brave is **niet** zo resistent tegen vingerafdrukken als de Tor Browser en veel minder mensen gebruiken Brave met Tor, dus zal je opvallen. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ De Web3-functies van Brave kunnen de vingerafdruk van jouw browser en het aanval #### Synchronisatie -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) maakt jouw surfgegevens (geschiedenis, bladwijzers, enz.) toegankelijk op al jouw apparaten zonder dat je een account nodig hebt en beschermt ze met E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards en Wallet @@ -371,7 +371,7 @@ In het algemeen raden wij aan jouw browserextensies tot een minimum te beperken;
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ We werken aan het vaststellen van gedefinieerde criteria voor elk deel van onze - Beschikbaar op Linux, macOS en Windows. - Wijzigingen die nodig zijn om de browser privacyvriendelijker te maken, mogen de gebruikerservaring niet negatief beïnvloeden. - Blokkeert standaard cookies van derden. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Beste geval Onze best-case criteria geven aan wat wij zouden willen zien van het perfecte project in deze categorie. Het is mogelijk dat onze aanbevelingen geen of niet alle functies bevatten, maar degene die dat wel doen kunnen hoger gerangschikt worden dan andere op deze pagina. - Beschikt over ingebouwde functionaliteit voor het blokkeren van inhoud. -- Ondersteunt cookie Compartimentalisatie ( à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. Dit kan voordelen hebben ten opzichte van het installeren van op electron gebaseerde apps, omdat je profiteert van de regelmatige beveiligingsupdates van jouw browser. - Omvat geen add-on functionaliteit (bloatware) die geen invloed heeft op de privacy van gebruikers. - Verzamelt standaard geen telemetrie. @@ -462,4 +462,4 @@ Onze best-case criteria geven aan wat wij zouden willen zien van het perfecte pr - Moet rechtstreeks van invloed zijn op de privacy van de gebruiker, d.w.z. mag niet gewoon informatie verstrekken. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/nl/desktop.md b/i18n/nl/desktop.md index 801950de..2ce85058 100644 --- a/i18n/nl/desktop.md +++ b/i18n/nl/desktop.md @@ -17,17 +17,17 @@ Linux-distributies worden algemeen aanbevolen voor privacybescherming en softwar ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora adopteert over het algemeen nieuwere technologieën dan andere distributies, b.v. [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org), en binnenkort. Deze nieuwe technologieën gaan vaak gepaard met verbeteringen op het gebied van veiligheid, privacy en bruikbaarheid in het algemeen. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). Deze nieuwe technologieën gaan vaak gepaard met verbeteringen op het gebied van veiligheid, privacy en bruikbaarheid in het algemeen. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora heeft een semi-rollende release cyclus. Terwijl sommige pakketten zoals [GNOME](https://www.gnome.org) bevroren worden tot de volgende Fedora uitgave, worden de meeste pakketten (inclusief de kernel) regelmatig bijgewerkt gedurende de levensduur van de uitgave. Elke Fedora release wordt een jaar lang ondersteund, met elke 6 maanden een nieuwe versie. +Fedora heeft een semi-rollende release cyclus. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Elke Fedora release wordt een jaar lang ondersteund, met elke 6 maanden een nieuwe versie. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora heeft een semi-rollende release cyclus. Terwijl sommige pakketten zoals [ **openSUSE Tumbleweed** is een stabiele distributie met rollende release. -openSUSE Tumbleweed heeft een [transactionele update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) systeem dat gebruik maakt van [Btrfs](https://en.wikipedia.org/wiki/Btrfs) en [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) om ervoor te zorgen dat snapshots kunnen worden teruggerold mocht er een probleem zijn. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentatie} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Bijdragen} +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed volgt een rollend release-model waarbij elke update wordt vrijgegeven **Arch Linux** is een lichtgewicht, doe-het-zelf (DIY) distributie, wat betekent dat u alleen krijgt wat u installeert. Zie voor meer informatie hun [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentatie} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Bijdragen} +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ Een groot deel van [Arch Linux's pakketten](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,9 +108,9 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is een onafhankelijke distributie gebaseerd op de Nix pakketbeheerder met een focus op reproduceerbaarheid en betrouwbaarheid. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentatie} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Bijdragen} +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. Het is gefocust op privacy, veiligheid en anonimiteit op het internet te bieden. Whonix wordt het best gebruikt in combinatie met [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentatie} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Dragen bij } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,7 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is een live besturingssysteem gebaseerd op Debian dat alle communicatie via Tor laat lopen. Hij kan op bijna elke computer opstarten vanaf een DVD, USB-stick of SD-kaart. -Het is bedoeld om de privacy en anonimiteit te bewaren, censuur te omzeilen en geen sporen achter te laten op de computer waarop het wordt gebruikt. +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -176,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Op veiligheid gerichte distributies @@ -188,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -213,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. Het dekt standaard een heleboel aanbevelingen voor privacy en hardening. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/nl/device-integrity.md b/i18n/nl/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/nl/device-integrity.md +++ b/i18n/nl/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/nl/dns.md b/i18n/nl/dns.md index 6a2d32bd..d4f20d27 100644 --- a/i18n/nl/dns.md +++ b/i18n/nl/dns.md @@ -11,14 +11,14 @@ Versleutelde DNS met servers van derden zou alleen moeten worden gebruikt om sim ## Aanbevolen Providers -| DNS-provider | Privacybeleid | Protocollen | Loggen | ECS | Filteren | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------- | --------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Beetje[^1] | Yes | Op basis van persoonlijke configuratie. De filterlijst die wordt gebruikt, is hier te vinden. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Beetje[^2] | Nee | Op basis van persoonlijke configuratie. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optioneel[^3] | Nee | Op basis van persoonlijke configuratie. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | Geen[^4] | Nee | Op basis van persoonlijke configuratie. De filterlijst die wordt gebruikt, is hier te vinden. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optioneel[^5] | Optioneel | Op basis van persoonlijke configuratie. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Beetje[^6] | Optioneel | Gebaseerd op persoonlijke configuratie, blokkeert Malware. | +| DNS-provider | Privacybeleid | Protocollen | Loggen | ECS | Filteren | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------- | --------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Beetje[^1] | Yes | Op basis van persoonlijke configuratie. De filterlijst die wordt gebruikt, is hier te vinden. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Beetje[^2] | Nee | Op basis van persoonlijke configuratie. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optioneel[^3] | Nee | Op basis van persoonlijke configuratie. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | Geen[^4] | Nee | Op basis van persoonlijke configuratie. De filterlijst die wordt gebruikt, is hier te vinden. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optioneel[^5] | Optioneel | Op basis van persoonlijke configuratie. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Beetje[^6] | Optioneel | Gebaseerd op persoonlijke configuratie, blokkeert Malware. | ### Criteria @@ -50,7 +50,7 @@ Na installatie van een configuratieprofiel of een app die gebruik maakt van de D #### Ondertekende Profielen -Apple biedt geen native interface voor het maken van versleutelde DNS-profielen. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is een onofficiële tool voor het maken van je eigen versleutelde DNS-profielen, echter worden deze niet ondertekend. Ondertekende profielen hebben de voorkeur; ondertekening valideert de oorsprong van een profiel en helpt de integriteit van de profielen te waarborgen. Een groen "Geverifieerd" label wordt gegeven aan ondertekende configuratieprofielen. Voor meer informatie over het ondertekenen van codes, zie [Over het ondertekenen van codes](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Ondertekende profielen** worden aangeboden door [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), en [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple biedt geen native interface voor het maken van versleutelde DNS-profielen. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is een onofficiële tool voor het maken van je eigen versleutelde DNS-profielen, echter worden deze niet ondertekend. Ondertekende profielen hebben de voorkeur; ondertekening valideert de oorsprong van een profiel en helpt de integriteit van de profielen te waarborgen. Een groen "Geverifieerd" label wordt gegeven aan ondertekende configuratieprofielen. Voor meer informatie over het ondertekenen van codes, zie [Over het ondertekenen van codes](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Versleutelde DNS-proxy software biedt een lokale proxy voor de [onversleutelde D [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ Een zelf gehoste DNS-oplossing is handig voor het bieden van filtering op gecont ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is een open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) die gebruik maakt van [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) om ongewenste webinhoud, zoals advertenties, te blokkeren. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home beschikt over een vriendelijke webinterface om inzicht te krijgen en geblokkeerde inhoud te beheren. @@ -144,23 +144,23 @@ AdGuard Home beschikt over een vriendelijke webinterface om inzicht te krijgen e ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is een open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) die [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) gebruikt om ongewenste webinhoud, zoals advertenties, te blokkeren. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is ontworpen om te worden gehost op een Raspberry Pi, maar het is niet beperkt tot dergelijke hardware. De software beschikt over een vriendelijke webinterface om inzicht te krijgen en geblokkeerde inhoud te beheren. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacybeleid" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentatie} -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Broncode" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Bijdrage leveren } +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
[^1]: AdGuard slaat geaggregeerde prestatiecijfers van hun DNS-servers op, namelijk het aantal volledige verzoeken aan een bepaalde server, het aantal geblokkeerde verzoeken, en de snelheid waarmee verzoeken worden verwerkt. Zij houden ook de database bij van domeinen die in de laatste 24 uur zijn aangevraagd. "We hebben deze informatie nodig om nieuwe trackers en bedreigingen te identificeren en te blokkeren." "We houden ook bij hoe vaak bepaalde trackers geblokkeerd zijn. We hebben deze informatie nodig om verouderde regels uit onze filters te verwijderen." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare verzamelt en bewaart alleen de beperkte DNS-querygegevens die naar de 1.1.1.1 resolver worden gestuurd. De 1.1.1.1 resolver dienst logt geen persoonsgegevens, en het grootste deel van de beperkte niet-persoonlijk identificeerbare query-gegevens wordt slechts 25 uur bewaard. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare verzamelt en bewaart alleen de beperkte DNS-querygegevens die naar de 1.1.1.1 resolver worden gestuurd. De 1.1.1.1 resolver dienst logt geen persoonsgegevens, en het grootste deel van de beperkte niet-persoonlijk identificeerbare query-gegevens wordt slechts 25 uur bewaard. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D logt alleen voor Premium resolvers met aangepaste DNS-profielen. Gratis resolvers loggen geen gegevens. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: De DNS-service van Mullvad is beschikbaar voor zowel abonnees als niet-abonnees van Mullvad VPN. Hun privacybeleid beweert expliciet dat zij op geen enkele manier DNS-verzoeken loggen. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: De DNS-service van Mullvad is beschikbaar voor zowel abonnees als niet-abonnees van Mullvad VPN. Hun privacybeleid beweert expliciet dat zij op geen enkele manier DNS-verzoeken loggen. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. Je kan retentietijden en opslaglocaties kiezen voor de logs die je wilt bewaren. Als er niet specifiek om gevraagd wordt, worden er geen gegevens gelogd. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 verzamelt sommige gegevens ten behoeve van de monitoring van en reactie op bedreigingen. Die gegevens kunnen vervolgens opnieuw worden gemengd en gedeeld, bijvoorbeeld ten behoeve van veiligheidsonderzoek. Quad9 verzamelt of registreert geen IP-adressen of andere gegevens die zij als persoonlijk identificeerbaar beschouwen. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 verzamelt sommige gegevens ten behoeve van de monitoring van en reactie op bedreigingen. Die gegevens kunnen vervolgens opnieuw worden gemengd en gedeeld, bijvoorbeeld ten behoeve van veiligheidsonderzoek. Quad9 verzamelt of registreert geen IP-adressen of andere gegevens die zij als persoonlijk identificeerbaar beschouwen. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/nl/email-clients.md b/i18n/nl/email-clients.md index d4830b0c..073a07f6 100644 --- a/i18n/nl/email-clients.md +++ b/i18n/nl/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ Deze opties zijn te vinden in :material-menu: → **Instellingen** → **Privacy **Apple Mail** is opgenomen in macOS en kan worden uitgebreid met OpenPGP-ondersteuning met [GPG Suite](/encryption/#gpg-suite), waarmee de mogelijkheid wordt toegevoegd om versleutelde e-mail te versturen. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail heeft de mogelijkheid om inhoud op afstand op de achtergrond te laden [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We raden het aan omdat er maar weinig keuzes zijn [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We raden het aan omdat er maar weinig keuzes zijn ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is een applicatie voor het beheer van persoonlijke informatie die geïntegreerde mail-, agenda- en adresboekfuncties biedt. Evolution heeft uitgebreide [documentation](https://help.gnome.org/users/evolution/stable/) om u op weg te helpen. +**Evolution** is een applicatie voor het beheer van persoonlijke informatie die geïntegreerde mail-, agenda- en adresboekfuncties biedt. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In de toekomst zal K-9 Mail de [officieel gemerkte](https://k9mail.app/2022/06/1 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ Bij het beantwoorden van iemand op een mailinglijst kan de optie "beantwoorden" [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ Bij het beantwoorden van iemand op een mailinglijst kan de optie "beantwoorden" **Mailvelope** is een browser extensie die de uitwisseling van versleutelde e-mails mogelijk maakt volgens de OpenPGP encryptie standaard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ Bij het beantwoorden van iemand op een mailinglijst kan de optie "beantwoorden" NeoMutt is een tekst-gebaseerde client die een steile leercurve heeft. Het is echter zeer aanpasbaar. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/nl/email.md b/i18n/nl/email.md index 92f9cc7c..e887706c 100644 --- a/i18n/nl/email.md +++ b/i18n/nl/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail heeft interne crash rapporten die ze **niet** delen met derden. Dit #### :material-check:{ .pg-green } Aangepaste domeinen en aliassen -Betaalde Proton Mail abonnees kunnen hun eigen domein met de dienst gebruiken of een [catch-all](https://proton.me/support/catch-all) adres. Proton Mail ondersteunt ook [subadressering](https://proton.me/support/creating-aliases), wat handig is voor mensen die geen domein willen kopen. +Betaalde Proton Mail abonnees kunnen hun eigen domein met de dienst gebruiken of een [catch-all](https://proton.me/support/catch-all) adres. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Privé betaalmethoden @@ -129,7 +129,7 @@ Proton Mail heeft geen digitale erfenis functie. #### :material-check:{ .pg-green } Aangepaste domeinen en aliassen -Mailbox.org laat je je eigen domein gebruiken en ze ondersteunen [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) adressen. Mailbox.org ondersteunt ook [subadressering](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), wat handig is als je geen domein wilt kopen. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Privé betaalmethoden @@ -137,17 +137,17 @@ Mailbox.org accepteert geen Bitcoin of andere cryptocurrencies als gevolg van he #### :material-check:{ .pg-green } Accountbeveiliging -Mailbox.org ondersteunt [twee-factor authenticatie](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) alleen voor hun webmail. Je kunt TOTP of een [Yubikey](https://en.wikipedia.org/wiki/YubiKey) gebruiken via de [Yubicloud](https://www.yubico.com/products/services-software/yubicloud). Webstandaarden zoals [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) worden nog niet ondersteund. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Webstandaarden zoals [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) worden nog niet ondersteund. #### :material-information-outline:{ .pg-blue } Gegevensbeveiliging -Mailbox.org maakt encryptie van inkomende mail mogelijk met behulp van hun [versleutelde mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). Nieuwe berichten die je ontvangt, worden dan onmiddellijk versleuteld met jouw openbare sleutel. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). Nieuwe berichten die je ontvangt, worden dan onmiddellijk versleuteld met jouw openbare sleutel. -Echter, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), het softwareplatform dat wordt gebruikt door Mailbox.org, [ondersteunt niet](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) de versleuteling van je adresboek en agenda. Een [standalone optie](calendar.md) kan geschikter zijn voor die informatie. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. Een [standalone optie](calendar.md) kan geschikter zijn voor die informatie. #### :material-check:{ .pg-green } Email encryptie -Mailbox.org heeft [geïntegreerde encryptie](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in hun webmail, wat het verzenden van berichten naar mensen met openbare OpenPGP-sleutels vereenvoudigt. Ook kunnen [ontvangers op afstand een e-mail](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) op de servers van Mailbox.org ontsleutelen. Deze functie is nuttig wanneer de ontvanger op afstand geen OpenPGP heeft en geen kopie van de e-mail in zijn eigen mailbox kan ontsleutelen. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. Deze functie is nuttig wanneer de ontvanger op afstand geen OpenPGP heeft en geen kopie van de e-mail in zijn eigen mailbox kan ontsleutelen. Mailbox.org ondersteunt ook de ontdekking van publieke sleutels via HTTP vanuit hun [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). Hierdoor kunnen mensen buiten Mailbox.org gemakkelijk de OpenPGP sleutels van Mailbox.org accounts vinden, voor cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Je account wordt ingesteld op een beperkt gebruikersaccount zodra je contract is #### :material-information-outline:{ .pg-blue } Extra functionaliteit -Je kan je Mailbox.org-account openen via IMAP/SMTP met behulp van hun [.onion-service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). Hun webmail interface is echter niet toegankelijk via hun .onion dienst en kan je te maken krijgen met TLS-certificaatfouten. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). Hun webmail interface is echter niet toegankelijk via hun .onion dienst en kan je te maken krijgen met TLS-certificaatfouten. -Alle accounts hebben een beperkte cloud opslag die [kan worden versleuteld](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org biedt ook de alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), die de TLS-versleuteling op de verbinding tussen mailservers afdwingt, anders wordt het bericht helemaal niet verzonden. Mailbox.org ondersteunt ook [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) naast standaard toegangsprotocollen zoals IMAP en POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org ondersteunt ook [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) naast standaard toegangsprotocollen zoals IMAP en POP3. Mailbox.org heeft een digitale nalatenschap functie voor alle abonnementen. Je kunt kiezen of je wilt dat jouw gegevens worden doorgegeven aan jouw erfgenamen, mits zij een aanvraag indienen en jouw testament overleggen. Je kunt ook een persoon nomineren met naam en adres. @@ -185,18 +185,18 @@ Deze providers slaan je e-mails op met zero-knowledge encryptie, waardoor ze gew [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Aangepaste domeinen en aliassen -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Privé betaalmethodes @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). Dit zorgt ervoor dat het klantcontact met het bedrijf gebruik maakt van E2EE. De functie kost €240/j. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). Dit zorgt ervoor dat het klantcontact met het bedrijf gebruik maakt van E2EE. De functie kost €240/j. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Het gebruik van een aliasingdienst vereist dat je zowel jouw e-mailprovider als - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Opmerkelijke gratis functies: @@ -310,8 +310,8 @@ Opmerkelijke gratis functies: **SimpleLogin** is een gratis dienst die e-mailaliassen op verschillende gedeelde domeinnamen biedt, en optioneel betaalde functies zoals onbeperkte aliassen en aangepaste domeinen. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Opmerkelijke gratis functies: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin werd [overgenomen door Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) met ingang van 8 april 2022. Als je Proton Mail gebruikt voor uw primaire mailbox, is SimpleLogin een goede keuze. Aangezien beide producten nu eigendom zijn van hetzelfde bedrijf, hoeft je nog maar op één entiteit te vertrouwen. Wij verwachten ook dat SimpleLogin in de toekomst nauwer zal worden geïntegreerd met het aanbod van Proton. SimpleLogin blijft forwarding naar elke e-mailprovider van jouw keuze ondersteunen. Securitum [heeft begin 2022 een audit uitgevoerd op](https://simplelogin.io/blog/security-audit/) SimpleLogin en alle problemen [zijn aangepakt](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin werd [overgenomen door Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) met ingang van 8 april 2022. Als je Proton Mail gebruikt voor uw primaire mailbox, is SimpleLogin een goede keuze. Aangezien beide producten nu eigendom zijn van hetzelfde bedrijf, hoeft je nog maar op één entiteit te vertrouwen. Wij verwachten ook dat SimpleLogin in de toekomst nauwer zal worden geïntegreerd met het aanbod van Proton. SimpleLogin blijft forwarding naar elke e-mailprovider van jouw keuze ondersteunen. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). Je kunt jouw SimpleLogin account in de instellingen koppelen aan jouw Proton account. Als je Proton Unlimited, Business of Visionary Plan hebt, heb je SimpleLogin Premium gratis. @@ -352,9 +352,9 @@ Gevorderde systeembeheerders kunnen overwegen hun eigen e-mailserver op te zette **Mailcow** is een meer geavanceerde mailserver, perfect voor mensen met wat meer Linux ervaring. Het heeft alles wat je nodig hebt in een Docker container: Een mailserver met DKIM-ondersteuning, antivirus- en spammonitoring, webmail en ActiveSync met SOGo, en webgebaseerd beheer met 2FA-ondersteuning. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentatie} -[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Broncode" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Bijdrage leveren } +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Gevorderde systeembeheerders kunnen overwegen hun eigen e-mailserver op te zette Voor een meer handmatige aanpak hebben we deze twee artikelen uitgekozen: -- [Een mailserver opzetten met OpenSMTPD, Dovecot en Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [Hoe run je je eigen mailserver](https://www.c0ffee.net/blog/mail-server-guide/) (augustus 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criteria @@ -386,7 +386,7 @@ Wij beschouwen deze kenmerken als belangrijk om een veilige en optimale dienst t **Minimum om in aanmerking te komen:** - Versleutelt e-mail accountgegevens in rust met zero-access encryptie. -- Exportmogelijkheid als [Mbox](https://en.wikipedia.org/wiki/Mbox) of individuele .eml met [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standaard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Sta gebruikers toe hun eigen [domeinnaam te gebruiken](https://en.wikipedia.org/wiki/Domain_name). Aangepaste domeinnamen zijn belangrijk voor gebruikers omdat ze zo hun agentschap van de dienst kunnen behouden, mocht het slecht aflopen of overgenomen worden door een ander bedrijf dat privacy niet hoog in het vaandel heeft staan. - Werkt op eigen infrastructuur, d.w.z. niet gebaseerd op e-mail service providers van derden. @@ -397,7 +397,7 @@ Wij beschouwen deze kenmerken als belangrijk om een veilige en optimale dienst t - Ondersteuning voor [WKD](https://wiki.gnupg.org/WKD) om een verbeterde ontdekking van publieke OpenPGP sleutels via HTTP mogelijk te maken. GnuPG-gebruikers kunnen een sleutel krijgen door te typen: `gpg --locate-key example_user@example.com` - Ondersteuning voor een tijdelijke mailbox voor externe gebruikers. Dit is handig wanneer je een versleutelde e-mail wilt verzenden, zonder een echte kopie naar jouw ontvanger te sturen. Deze e-mails hebben meestal een beperkte levensduur en worden daarna automatisch verwijderd. Zij vereisen ook niet dat de ontvanger cryptografie configureert zoals OpenPGP. - Beschikbaarheid van de diensten van de e-mailprovider via een [onion service](https://en.wikipedia.org/wiki/.onion). -- [Ondersteuning voor subadressering](https://en.wikipedia.org/wiki/Email_address#Subaddressing). +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all of alias functionaliteit voor diegenen die hun eigen domeinen bezitten. - Gebruik van standaard e-mail toegangsprotocollen zoals IMAP, SMTP of [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standaard toegangsprotocollen zorgen ervoor dat klanten al hun e-mail gemakkelijk kunnen downloaden, mochten zij naar een andere provider willen overstappen. @@ -425,13 +425,13 @@ Email servers verwerken veel zeer gevoelige gegevens. We verwachten dat provider - Bescherming van webmail met 2FA, zoals TOTP. - Zero access encryptie, bouwt voort op encryptie in rust. De provider heeft geen decryptiesleutels voor de gegevens die ze hebben. Dit voorkomt dat een malafide werknemer gegevens lekt waartoe hij toegang heeft, of dat een tegenstander op afstand gegevens vrijgeeft die hij heeft gestolen door ongeoorloofde toegang tot de server te verkrijgen. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) ondersteuning. -- Geen [TLS](https://en.wikipedia.org/wiki/Opportunistic_TLS) fouten/kwetsbaarheden bij profilering door tools zoals [Hardenize](https://www.hardenize.com), [testssl.sh](https://testssl.sh) of [Qualys SSL Labs](https://www.ssllabs.com/ssltest), dit omvat certificaatgerelateerde fouten, slechte of zwakke ciphersuites, zwakke DH-parameters zoals die welke hebben geleid tot [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - Een geldig [MTA-STS](https://tools.ietf.org/html/rfc8461) en [TLS-RPT](https://tools.ietf.org/html/rfc8460) beleid. - Geldig [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Geldige [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) en [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Geldige [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) en [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Zorg voor een correct [DMARC](https://en.wikipedia.org/wiki/DMARC) record en beleid of gebruik [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) voor verificatie. Als DMARC-authenticatie wordt gebruikt, moet het beleid worden ingesteld op `reject` of `quarantine`. -- Een server suite voorkeur van TLS 1.2 of hoger en een plan voor [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) indiening, ervan uitgaande dat SMTP wordt gebruikt. - Beveiligingsnormen voor websites, zoals: - [HTTP Strict Transport Security](https://nl.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers verwerken veel zeer gevoelige gegevens. We verwachten dat provider - Programma's voor bug-bounty's en/of een gecoördineerd proces voor de openbaarmaking van kwetsbaarheden. - Beveiligingsnormen voor websites, zoals: - [Inhoud beveiligingsbeleid (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Vertrouwen diff --git a/i18n/nl/encryption.md b/i18n/nl/encryption.md index cde06438..e99a078a 100644 --- a/i18n/nl/encryption.md +++ b/i18n/nl/encryption.md @@ -22,15 +22,15 @@ De hier genoemde opties zijn multiplatform en zeer geschikt voor het maken van v [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator maakt gebruik van AES-256 encryptie om zowel bestanden als bestandsn Sommige cryptografische bibliotheken van Cryptomator zijn [geaudit](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) door Cure53. De reikwijdte van de gecontroleerde bibliotheken omvat: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) en [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). De controle strekte zich niet uit tot [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), een bibliotheek die door Cryptomator voor iOS wordt gebruikt. -In de documentatie van Cryptomator worden de beoogde [beveiligingsdoelstelling](https://docs.cryptomator.org/en/latest/security/security-target/), [beveiligingsarchitectuur](https://docs.cryptomator.org/en/latest/security/architecture/), en [beste praktijken](https://docs.cryptomator.org/en/latest/security/best-practices/) voor gebruik nader toegelicht. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (Bestand) @@ -81,15 +81,15 @@ In de documentatie van Cryptomator worden de beoogde [beveiligingsdoelstelling]( [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker-logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is de oplossing voor volledige volume-encryptie die met Microsoft Windows wordt meegeleverd. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is de oplossing voor volledige volume-encryptie die met Microsoft Windows wordt meegeleverd. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentatie} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [alleen ondersteund](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) op Pro, Enterprise en Education edities van Windows. Het kan worden ingeschakeld op Home-edities, mits deze aan de voorwaarden voldoen. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. Het kan worden ingeschakeld op Home-edities, mits deze aan de voorwaarden voldoen.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Ga naar de [Geavanceerde opstartopties](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). Je moet opnieuw opstarten terwijl je op de F8-toets drukt voordat Windows start en naar de *opdrachtprompt* gaat in **Problemen oplossen** → **Geavanceerde opties** → **Opdrachtprompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). Je moet opnieuw opstarten terwijl je op de F8-toets drukt voordat Windows start en naar de *opdrachtprompt* gaat in **Problemen oplossen** → **Geavanceerde opties** → **Opdrachtprompt**. 4. Log in met jouw admin-account en typ dit in de opdrachtprompt om de versleuteling te starten: ```powershell manage-bde -on c: -used @@ -184,8 +184,8 @@ Wij raden je aan een lokale herstelsleutel op een veilige plaats op te slaan in **LUKS** is de standaard FDE-methode voor Linux. Het kan worden gebruikt om volledige volumes of partities te versleutelen, of om versleutelde containers te maken. [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentatie} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Broncode" } +[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools met command-line interfaces zijn handig voor het integreren van [shell scr ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is een gratis en open-source programma voor het versleutelen en ondertekenen van bestanden dat gebruik maakt van moderne en veilige cryptografische algoritmen. Het beoogt een betere versie te zijn van [age](https://github.com/FiloSottile/age) en [Minisign](https://jedisct1.github.io/minisign/) om een eenvoudig, gemakkelijker alternatief voor GPG te bieden. +**Kryptor** is een gratis en open-source programma voor het versleutelen en ondertekenen van bestanden dat gebruik maakt van moderne en veilige cryptografische algoritmen. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools met command-line interfaces zijn handig voor het integreren van [shell scr **Tomb** is een is een command-line shell wrapper voor LUKS. Het ondersteunt steganografie via [hulpprogramma's van derden](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentatie} -[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Broncode" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Bijdragen} +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools met command-line interfaces zijn handig voor het integreren van [shell scr OpenPGP is soms nodig voor specifieke taken zoals het digitaal ondertekenen en versleutelen van e-mail. PGP heeft veel mogelijkheden en is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) omdat het al heel lang bestaat. Voor taken zoals het ondertekenen of versleutelen van bestanden, raden wij de bovenstaande opties aan. -Bij het versleutelen met PGP, heb je de optie om verschillende opties te configureren in het `gpg.conf` bestand. We raden aan om de standaard opties te gebruiken zoals gespecificeerd in de [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +Bij het versleutelen met PGP, heb je de optie om verschillende opties te configureren in het `gpg.conf` bestand. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is een GPL-gelicenseerd alternatief voor de PGP-suite van cryptografische software. GnuPG is in overeenstemming met [RFC 4880](https://tools.ietf.org/html/rfc4880), de huidige IETF-specificatie van OpenPGP. Het GnuPG-project heeft gewerkt aan een [bijgewerkt ontwerp](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in een poging OpenPGP te moderniseren. GnuPG is een onderdeel van het GNU-softwareproject van de Free Software Foundation en heeft van de Duitse regering het belangrijke [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) ontvangen. +**GnuPG** is een GPL-gelicenseerd alternatief voor de PGP-suite van cryptografische software. GnuPG is in overeenstemming met [RFC 4880](https://tools.ietf.org/html/rfc4880), de huidige IETF-specificatie van OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is een onderdeel van het GNU-softwareproject van de Free Software Foundation en heeft van de Duitse regering het belangrijke [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) ontvangen. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ Wij raden aan een kijkje te nemen in hun [Eerste stappen pagina](https://gpgtool ![OpenKeychain-logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is een Android implementatie van GnuPG. Het wordt algemeen vereist door mail clients zoals [K-9 Mail](email-clients.md#k-9-mail) en [FairEmail](email-clients.md#fairemail) en andere Android apps om encryptie ondersteuning te bieden. Cure53 voltooide een [beveiligingsaudit](https://www.openkeychain.org/openkeychain-3-6) van OpenKeychain 3.6 in oktober 2015. Technische details over de audit en OpenKeychain's oplossingen zijn te vinden op [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is een Android implementatie van GnuPG. Het wordt algemeen vereist door mail clients zoals [K-9 Mail](email-clients.md#k-9-mail) en [FairEmail](email-clients.md#fairemail) en andere Android apps om encryptie ondersteuning te bieden. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technische details over de audit en OpenKeychain's oplossingen zijn te vinden op [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/nl/file-sharing.md b/i18n/nl/file-sharing.md index 2c4e4219..8d55db58 100644 --- a/i18n/nl/file-sharing.md +++ b/i18n/nl/file-sharing.md @@ -15,7 +15,7 @@ Ontdek hoe je jouw bestanden privé kunt delen tussen jouw apparaten, met jouw v ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is een vork van Mozilla 's beëindigde Firefox Send-service waarmee je bestanden naar anderen kunt verzenden met een link. Bestanden worden op jouw apparaat versleuteld zodat ze niet door de server kunnen worden gelezen, en ze kunnen optioneel ook met een wachtwoord worden beveiligd. De maintainer van Send hosts een [openbare instantie](https://send.vis.ee/). Je kunt andere openbare instanties gebruiken, of je kunt Send zelf hosten. +**Send** is een vork van Mozilla 's beëindigde Firefox Send-service waarmee je bestanden naar anderen kunt verzenden met een link. Bestanden worden op jouw apparaat versleuteld zodat ze niet door de server kunnen worden gelezen, en ze kunnen optioneel ook met een wachtwoord worden beveiligd. The maintainer of Send hosts a [public instance](https://send.vis.ee). Je kunt andere openbare instanties gebruiken, of je kunt Send zelf hosten. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -81,9 +81,9 @@ We werken aan het vaststellen van gedefinieerde criteria voor elk deel van onze **FreedomBox** is een besturingssysteem ontworpen om te draaien op een [single-board computer (SBC)](https://en.wikipedia.org/wiki/Single-board_computer). Het doel is om het gemakkelijk te maken om servertoepassingen op te zetten die je misschien zelf wilt hosten. [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentatie} -[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Broncode" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Bijdrage leveren } +[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} +[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We werken aan het vaststellen van gedefinieerde criteria voor elk deel van onze [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ Wij raden het gebruik van de [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/nl/financial-services.md b/i18n/nl/financial-services.md index f4c325ae..9329fead 100644 --- a/i18n/nl/financial-services.md +++ b/i18n/nl/financial-services.md @@ -29,8 +29,8 @@ Privacy.com logo](assets/img/financial-services/privacy_com-dark.svg#only-dark){ Met het gratis plan van **Privacy.com** kunt je tot 12 virtuele kaarten per maand aanmaken, uitgavenlimieten op die kaarten instellen en kaarten onmiddellijk uitschakelen. Met hun betaalde plan kunt je tot 36 kaarten per maand aanmaken, 1% cashback krijgen op aankopen en transactiegegevens voor jouw bank verbergen. [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacybeleid" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentatie} +[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ MySudo logo](assets/img/financial-services/mysudo-dark.svg#only-dark){ align=rig **MySudo** biedt tot 9 virtuele kaarten, afhankelijk van het plan dat je koopt. Hun betaalde plannen omvatten bovendien functionaliteit die nuttig kan zijn om privé aankopen te doen, zoals virtuele telefoonnummers en e-mailadressen, hoewel wij gewoonlijk andere [email aliasing providers](email.md) aanbevelen voor uitgebreid e-mail aliasing gebruik. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ Met deze diensten kunt je online cadeaubonnen kopen voor verschillende handelare ** CoinCards ** (beschikbaar in de VS, Canada en het VK) kunt je cadeaubonnen kopen voor een grote verscheidenheid aan verkopers. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacybeleid" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentatie} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/nl/frontends.md b/i18n/nl/frontends.md index d641bf37..25b9c85e 100644 --- a/i18n/nl/frontends.md +++ b/i18n/nl/frontends.md @@ -19,7 +19,7 @@ Als je een instantie gebruikt die door iemand anders wordt beheerd, moet je het ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ Standaard blokkeert FreeTube alle YouTube-advertenties. Bovendien integreert Fre [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ Standaard blokkeert FreeTube alle YouTube-advertenties. Bovendien integreert Fre

Warning

-Als je FreeTube gebruikt, kan je IP-adres nog steeds bekend zijn bij YouTube, [Invidious](https://instances.invidious.io) of [SponsorBlock](https://sponsor.ajay.app/), afhankelijk van je configuratie. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ Als je FreeTube gebruikt, kan je IP-adres nog steeds bekend zijn bij YouTube, [I **Yattee** is een gratis en open-source privacy georiënteerde videospeler voor iOS, tvOS en macOS voor [YouTube](https://youtube.com). Wanneer je Yattee gebruikt, wordt je abonnementenlijst lokaal op je toestel opgeslagen. -Je zult een paar [extra stappen](https://gonzoknows.com/posts/Yattee/) moeten nemen voordat je Yattee kunt gebruiken om YouTube te kijken, vanwege beperkingen in de App Store. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ Je zult een paar [extra stappen](https://gonzoknows.com/posts/Yattee/) moeten ne
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ Je zult een paar [extra stappen](https://gonzoknows.com/posts/Yattee/) moeten ne

Warning

-Wanneer je Yattee gebruikt, is jouw IP-adres mogelijk nog steeds bekend bij YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) of [SponsorBlock](https://sponsor.ajay.app/), afhankelijk van jouw configuratie. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ Met LibreTube kunt u uw abonnementenlijst en afspeellijsten lokaal op uw Android

Warning

-Wanneer u LibreTube gebruikt, is uw IP-adres zichtbaar voor de door u gekozen instantie [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) en/of [SponsorBlock](https://sponsor.ajay.app/), afhankelijk van uw configuratie. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ LibreTube blokkeert standaard alle YouTube-advertenties. Bovendien gebruikt Libr ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is een gratis en open-source Android applicatie voor [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), en [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Uw abonnementenlijst en afspeellijsten worden lokaal op uw Android toestel opgeslagen. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Uw abonnementenlijst en afspeellijsten worden lokaal op uw Android toestel opges -1. De standaard instantie is [FramaTube](https://framatube.org/), maar er kunnen er meer worden toegevoegd via **Instellingen** → **Inhoud** → **PeerTube instanties** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentatie} -[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Broncode" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Bijdragen } +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,9 +226,9 @@ Piped vereist JavaScript om te kunnen functioneren en er zijn een aantal openbar [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentatie} -[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Broncode" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Bijdragen } +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute }
diff --git a/i18n/nl/index.md b/i18n/nl/index.md index 3f281208..71f35695 100644 --- a/i18n/nl/index.md +++ b/i18n/nl/index.md @@ -62,12 +62,12 @@ Het is onpraktisch, duur en vermoeiend om te proberen al jouw gegevens altijd te ## We hebben je nodig! Zo kan je betrokken raken: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Word lid van ons forum" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Volg ons op Mastodon" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Draag bij aan deze website" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help deze website vertalen" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat met ons op Matrix" } -[:material-information-outline:](about/index.md){ title="Meer informatie over ons" } -[:material-hand-coin-outline:](about/donate.md){ title="Steun het project" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } Het is belangrijk voor een website zoals Privacy Guides om altijd up-to-date te blijven. Ons publiek moet software-updates in de gaten houden voor de toepassingen die op onze site staan en recent nieuws volgen over aanbieders die wij aanbevelen. Het is moeilijk om het hoge tempo van het internet bij te houden, maar we doen ons best. Als je een fout ziet, denkt dat een provider niet in de lijst thuishoort, merkt dat een gekwalificeerde provider ontbreekt, denkt dat een browserplugin niet langer de beste keuze is, of een ander probleem ontdekt, laat het ons dan weten. diff --git a/i18n/nl/kb-archive.md b/i18n/nl/kb-archive.md index 2c6dcee5..0b42dc29 100644 --- a/i18n/nl/kb-archive.md +++ b/i18n/nl/kb-archive.md @@ -8,10 +8,10 @@ description: Sommige pagina's die vroeger in onze kennisbank zaten, zijn nu te v Sommige pagina's die vroeger in onze kennisbank zaten, zijn nu te vinden op onze blog: -- [GrapheneOS vs CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal configuratie en verharding](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - Systeem verharding](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Applicatie Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Veilig wissen van gegevens](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integreren van metadata verwijdering](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS configuratiegids](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal configuratie en verharding](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - Systeem verharding](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Applicatie Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Veilig wissen van gegevens](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integreren van metadata verwijdering](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS configuratiegids](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/nl/meta/admonitions.md b/i18n/nl/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/nl/meta/admonitions.md +++ b/i18n/nl/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/nl/meta/translations.md b/i18n/nl/meta/translations.md index d25f5107..d5f4d385 100644 --- a/i18n/nl/meta/translations.md +++ b/i18n/nl/meta/translations.md @@ -2,9 +2,9 @@ title: Vertalingen --- -Crowdin heeft goede documentatie en we stellen voor hun [Getting Started](https://support.crowdin.com/crowdin-intro/) gids te bekijken. Onze site is voornamelijk geschreven in [Markdown](https://en.wikipedia.org/wiki/Markdown), dus het zou gemakkelijk moeten zijn om bij te dragen. Deze pagina bevat enkele nuttige suggesties voor het vertalen van een aantal specifieke syntax die je op onze site kan tegenkomen. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Onze site is voornamelijk geschreven in [Markdown](https://en.wikipedia.org/wiki/Markdown), dus het zou gemakkelijk moeten zijn om bij te dragen. Deze pagina bevat enkele nuttige suggesties voor het vertalen van een aantal specifieke syntax die je op onze site kan tegenkomen. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/nl/meta/uploading-images.md b/i18n/nl/meta/uploading-images.md index 4de7106d..146ec2ba 100644 --- a/i18n/nl/meta/uploading-images.md +++ b/i18n/nl/meta/uploading-images.md @@ -17,7 +17,7 @@ Bedrijfslogo's hebben canvas grootte van: ### PNG -Gebruik [OptiPNG](https://sourceforge.net/projects/optipng/) om de PNG-afbeelding te optimaliseren: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/nl/meta/writing-style.md b/i18n/nl/meta/writing-style.md index 999f73cc..9b4dc7ef 100644 --- a/i18n/nl/meta/writing-style.md +++ b/i18n/nl/meta/writing-style.md @@ -4,11 +4,11 @@ title: Schrijfstijl Privacy Guides is geschreven in Amerikaans Engels, en je dient bij twijfel de [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) te raadplegen. -In het algemeen bieden de [Amerikaanse federale richtlijnen inzake klare taal](https://www.plainlanguage.gov/guidelines/) een goed overzicht van hoe duidelijk en beknopt te schrijven. Wij belichten hieronder enkele belangrijke opmerkingen uit deze richtsnoeren. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. Wij belichten hieronder enkele belangrijke opmerkingen uit deze richtsnoeren. ## Schrijven voor ons publiek -Het beoogde [publiek van Privacy Guides](https://www.plainlanguage.gov/guidelines/audience/) is voornamelijk gemiddelde, technologie gebruikende volwassenen. Verlaag de inhoud niet alsof je een middelbare schoolklas toespreekt, maar gebruik niet te veel ingewikkelde terminologie over concepten waarmee de gemiddelde computergebruiker niet vertrouwd is. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Verlaag de inhoud niet alsof je een middelbare schoolklas toespreekt, maar gebruik niet te veel ingewikkelde terminologie over concepten waarmee de gemiddelde computergebruiker niet vertrouwd is. ### Ga alleen in op wat mensen willen weten @@ -24,7 +24,7 @@ We schrijven *voor* een grote verscheidenheid aan mensen, maar we schrijven *voo > > Wanneer je "je" gebruikt om gebruikers aan te spreken, zullen zij eerder begrijpen wat hun verantwoordelijkheid is. -Bron: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Vermijd "gebruikers" @@ -37,7 +37,7 @@ Organisatie is de sleutel. De inhoud moet stromen van de belangrijkste naar de m - Beperk het document tot ongeveer vijf of zes secties. Lange documenten moeten waarschijnlijk worden opgesplitst in afzonderlijke pagina's. - Markeer belangrijke ideeën met **vet** of *cursief*. -Bron: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin met een onderwerpzin @@ -45,7 +45,7 @@ Bron: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We schrijven vaak de manier waarop we denken, waarbij we onze uitgangspunten eerst plaatsen en dan onze conclusie. Het is misschien de natuurlijke manier om gedachten te ontwikkelen, maar we eindigen met de onderwerpzin aan het eind van de alinea. Verplaats het naar voren en laat gebruikers weten waar je naartoe gaat. Laat de lezers niet te veel informatie in hun hoofd houden voordat ze ter zake komen. -Bron: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Kies je woorden zorgvuldig @@ -65,7 +65,7 @@ We moeten proberen afkortingen waar mogelijk te vermijden, maar de technologie z > Onnodige woorden verspillen de tijd van je publiek. Goed schrijven is als een gesprek. Laat informatie weg die het publiek niet hoeft te weten. Dit kan moeilijk zijn als een expert op het gebied van onderwerpen, dus het is belangrijk dat iemand naar de informatie kijkt vanuit het perspectief van het publiek. -Bron: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Tekst conversatief houden @@ -77,7 +77,7 @@ Bron: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > De actieve stem maakt duidelijk wie wat moet doen. Het neemt onduidelijkheid over verantwoordelijkheden weg. Niet "Het moet gebeuren," maar "Je moet het doen." -Bron: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Gebruik "must" voor vereisten diff --git a/i18n/nl/mobile-browsers.md b/i18n/nl/mobile-browsers.md index fc6eea9c..99970fbc 100644 --- a/i18n/nl/mobile-browsers.md +++ b/i18n/nl/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,22 +41,22 @@ Dit zijn onze momenteel aanbevolen mobiele webbrowsers en configuraties voor sta ## Android -Op Android is Firefox nog steeds minder veilig dan op Chromium gebaseerde alternatieven: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), moet nog [site-isolatie](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) ondersteunen of [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196) inschakelen. +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave
-![Brave-logo](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** bevat een ingebouwde inhoudsblokker en [privacyfuncties](https://brave.com/privacy-features/), waarvan vele standaard zijn ingeschakeld. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is gebouwd op het Chromium webbrowser project, dus het zou vertrouwd moeten aanvoelen en minimale website compatibiliteitsproblemen moeten hebben. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ Deze opties zijn te vinden in :material-menu: → **Instellingen** → **Dappere ##### Schilden -Brave bevat enkele anti-vingerafdruk maatregelen in zijn [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) functie. Wij raden aan om deze opties [globaal te configureren](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) voor alle pagina's die je bezoekt. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Deze optie biedt functionaliteit die vergelijkbaar is met uBlock Origin's geavanceerde [blokkeringsmodes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) of de [NoScript](https://noscript.net/) extensie. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Browserdata opschonen @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) maakt jouw surfgegevens (geschiedenis, bladwijzers, enz.) toegankelijk op al jouw apparaten zonder dat je een account nodig hebt en beschermt ze met E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,11 +141,11 @@ Op iOS is elke app die op het web kan surfen beperkt tot [](https://developer.ap ![Safari-logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is de standaardbrowser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is de standaardbrowser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacybeleid" } -[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentatie} +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacyrapport is toegankelijk via het menu Pagina-instellingen. - [ ] Schakel **Privacy Preserving Ad Measurement**uit -Bij het meten van advertentieklikken wordt van oudsher gebruik gemaakt van trackingtechnologie die inbreuk maakt op de privacy van de gebruiker. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is een WebKit-functie en een voorgestelde webstandaard die adverteerders in staat moet stellen de doeltreffendheid van webcampagnes te meten zonder afbreuk te doen aan de privacy van de gebruiker. +Bij het meten van advertentieklikken wordt van oudsher gebruik gemaakt van trackingtechnologie die inbreuk maakt op de privacy van de gebruiker. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. De functie heeft op zichzelf weinig privacyproblemen, dus hoewel je ervoor kunt kiezen om hem ingeschakeld te laten, beschouwen wij het feit dat hij automatisch is uitgeschakeld in Privénavigatie als een aanwijzing om de functie uit te schakelen. @@ -201,9 +201,9 @@ Houd er rekening mee dat privénavigatie geen cookies en gegevens opslaat, zodat ##### iCloud Synchronisatie -De synchronisatie van de Safari-geschiedenis, tabbladgroepen, iCloud-tabbladen en opgeslagen wachtwoorden verloopt via E2EE. Standaard zijn bladwijzers dat echter [niet](https://support.apple.com/en-us/HT202303). Apple kan ze ontsleutelen en openen in overeenstemming met hun [privacybeleid](https://www.apple.com/legal/privacy/en-ww/). +De synchronisatie van de Safari-geschiedenis, tabbladgroepen, iCloud-tabbladen en opgeslagen wachtwoorden verloopt via E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -Je kunt E2EE inschakelen voor jouw Safari bladwijzers en downloads door [Geavanceerde gegevensbescherming](https://support.apple.com/en-us/HT212520)in te schakelen. Ga naar jouw **Apple ID naam → iCloud → Geavanceerde gegevensbescherming**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Ga naar jouw **Apple ID naam → iCloud → Geavanceerde gegevensbescherming**. - [x] Zet **Geavanceerde gegevensbescherming aan** @@ -227,7 +227,7 @@ AdGuard voor iOS heeft enkele premium functies, maar standaard Safari-inhoud blo
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/nl/multi-factor-authentication.md b/i18n/nl/multi-factor-authentication.md index 2cc64db2..8c586cda 100644 --- a/i18n/nl/multi-factor-authentication.md +++ b/i18n/nl/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -De **YubiKeys** behoren tot de meest populaire beveiligingssleutels. Sommige YubiKey modellen hebben een breed scala aan functies, zoals: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 en WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP en HOTP](https://developers.yubico.com/OATH) verificatie. +De **YubiKeys** behoren tot de meest populaire beveiligingssleutels. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -Een van de voordelen van de YubiKey is dat één sleutel bijna alles kan (YubiKey 5), wat je van een hardware beveiligingssleutel mag verwachten. Wij raden je aan om vóór de aankoop de [quiz](https://www.yubico.com/quiz/) te nemen om er zeker van te zijn dat je de juiste keuze maakt. +Een van de voordelen van de YubiKey is dat één sleutel bijna alles kan (YubiKey 5), wat je van een hardware beveiligingssleutel mag verwachten. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentatie} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-Deze [vergelijkingstabel](https://www.yubico.com/store/compare/) toont de kenmerken en hoe de YubiKeys zich tot elkaar verhouden. Wij raden je ten zeerste aan om sleutels uit de YubiKey 5-serie te kiezen. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. Wij raden je ten zeerste aan om sleutels uit de YubiKey 5-serie te kiezen. -YubiKeys kunnen worden geprogrammeerd met behulp van de [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) of [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Voor het beheer van TOTP-codes kunt je de [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)gebruiken. All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. Voor modellen die HOTP en TOTP ondersteunen, zijn er 2 slots in de OTP-interface die kunnen worden gebruikt voor HOTP en 32 slots om TOTP geheimen op te slaan. Deze geheimen worden versleuteld opgeslagen op de sleutel en worden nooit blootgesteld aan de apparaten waarop ze zijn aangesloten. Zodra een "seed" ( het gedeeld geheim) aan de Yubico Authenticator is gegeven, zal deze alleen de zescijferige codes geven, maar nooit de seed. Dit beveiligingsmodel beperkt wat een aanvaller kan doen als hij een van de apparaten waarop de Yubico Authenticator draait, in gevaar brengt en maakt de YubiKey bestand tegen een fysieke aanvaller. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. Als je functies **Nitrokey** heeft een beveiligingssleutel die geschikt is voor [FIDO2 en WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) genaamd de **Nitrokey FIDO2**. Voor PGP-ondersteuning moet je een van hun andere sleutels kopen, zoals de **Nitrokey Start**, **Nitrokey Pro 2** of de **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentatie} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation} -De [vergelijkingstabel](https://www.nitrokey.com/#comparison) toont de kenmerken en hoe de Nitrokey-modellen zich verhouden. De genoemde **Nitrokey 3** zal een gecombineerde functieset hebben. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. De genoemde **Nitrokey 3** zal een gecombineerde functieset hebben. -Nitrokey-modellen kunnen worden geconfigureerd met behulp van de [Nitrokey-app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). Voor de modellen die HOTP en TOTP ondersteunen, zijn er 3 slots voor HOTP en 15 voor TOTP. Sommige Nitrokeys kunnen functioneren als een wachtwoord manager. Ze kunnen 16 verschillende inloggegevens opslaan en deze versleutelen met hetzelfde wachtwoord als de OpenPGP-interface. @@ -74,7 +74,7 @@ Het resetten van de OpenPGP interface op een Nitrokey zal ook de wachtwoord data -De Nitrokey Pro 2, Nitrokey Storage 2 en de komende Nitrokey 3 ondersteunen systeemintegriteitscontrole voor laptops met de [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. De firmware op moderne NitroKey-modellen (behalve de **NitroKey Pro 2**) kan worden bijgewerkt. @@ -127,7 +127,7 @@ Wij raden je ten zeerste aan om mobiele TOTP apps te gebruiken in plaats van des Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ Wij raden je ten zeerste aan om mobiele TOTP apps te gebruiken in plaats van des [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/nl/news-aggregators.md b/i18n/nl/news-aggregators.md index 74d672a8..2f3fbf5a 100644 --- a/i18n/nl/news-aggregators.md +++ b/i18n/nl/news-aggregators.md @@ -21,7 +21,7 @@ Een [nieuwsaggregator](https://en.wikipedia.org/wiki/News_aggregator) is een man [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ Een [nieuwsaggregator](https://en.wikipedia.org/wiki/News_aggregator) is een man [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ Een [nieuwsaggregator](https://en.wikipedia.org/wiki/News_aggregator) is een man **NetNewsWire** een gratis en open-source feedlezer voor macOS en iOS met een focus op een native ontwerp en functieset. Het ondersteunt de typische feed formaten naast ingebouwde ondersteuning voor Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Met Reddit kun je je abonneren op subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ Je kunt zich abonneren op YouTube-kanalen zonder in te loggen en gebruiksinforma To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/nl/notebooks.md b/i18n/nl/notebooks.md index 8eb45916..715ccc89 100644 --- a/i18n/nl/notebooks.md +++ b/i18n/nl/notebooks.md @@ -34,7 +34,7 @@ Standard Notes is een eenvoudige en persoonlijke notitie app die jouw notities g - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ Standard Notes is een eenvoudige en persoonlijke notitie app die jouw notities g ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. Het biedt end-to-end encryptie op alle platformen met een krachtige synchronisatie om je notities onderweg te maken. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. Het biedt end-to-end encryptie op alle platformen met een krachtige synchronisatie om je notities onderweg te maken. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ Standard Notes is een eenvoudige en persoonlijke notitie app die jouw notities g Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is een gratis, open-source, en volledig uitgeruste applicatie voor het maken van notities en to-do's die een groot aantal markdown notities kan verwerken, georganiseerd in notitieblokken en tags. Het biedt E2EE en kan synchroniseren via Nextcloud, Dropbox, en meer. Het biedt ook een gemakkelijke import vanuit Evernote en notities in gewone tekst. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee biedt gratis 100MB opslag, met betaalde opties als je meer nodig hebt. A ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is een [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) voor GNU Emacs. Org-mode is voor het bijhouden van notities, het bijhouden van Todo lijsten, het plannen van projecten, en het schrijven van documenten met een snel en effectief plain-text systeem. Synchronisatie is mogelijk met [bestandssynchronisatie](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is voor het bijhouden van notities, het bijhouden van Todo lijsten, het plannen van projecten, en het schrijven van documenten met een snel en effectief plain-text systeem. Synchronisatie is mogelijk met [bestandssynchronisatie](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentatie} diff --git a/i18n/nl/os/android-overview.md b/i18n/nl/os/android-overview.md index 45894283..bdbe51bf 100644 --- a/i18n/nl/os/android-overview.md +++ b/i18n/nl/os/android-overview.md @@ -60,7 +60,7 @@ Veel OEM's hebben ook een gebroken uitvoering van Verified Boot waar je je bewus Firmware-updates zijn van cruciaal belang voor het behoud van de veiligheid en zonder deze updates kan uw toestel niet veilig zijn. OEM's hebben ondersteuningsovereenkomsten met hun partners om de closed-source componenten voor een beperkte ondersteuningsperiode te leveren. Deze worden gedetailleerd beschreven in de maandelijkse [Android Security Bulletins](https://source.android.com/security/bulletin). -Aangezien de onderdelen van de telefoon, zoals de processor en de radiotechnologieën, afhankelijk zijn van closed-source componenten, moeten de updates door de respectieve fabrikanten worden verstrekt. Daarom is het belangrijk dat u een toestel koopt binnen een actieve ondersteuningscyclus. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) en [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) ondersteunen hun toestellen gedurende 4 jaar, terwijl goedkopere producten vaak kortere ondersteuningscycli hebben. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +Aangezien de onderdelen van de telefoon, zoals de processor en de radiotechnologieën, afhankelijk zijn van closed-source componenten, moeten de updates door de respectieve fabrikanten worden verstrekt. Daarom is het belangrijk dat u een toestel koopt binnen een actieve ondersteuningscyclus. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL-apparaten die niet langer door de SoC-fabrikant worden ondersteund, kunnen geen firmware-updates ontvangen van OEM-verkopers of aftermarket-distributeurs van Android. Dit betekent dat beveiligingsproblemen met die apparaten onopgelost zullen blijven. @@ -97,19 +97,19 @@ Android 13: Een app kan een toestemming vragen voor een specifieke functie die hij heeft. Bijvoorbeeld, elke app die QR-codes kan scannen heeft toestemming voor de camera nodig. Sommige apps kunnen meer toestemmingen vragen dan ze nodig hebben. -[Exodus](https://exodus-privacy.eu.org/) kan nuttig zijn bij het vergelijken van apps die vergelijkbare doelen hebben. Als een app veel machtigingen nodig heeft en veel advertenties en analytics heeft, is dit waarschijnlijk een slecht teken. Wij raden aan de individuele trackers te bekijken en hun beschrijvingen te lezen in plaats van eenvoudigweg **het totaal** te tellen en aan te nemen dat alle vermelde items gelijk zijn. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. Als een app veel machtigingen nodig heeft en veel advertenties en analytics heeft, is dit waarschijnlijk een slecht teken. Wij raden aan de individuele trackers te bekijken en hun beschrijvingen te lezen in plaats van eenvoudigweg **het totaal** te tellen en aan te nemen dat alle vermelde items gelijk zijn.

Warning

-Als een app vooral een webdienst is, kan de tracking aan de serverzijde plaatsvinden. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) toont "geen trackers", maar volgt zeker de interesses en het gedrag van gebruikers op de site. Apps kunnen detectie omzeilen door geen gebruik te maken van door de reclame-industrie geproduceerde standaardcodebibliotheken, hoewel dit onwaarschijnlijk is. +Als een app vooral een webdienst is, kan de tracking aan de serverzijde plaatsvinden. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps kunnen detectie omzeilen door geen gebruik te maken van door de reclame-industrie geproduceerde standaardcodebibliotheken, hoewel dit onwaarschijnlijk is.

Note

-Privacy-vriendelijke apps zoals [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) kunnen sommige trackers tonen zoals [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). Deze bibliotheek bevat [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) die [pushmeldingen](https://en.wikipedia.org/wiki/Push_technology) in apps kan bieden. Dit [is het geval](https://fosstodon.org/@bitwarden/109636825700482007) met Bitwarden. Dat betekent niet dat Bitwarden alle analysefuncties gebruikt die Google Firebase Analytics biedt. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). Deze bibliotheek bevat [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) die [pushmeldingen](https://en.wikipedia.org/wiki/Push_technology) in apps kan bieden. Dit [is het geval](https://fosstodon.org/@bitwarden/109636825700482007) met Bitwarden. Dat betekent niet dat Bitwarden alle analysefuncties gebruikt die Google Firebase Analytics biedt.
@@ -145,20 +145,20 @@ Als je een apparaat gebruikt met Google-diensten, hetzij ujouw standaard besturi ### Geavanceerd beschermingsprogramma -Als je een Google-account hebt, raden wij je aan je in te schrijven voor het [Advanced Protection Program](https://landing.google.com/advancedprotection/). Het is gratis beschikbaar voor iedereen met twee of meer hardware beveiligingssleutels met [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) ondersteuning. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). Het is gratis beschikbaar voor iedereen met twee of meer hardware beveiligingssleutels met [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) ondersteuning. Het geavanceerde beschermingsprogramma biedt verbeterde controle op bedreigingen en maakt het mogelijk: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Alleen Google en geverifieerde apps van derden hebben toegang tot accountgegevens - Scannen van inkomende e-mails op Gmail-accounts voor [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) pogingen -- Strengere [veilige browser scannen](https://www.google.com/chrome/privacy/whitepaper.html#malware) met Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Striktere herstelprocedure voor accounts met verloren inloggegevens - Als je gebruikmaakt van niet-sandboxed Google Play Services (gebruikelijk op standaard besturingssystemen), wordt het Advanced Protection Program ook geleverd met [extra voordelen](https://support.google.com/accounts/answer/9764949?hl=en), zoals: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Verplichte automatische apparaatscan met [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Je waarschuwt voor niet geverifieerde toepassingen ### Google Play Systeem Updates @@ -169,7 +169,7 @@ Als je een EOL-apparaat hebt dat met Android 10 of hoger wordt geleverd en geen ### Reclame-ID -Alle apparaten waarop Google Play Services zijn geïnstalleerd, genereren automatisch een [-reclame-ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) die wordt gebruikt voor gerichte reclame. Schakel deze functie uit om de over je verzamelde gegevens te beperken. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Schakel deze functie uit om de over je verzamelde gegevens te beperken. Op Android distributies met [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), ga naar :gear: **Instellingen** → **Apps** → **Sandboxed Google Play** → **Google Instellingen** → **Advertenties**, en selecteer *Verwijder reclame ID*. diff --git a/i18n/nl/os/ios-overview.md b/i18n/nl/os/ios-overview.md index 0bf3105b..1a61443f 100644 --- a/i18n/nl/os/ios-overview.md +++ b/i18n/nl/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/nl/os/linux-overview.md b/i18n/nl/os/linux-overview.md index e9131088..0fe826bd 100644 --- a/i18n/nl/os/linux-overview.md +++ b/i18n/nl/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Vermijd telemetrie die vaak gepaard gaat met propriëtaire besturingssystemen -- Handhaving van [softwarevrijheid](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Uw distributie kiezen @@ -42,9 +42,9 @@ Niet alle Linux-distributies zijn gelijk geschapen. Our [Linux recommendation pa Wij raden je ten zeerste aan distributies te kiezen die dicht bij de stabiele upstream software releases blijven, vaak aangeduid als rolling release distributies. Dit komt omdat distributies met een bevroren releasecyclus vaak de pakketversies niet bijwerken en achterlopen op beveiligingsupdates. -Voor bevroren distributies wordt van pakketbeheerders verwacht dat ze patches backporteren om kwetsbaarheden te verhelpen (Debian is zo'n [voorbeeld](https://www.debian.org/security/faq#handling)) in plaats van de software aan te passen aan de "volgende versie" die door de upstream-ontwikkelaar wordt uitgebracht. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. Als gevolg daarvan worden kleine beveiligingsupdates soms uitgesteld tot de volgende grote release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. Als gevolg daarvan worden kleine beveiligingsupdates soms uitgesteld tot de volgende grote release. -Wij geloven niet dat het een goed idee is om pakketten tegen te houden en tussentijdse patches toe te passen, aangezien dit afwijkt van de manier waarop de ontwikkelaar de software bedoeld zou kunnen hebben. [Richard Brown](https://rootco.de/aboutme/) heeft hier een presentatie over: +Wij geloven niet dat het een goed idee is om pakketten tegen te houden en tussentijdse patches toe te passen, aangezien dit afwijkt van de manier waarop de ontwikkelaar de software bedoeld zou kunnen hebben. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re Voor een veilig systeem wordt ook verwacht dat je voldoende Linux kennis hebt om de beveiliging van hun systeem goed in te stellen, zoals het aannemen van een [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) systeem, het opzetten van [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, het harden van boot parameters, het manipuleren van [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, en weten welke componenten ze nodig hebben zoals [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR-pakketten zijn door de gemeenschap geproduceerde inhoud en worden op geen enkele manier doorgelicht, en zijn daarom kwetsbaar voor aanvallen op de softwareketen, wat in het verleden inderdaad is gebeurd [](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Vergelijkbare waarschuwingen gelden voor het gebruik van Personal Package Archives (PPA's) van derden op Debian gebaseerde distributies of Community Projects (COPR) op Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: Deze distributie houdt pakketten 2 weken achter om er zeker van te zijn dat hun eigen veranderingen niet kapot gaan, niet om er zeker van te zijn dat upstream stabiel is. Wanneer AUR pakketten worden gebruikt, worden ze vaak gebouwd tegen de laatste [bibliotheken](https://en.wikipedia.org/wiki/Library_(computing)) uit Arch's repositories. -- **Garuda**: Zij gebruiken [Chaotic-AUR](https://aur.chaotic.cx/) die automatisch en blindelings pakketten compileert uit de AUR. Er is geen verificatieproces om ervoor te zorgen dat de AUR-pakketten niet te lijden hebben van aanvallen op de toeleveringsketen. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. Er is geen verificatieproces om ervoor te zorgen dat de AUR-pakketten niet te lijden hebben van aanvallen op de toeleveringsketen. ### Linux-libre kernel en "Libre" distributies -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## Algemene aanbevelingen @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit De meeste Linux-distributies hebben een optie in het installatieprogramma om [LUKS](../encryption.md#linux-unified-key-setup) FDE in te schakelen. Als deze optie niet is ingesteld tijdens de installatie, zult je een back-up van jouw gegevens moeten maken en opnieuw moeten installeren, aangezien de versleuteling wordt toegepast na [schijfpartitionering](https://en.wikipedia.org/wiki/Disk_partitioning), maar voordat [bestandssystemen](https://en.wikipedia.org/wiki/File_system) worden geformatteerd. We raden je ook aan jouw opslagapparaat veilig te wissen: -- [Veilig wissen van gegevens :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Veilig wissen van gegevens :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Wissel @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). Als je een van deze omgevingen gebruikt is het zo eenvoudig als het selecteren van de "Wayland" sessie bij de desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). Als je een van deze omgevingen gebruikt is het zo eenvoudig als het selecteren van de "Wayland" sessie bij de desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). Wij raden **aan tegen** door desktop omgevingen of window managers te gebruiken die geen Wayland ondersteuning hebben, zoals Cinnamon (standaard op Linux Mint), Pantheon (standaard op Elementary OS), MATE, Xfce, en i3. ### Eigen firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Enkele opmerkelijke voorbeelden van deze kwetsbaarheden zijn [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), en andere [hardwarekwetsbaarheden](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora en openSUSE hebben beide standaard de microcode updates toegepast. @@ -131,11 +131,11 @@ Bovendien downloaden sommige distributies firmware-updates niet automatisch. Daa Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -Het is mogelijk om [te randomiseren](https://fedoramagazine.org/randomize-mac-address-nm/) het [MAC adres](https://en.wikipedia.org/wiki/MAC_address) bij gebruik van NetworkManager. Dit zorgt voor wat meer privacy op Wi-Fi-netwerken, omdat het moeilijker wordt specifieke apparaten op het netwerk waarmee u verbonden bent, te traceren. Het doet [**niet**](https://papers.mathyvanhoef.com/wisec2016.pdf) maakt je anoniem. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. Dit zorgt voor wat meer privacy op Wi-Fi-netwerken, omdat het moeilijker wordt specifieke apparaten op het netwerk waarmee u verbonden bent, te traceren. Het doet [**niet**](https://papers.mathyvanhoef.com/wisec2016.pdf) maakt je anoniem. -Wij raden aan de instelling te wijzigen in **random** in plaats van **stable**, zoals voorgesteld in het [artikel](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -Als je [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components)gebruikt, moet je [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) instellen, waardoor [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=)wordt ingeschakeld. +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Het willekeurig maken van Wi-Fi MAC-adressen hangt af van de ondersteuning door de firmware van de Wi-Fi. @@ -151,6 +151,6 @@ Er zijn andere systeemidentifiers waar u misschien voorzichtig mee moet zijn. Je Het Fedora Project [telt](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) hoeveel unieke systemen toegang hebben tot zijn spiegels door gebruik te maken van een [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variabele in plaats van een uniek ID. Fedora doet dit om de belasting te bepalen en waar nodig betere servers voor updates te voorzien. -Deze [optie](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) staat momenteel standaard uit. We raden aan om `countme=false` toe te voegen aan `/etc/dnf/dnf.conf` voor het geval het in de toekomst wordt ingeschakeld. Op systemen die `rpm-ostree` gebruiken, zoals Silverblue, wordt de countme optie uitgeschakeld door de [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer te maskeren. +Deze [optie](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) staat momenteel standaard uit. We raden aan om `countme=false` toe te voegen aan `/etc/dnf/dnf.conf` voor het geval het in de toekomst wordt ingeschakeld. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE gebruikt ook een [unieke ID](https://en.opensuse.org/openSUSE:Statistics) om systemen te tellen, die kan worden uitgeschakeld door het bestand `/var/lib/zypp/AnonymousUniqueId` te verwijderen. diff --git a/i18n/nl/os/macos-overview.md b/i18n/nl/os/macos-overview.md index ccb0a777..49900560 100644 --- a/i18n/nl/os/macos-overview.md +++ b/i18n/nl/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is een Unix besturingssysteem ontwikkeld door Apple voor hun Mac computers. Om de privacy op macOS te verbeteren, kun je telemetry functies uitschakelen en bestaande privacy-en beveiligingsinstellingen aanscherpen. -Oudere op Intel-gebaseerde Macs en Hackintoshes ondersteunen niet alle beveiligingsfuncties die macOS biedt. Om de gegevensbeveiliging te verbeteren, raden we een nieuwere Mac met [Apple silicon](https://support.apple.com/en-us/HT211814) aan. +Oudere op Intel-gebaseerde Macs en Hackintoshes ondersteunen niet alle beveiligingsfuncties die macOS biedt. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Opmerkingen @@ -22,13 +22,13 @@ macOS voert online controles uit wanneer u een app opent om te controleren of ee Vroeger werden deze controles uitgevoerd via een niet-versleuteld OCSP-protocol, dat informatie kon lekken over de apps die je gebruikt naar het netwerk waarmee je verbonden was. Apple heeft hun OCSP-service geüpgraded om HTTPS encryptie te gebruiken in 2021, en [plaatste informatie](https://support.apple.com/HT202491) over hun logboekbeleid voor deze service. Ze beloofden bovendien een mechanisme toe te voegen voor de opt-out van deze onlinecontrole, maar dit is niet toegevoegd aan macOS op het moment van schrijven (juli 2023). -Terwijl jij [](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) deze controle relatief gemakkelijk kan uitschakelen, raden wij aan om dit niet te doen tenzij je ernstig gecompromitteerd wordt door de intrekkingscontroles uitgevoerd door macOS, omdat ze een belangrijke rol spelen door ervoor te zorgen dat gecompromitteerde apps niet kunnen werken. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Aanbevolen configuratie Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/nl/os/qubes-overview.md b/i18n/nl/os/qubes-overview.md index 131db308..e0d5b6ef 100644 --- a/i18n/nl/os/qubes-overview.md +++ b/i18n/nl/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## Hoe werkt Qubes OS? -Qubes gebruikt [compartimentering](https://www.qubes-os.org/intro/) om het systeem veilig te houden. Qubes worden aangemaakt op basis van sjablonen, waarbij de standaard opties Fedora, Debian en [Whonix](../desktop.md#whonix)zijn. Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes worden aangemaakt op basis van sjablonen, waarbij de standaard opties Fedora, Debian en [Whonix](../desktop.md#whonix)zijn. Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architectuur](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architectuur, Krediet: Wat is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. Je kunt bijvoorbeeld een specifieke kleur gebruiken voor jouw bankbrowser, en een andere kleur voor een algemene niet-vertrouwde browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. Je kunt bijvoorbeeld een specifieke kleur gebruiken voor jouw bankbrowser, en een andere kleur voor een algemene niet-vertrouwde browser. ![Gekleurde rand](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes vensterranden, krediet: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Tekst kopiëren en plakken -Je kunt [tekst kopiëren en plakken](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) met behulp van `qvm-copy-to-vm` of de onderstaande instructies: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. Daarbij worden de wijzigingen niet onmiddellijk aangebracht en kunnen ze bij een ongeval gemakkelijk ongedaan worden gemaakt. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. Daarbij worden de wijzigingen niet onmiddellijk aangebracht en kunnen ze bij een ongeval gemakkelijk ongedaan worden gemaakt. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interacties -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. Het is gebouwd bovenop de Xen-bibliotheek *vchan*, die [isolatie vergemakkelijkt door middel van beleid](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Extra bronnen -Voor aanvullende informatie raden wij je aan de uitgebreide Qubes OS documentatie pagina's te raadplegen op de [Qubes OS Website](https://www.qubes-os.org/doc/). Offline kopieën kunnen worden gedownload van het Qubes OS [documentatie archief](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline kopieën kunnen worden gedownload van het Qubes OS [documentatie archief](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/nl/passwords.md b/i18n/nl/passwords.md index 73323140..60a5624c 100644 --- a/i18n/nl/passwords.md +++ b/i18n/nl/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Wachtwoord Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Wachtwoord Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Wachtwoord Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Wachtwoord Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Met wachtwoord Managers kunt je wachtwoorden en andere geheimen veilig opslaan e Ingebouwde wachtwoord managers in software zoals browsers en besturingssystemen zijn soms niet zo goed als speciale software voor wachtwoordbeheer. Het voordeel van een ingebouwde wachtwoord manager is een goede integratie met de software, maar het kan vaak erg eenvoudig zijn en mist privacy- en beveiligingsfuncties die aanbiedingen van derden wel hebben. -De wachtwoord manager in Microsoft Edge biedt bijvoorbeeld helemaal geen E2EE. Google's wachtwoord manager heeft [optional](https://support.google.com/accounts/answer/11350823) E2EE, en [Apple's](https://support.apple.com/en-us/HT202303) biedt standaard E2EE. +De wachtwoord manager in Microsoft Edge biedt bijvoorbeeld helemaal geen E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ Deze wachtwoordbeheerders synchroniseren jouw wachtwoorden met een cloudserver v [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ Deze wachtwoordbeheerders synchroniseren jouw wachtwoorden met een cloudserver v -Bitwarden beschikt ook over de tool genaamd [Bitwarden Send](https://bitwarden.com/products/send/), waarmee je veilig tekst en bestanden kunt delen met [end-to-end encryptie](https://bitwarden.com/help/send-encryption). Een [wachtwoord](https://bitwarden.com/help/send-privacy/#send-passwords) kan nodig zijn samen met de verzendlink. Bitwarden Send beschikt ook over [automatische verwijdering](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). Een [wachtwoord](https://bitwarden.com/help/send-privacy/#send-passwords) kan nodig zijn samen met de verzendlink. Bitwarden Send beschikt ook over [automatische verwijdering](https://bitwarden.com/help/send-lifespan). U hebt het [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) nodig om bestanden te kunnen delen. Het gratis plan staat alleen het delen van tekst toe. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is een wachtwoordmanager met een sterke focus op veiligheid en gebruiksgemak, waarmee je wachtwoorden, creditcards, softwarelicenties en andere gevoelige informatie kunt opslaan in een veilige digitale kluis. Uw kluis wordt gehost op de servers van 1Password voor een [maandelijkse vergoeding](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) op regelmatige basis en biedt uitzonderlijke klantenondersteuning. 1Password is closed source; de beveiliging van het product is echter grondig gedocumenteerd in hun [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is een wachtwoordmanager met een sterke focus op veiligheid en gebruiksgemak, waarmee je wachtwoorden, creditcards, softwarelicenties en andere gevoelige informatie kunt opslaan in een veilige digitale kluis. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; de beveiliging van het product is echter grondig gedocumenteerd in hun [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ Een voordeel van 1Password ten opzichte van Bitwarden is de eersteklas ondersteu Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ Met deze opties kunt je een versleutelde wachtwoorddatabase lokaal beheren. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC slaat zijn exportgegevens op als [CSV](https://en.wikipedia.org/wiki/C **KeePassDX** is een lichtgewicht wachtwoordmanager voor Android, waarmee versleutelde gegevens in een enkel bestand in KeePass-formaat kunnen worden bewerkt en de formulieren op een veilige manier kunnen worden ingevuld. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) maakt het mogelijk om cosmetische inhoud en niet-standaard protocolfuncties vrij te spelen, maar belangrijker nog, het helpt en stimuleert de ontwikkeling. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC slaat zijn exportgegevens op als [CSV](https://en.wikipedia.org/wiki/C ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is een native, open-source wachtwoordmanager voor iOS en macOS. Strongbox ondersteunt zowel KeePass als Password Safe formaten en kan worden gebruikt in combinatie met andere wachtwoordmanagers, zoals KeePassXC, op niet-Apple platforms. Door gebruik te maken van een [freemium model](https://strongboxsafe.com/pricing/), biedt Strongbox de meeste functies aan in zijn gratis plan met meer op gemak gerichte [features](https://strongboxsafe.com/comparison/)-zoals biometrische authenticatie- vergrendeld achter een abonnement of eeuwigdurende licentie. +**Strongbox** is een native, open-source wachtwoordmanager voor iOS en macOS. Strongbox ondersteunt zowel KeePass als Password Safe formaten en kan worden gebruikt in combinatie met andere wachtwoordmanagers, zoals KeePassXC, op niet-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Bovendien wordt er een offline versie aangeboden: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). Deze versie is uitgekleed in een poging het aanvalsoppervlak te verkleinen. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Deze versie is uitgekleed in een poging het aanvalsoppervlak te verkleinen. ### Command-line @@ -356,7 +356,7 @@ Deze producten zijn minimale wachtwoordmanagers die kunnen worden gebruikt binne **gopass** is een wachtwoordmanager voor de commandoregel geschreven in Go. Het werkt op alle belangrijke desktop- en serverbesturingssystemen (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ Deze producten zijn minimale wachtwoordmanagers die kunnen worden gebruikt binne
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/nl/photo-management.md b/i18n/nl/photo-management.md index 518f4161..c2aaaae9 100644 --- a/i18n/nl/photo-management.md +++ b/i18n/nl/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/nl/productivity.md b/i18n/nl/productivity.md index 1eff5a70..34518e37 100644 --- a/i18n/nl/productivity.md +++ b/i18n/nl/productivity.md @@ -19,9 +19,9 @@ De meeste online office suites ondersteunen geen E2EE, wat betekent dat de cloud [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,10 +53,10 @@ Wij raden het gebruik van de [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is een privé alternatief voor populaire office tools. Alle inhoud op deze webdienst is end-to-end versleutelden kan gemakkelijk met andere gebruikers worden gedeeld. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentatie} -[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Broncode" } -[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Bijdragen } +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute }
@@ -99,20 +99,20 @@ Onze best-case criteria geven aan wat wij zouden willen zien van het perfecte pr **LibreOffice** is een gratis en open-source kantoorpakket met uitgebreide functionaliteit. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Onze best-case criteria geven aan wat wij zouden willen zien van het perfecte pr **OnlyOffice** is een gratis en open-source kantoorpakket in de cloud met uitgebreide functionaliteit, inclusief integratie met Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Onze best-case criteria geven aan wat wij zouden willen zien van het perfecte pr - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,9 +176,9 @@ In het algemeen definiëren wij kantoorsuites als toepassingen die voor de meest **PrivateBin** is een minimalistische, open-source online pastebin waar de server geen kennis heeft van geplakte data. Gegevens worden in de browser versleuteld/ontsleuteld met 256-bit AES. Het is de verbeterde versie van ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentatie} -[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Broncode" } +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
diff --git a/i18n/nl/real-time-communication.md b/i18n/nl/real-time-communication.md index a58090b8..78c77605 100644 --- a/i18n/nl/real-time-communication.md +++ b/i18n/nl/real-time-communication.md @@ -22,18 +22,18 @@ Deze boodschappers zijn geweldig voor het beveiligen van jouw gevoelige communic **Signal** is een mobiele app ontwikkeld door Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Persoonlijke profielen worden ook versleuteld en alleen gedeeld met contacten waarmee je chat. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signaal heeft minimale metadata wanneer [Verzegelde Afzender](https://signal.org/blog/sealed-sender/) is ingeschakeld. Het afzenderadres is versleuteld samen met de inhoud van het bericht, en alleen het adres van de ontvanger is zichtbaar voor de server. Verzegelde afzender is alleen ingeschakeld voor mensen in uw contactenlijst, maar kan ingeschakeld zijn voor alle ontvangers met een verhoogd risico om spam te ontvangen. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Persoonlijke profielen worden ook versleuteld en alleen gedeeld met contacten waarmee je chat. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. Het afzenderadres is versleuteld samen met de inhoud van het bericht, en alleen het adres van de ontvanger is zichtbaar voor de server. Verzegelde afzender is alleen ingeschakeld voor mensen in uw contactenlijst, maar kan ingeschakeld zijn voor alle ontvangers met een verhoogd risico om spam te ontvangen. -Het protocol was onafhankelijk [gecontroleerd](https://eprint.iacr.org/2016/1013.pdf) in 2016. De specificatie van het Signaal-protocol kan worden gevonden in hun [documentatie](https://signal.org/docs/). +Het protocol was onafhankelijk [gecontroleerd](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We hebben nog enkele extra tips over het configureren en verharden van jouw signaalinstallatie: -[Signaalconfiguratie en Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signaalconfiguratie en Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We hebben nog enkele extra tips over het configureren en verharden van jouw sign Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is een versleutelde instant messenger die [connects](https://briarproject.org/how-it-works/) gebruikt voor andere clients via het Tor Netwerk. Briar kan ook verbinding maken via Wi-Fi of Bluetooth wanneer hij in de buurt is. Briar's lokale mesh-modus kan nuttig zijn wanneer de beschikbaarheid van internet een probleem is. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar kan ook verbinding maken via Wi-Fi of Bluetooth wanneer hij in de buurt is. Briar's lokale mesh-modus kan nuttig zijn wanneer de beschikbaarheid van internet een probleem is. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and Om een contact toe te voegen aan Briar, moet je eerst beide elkaar toevoegen. Je kunt `briar://` links ruilen of de QR-code van een contactpersoon scannen als deze dichtbij zijn. -De clientsoftware was onafhankelijk [gecontroleerd](https://briarproject.org/news/2017-beta-released-security-audit/), en het anonieme routing protocol maakt gebruik van het Tor netwerk dat ook is gecontroleerd. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar heeft een volledig [gepubliceerde specificatie](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Berichten en bestanden die in privéruimten worden gedeeld (waarvoor een uitnodiging nodig is) zijn standaard E2EE, net als één-op-één spraak- en videogesprekken. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Berichten en bestanden die in privéruimten worden gedeeld (waarvoor een uitnodi Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Groepsgesprekken voor spraak en video zijn [niet](https://github.com/vector-im/e The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -Het protocol is in 2016 onafhankelijk [gecontroleerd](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last). De specificatie van het Matrix-protocol is te vinden in hun [documentatie](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +Het protocol is in 2016 onafhankelijk [gecontroleerd](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last). The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ Het protocol is in 2016 onafhankelijk [gecontroleerd](https://matrix.org/blog/20 **Session** is een gedecentraliseerde messenger met een focus op private, veilige en anonieme communicatie. Session biedt ondersteuning voor directe berichten, groepschats en spraakoproepen. -Session maakt gebruik van het gedecentraliseerde [Oxen Service Node Network](https://oxen.io/) om berichten op te slaan en te routeren. Elk versleuteld bericht wordt door drie knooppunten in het Oxen Service Node Network geleid, waardoor het voor de knooppunten vrijwel onmogelijk wordt zinvolle informatie te verzamelen over degenen die het netwerk gebruiken. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Elk versleuteld bericht wordt door drie knooppunten in het Oxen Service Node Network geleid, waardoor het voor de knooppunten vrijwel onmogelijk wordt zinvolle informatie te verzamelen over degenen die het netwerk gebruiken. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/nl/router.md b/i18n/nl/router.md index 4c15f7a4..38ffdb97 100644 --- a/i18n/nl/router.md +++ b/i18n/nl/router.md @@ -35,10 +35,10 @@ Je kunt OpenWrt's [tabel van hardware](https://openwrt.org/toh/start) raadplegen **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense wordt gewoonlijk ingezet als perimeter firewall, router, draadloos toegangspunt, DHCP server, DNS server en VPN eindpunt. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentatie} -[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Broncode" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Bijdrage leveren } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/nl/search-engines.md b/i18n/nl/search-engines.md index e6cfee09..994652a0 100644 --- a/i18n/nl/search-engines.md +++ b/i18n/nl/search-engines.md @@ -10,7 +10,7 @@ Gebruik een zoekmachine die geen advertentieprofiel opbouwt op basis van jouw zo De aanbevelingen hier zijn gebaseerd op de verdiensten van het privacybeleid van elke dienst. Er is **geen garantie** dat dit privacybeleid wordt nageleefd. -Overweeg het gebruik van een [VPN](vpn.md) of [Tor](https://www.torproject.org/) als jouw dreigingsmodel vereist dat je jouw IP-adres verbergt voor de zoekprovider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,10 +24,10 @@ Brave Search bevat unieke functies zoals Discussies, die resultaten accentueert Wij raden je aan [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) uit te schakelen, aangezien deze standaard is ingeschakeld en kan worden uitgeschakeld in de instellingen. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } -[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion" } -[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacybeleid" } -[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentatie} +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation}
@@ -41,14 +41,14 @@ Brave Search is gevestigd in de Verenigde Staten. In hun [privacybeleid](https:/ ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is een van de meer mainstream privé zoekmachine opties. Opmerkelijke DuckDuckGo-zoekfuncties zijn [bangs](https://duckduckgo.com/bang) en vele [instant antwoorden](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). De zoekmachine maakt gebruik van een commerciële Bing API voor de meeste resultaten, maar gebruikt ook talrijke [andere bronnen](https://help.duckduckgo.com/results/sources/) voor directe antwoorden en andere niet-primaire resultaten. +**DuckDuckGo** is een van de meer mainstream privé zoekmachine opties. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is de standaard zoekmachine voor de Tor Browser en is één van de weinige beschikbare opties op Apple's Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } -[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion" } -[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacybeleid" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentatie} +[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation} @@ -56,7 +56,7 @@ DuckDuckGo is de standaard zoekmachine voor de Tor Browser en is één van de we DuckDuckGo is gevestigd in de Verenigde Staten. In hun [privacybeleid](https://duckduckgo.com/privacy) staat dat zij **wel** jouw zoekopdrachten registreren voor productverbetering, maar niet jouw IP-adres of enige andere persoonlijk identificeerbare informatie. -DuckDuckGo biedt twee [andere versies](https://help.duckduckgo.com/features/non-javascript/) van hun zoekmachine, die beide geen JavaScript vereisen. Deze versies missen echter functies. Deze versies kunnen ook worden gebruikt in combinatie met hun [Tor onion adres](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) door [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) of [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) toe te voegen voor de respectieve versie. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. Deze versies missen echter functies. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,8 +67,8 @@ DuckDuckGo biedt twee [andere versies](https://help.duckduckgo.com/features/non- **SearXNG** is een open-source, zelf-hostbare, metasearch engine, die de resultaten van andere zoekmachines aggregeert, maar zelf geen informatie opslaat. Het is een actief onderhouden vork van [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} -[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Broncode" } +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} +[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" } @@ -87,11 +87,11 @@ Wanneer je een SearXNG-instantie gebruikt, moet je zeker hun privacybeleid lezen ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. Eén van Startpage's unieke eigenschappen is de [Anonymous View](https://www.startpage.com/en/anonymous-view/), die inspanningen levert om gebruikersactiviteit te standaardiseren zodat het moeilijker is om uniek geïdentificeerd te worden. De functie kan nuttig zijn voor het verbergen van [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) netwerk- en browsereigenschappen. In tegenstelling tot wat de naam suggereert, mag deze functie niet worden gebruikt voor anonimiteit. Als u op zoek bent naar anonimiteit, gebruik dan de [Tor Browser](tor.md#tor-browser). +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. In tegenstelling tot wat de naam suggereert, mag deze functie niet worden gebruikt voor anonimiteit. Als u op zoek bent naar anonimiteit, gebruik dan de [Tor Browser](tor.md#tor-browser). -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacybeleid" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentatie} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} @@ -104,9 +104,9 @@ Startpage beperkt regelmatig de toegang tot de dienst tot bepaalde IP adressen, -Startpage is gevestigd in Nederland. Volgens hun [privacybeleid](https://www.startpage.com/en/privacy-policy/)loggen zij gegevens zoals: besturingssysteem, type browser, en taal. Zij slaan jouw IP-adres, zoekopdrachten of andere persoonlijk identificeerbare informatie niet op. +Startpage is gevestigd in Nederland. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. Zij slaan jouw IP-adres, zoekopdrachten of andere persoonlijk identificeerbare informatie niet op. -Startpage's meerderheidsaandeelhouder is System1, een adtech bedrijf. Wij denken niet dat dit een probleem is, aangezien zij een duidelijk gescheiden [privacybeleid hebben](https://system1.com/terms/privacy-policy). Het Privacy Guides team heeft contact opgenomen met Startpage [in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) om eventuele zorgen weg te nemen over System1's aanzienlijke investering in de dienst. We waren tevreden met de antwoorden die we kregen. +Startpage's meerderheidsaandeelhouder is System1, een adtech bedrijf. Wij denken niet dat dit een probleem is, aangezien zij een duidelijk gescheiden [privacybeleid hebben](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We waren tevreden met de antwoorden die we kregen. ## Criteria diff --git a/i18n/nl/tools.md b/i18n/nl/tools.md index c00077b0..3e852969 100644 --- a/i18n/nl/tools.md +++ b/i18n/nl/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is de meest transparante en betrouwbare website voor Als je op zoek bent naar een specifieke oplossing voor iets, dan zijn dit de hardware en software tools die wij aanbevelen in verschillende categorieën. Onze aanbevolen privacytools zijn in de eerste plaats gekozen op basis van beveiligingskenmerken, met extra nadruk op gedecentraliseerde en open-source tools. Ze zijn van toepassing op een verscheidenheid aan dreigingsmodellen, variërend van bescherming tegen wereldwijde massasurveillanceprogramma's en het vermijden van grote technologiebedrijven tot het beperken van aanvallen, maar alleen jij kunt bepalen wat het beste werkt voor jouw behoeften. -Als je hulp wilt bij het uitzoeken van de beste privacytools en alternatieve programma's voor jouw behoeften, start dan een discussie op ons [forum](https://discuss.privacyguides.net/) of onze [Matrix](https://matrix.to/#/#privacyguides:matrix.org) gemeenschap! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! Voor meer details over elk project, waarom ze werden gekozen, en extra tips of trucs die we aanbevelen, klik op de "Meer informatie"-link in elke sectie, of klik op de aanbeveling zelf om naar die specifieke sectie van de pagina te gaan. @@ -89,7 +89,7 @@ Voor meer details over elk project, waarom ze werden gekozen, en extra tips of t #### DNS Providers -Wij [bevelen](dns.md#recommended-providers) een aantal versleutelde DNS servers aan op basis van verschillende criteria, zoals [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) en [Quad9](https://quad9.net/) onder andere. Wij raden je aan onze pagina's over DNS te lezen voordat je een provider kiest. In veel gevallen wordt het gebruik van een alternatieve DNS-provider niet aanbevolen. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. Wij raden je aan onze pagina's over DNS te lezen voordat je een provider kiest. In veel gevallen wordt het gebruik van een alternatieve DNS-provider niet aanbevolen. [Meer informatie :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/nl/tor.md b/i18n/nl/tor.md index b4230224..e84f9c2a 100644 --- a/i18n/nl/tor.md +++ b/i18n/nl/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: Het **Tor** netwerk is een groep servers beheerd door vrijwilligers waarmee je gratis verbinding kunt maken en je privacy en veiligheid op het internet kunt verbeteren. Individuen en organisaties kunnen ook informatie delen via het Tor-netwerk met ".onion hidden services" zonder hun privacy in gevaar te brengen. Omdat Tor-verkeer moeilijk te blokkeren en te traceren is, is Tor een effectief middel om censuur te omzeilen. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor werkt door je internetverkeer om te leiden via deze door vrijwilligers beheerde servers, in plaats van een directe verbinding te maken met de site die je probeert te bezoeken. Dit versluiert waar het verkeer vandaan komt, en geen enkele server in het verbindingspad kan het volledige pad zien van waar het verkeer vandaan komt en naartoe gaat, wat betekent dat zelfs de servers die je gebruikt om verbinding te maken jouw anonimiteit niet kunnen doorbreken. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is de keuze als je anonimiteit nodig hebt, omdat het je toegang geeft tot het Tor netwerk en bruggen, en het bevat standaard instellingen en extensies die automatisch geconfigureerd worden door de standaard beveiligingsniveaus: *Standard*, *Safer* en *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ Je moet **nooit** extra extensies installeren op Tor Browser of `about:config` i -De Tor Browser is ontworpen om fingerprinting, of het identificeren van jou op basis van je browserconfiguratie, te voorkomen. **Daarom is het absoluut noodzakelijk dat je** de browser niet wijzigt buiten de standaard [beveiligingsniveaus](https://tb-manual.torproject.org/security-settings/). +De Tor Browser is ontworpen om fingerprinting, of het identificeren van jou op basis van je browserconfiguratie, te voorkomen. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is een gratis Tor VPN voor smartphones die het verkeer van elke app op je toestel door het Tor-netwerk leidt. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) @@ -134,7 +134,7 @@ Alle versies zijn ondertekend met dezelfde handtekening, zodat ze onderling comp ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ Alle versies zijn ondertekend met dezelfde handtekening, zodat ze onderling comp Mensen die gecensureerd worden kunnen Snowflake proxies gebruiken om verbinding te maken met het Tor-netwerk. Snowflake is een geweldige manier om bij te dragen aan het netwerk, zelfs als je niet de technische know-how hebt om een Tor relay of bridge te runnen. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake verhoogt jouw privacy op geen enkele manier, en wordt ook niet gebruik Het runnen van een Snowflake proxy is weinig riskant, zelfs meer dan het runnen van een Tor relay of bridge, wat al geen bijzonder riskante onderneming is. Het stuurt echter nog steeds verkeer door jouw netwerk, wat in sommige opzichten gevolgen kan hebben, vooral als jouw netwerk een beperkte bandbreedte heeft. Zorg ervoor dat je [begrijpt hoe Snowflake werkt](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) voordat je beslist of je een proxy wilt gebruiken. -[^1]: De instelling `IsolateDestAddr` wordt besproken op de [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) en [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), waar beide projecten suggereren dat het meestal geen goede aanpak is voor de meeste mensen. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/nl/vpn.md b/i18n/nl/vpn.md index ef8f0647..51d16ff1 100644 --- a/i18n/nl/vpn.md +++ b/i18n/nl/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. Als je op zoek bent naar extra **veiligheid**, moet je er altijd voor zorgen dat je verbinding maakt met websites via HTTPS. Een VPN is geen vervanging voor goede beveiligingspraktijken. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Onze aanbevolen providers gebruiken encryptie, accepteren Monero, ondersteunen W **Proton VPN** is een sterke speler in de VPN-ruimte en is in bedrijf sinds 2016. Proton AG is gevestigd in Zwitserland en biedt een beperkte gratis versie aan en ook een meer uitgebreide premium optie. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ Wij denken ook dat het beter is voor de veiligheid van de privésleutels van de #### :material-check:{ .pg-green } Onafhankelijk geaudit -Vanaf januari 2020, heeft Proton VPN een onafhankelijke audit door SEC Consult ondergaan. SEC Consult vond enkele kwetsbaarheden met een gemiddeld en laag risico in de Windows-, Android- en iOS-applicaties van Proton VPN, die allemaal door Proton VPN "naar behoren waren verholpen" voordat de rapporten werden gepubliceerd. Geen van de geconstateerde problemen zou een aanvaller op afstand toegang hebben verschaft tot jouw apparaat of verkeer. Je kunt individuele rapporten voor elk platform bekijken op [protonvpn.com](https://protonvpn.com/blog/open-source/). In april 2022 onderging Proton VPN [nog een audit](https://protonvpn.com/blog/no-logs-audit/) en het rapport werd [opgesteld door Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). Een [attestatiebrief](https://proton.me/blog/security-audit-all-proton-apps) werd op 9 november 2021 voor de apps van Proton VPN verstrekt door [Securitum](https://research.securitum.com). +Vanaf januari 2020, heeft Proton VPN een onafhankelijke audit door SEC Consult ondergaan. SEC Consult vond enkele kwetsbaarheden met een gemiddeld en laag risico in de Windows-, Android- en iOS-applicaties van Proton VPN, die allemaal door Proton VPN "naar behoren waren verholpen" voordat de rapporten werden gepubliceerd. Geen van de geconstateerde problemen zou een aanvaller op afstand toegang hebben verschaft tot jouw apparaat of verkeer. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). Een [attestatiebrief](https://proton.me/blog/security-audit-all-proton-apps) werd op 9 november 2021 voor de apps van Proton VPN verstrekt door [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-source clients @@ -84,31 +84,31 @@ Proton VPN accepteert, naast credit/debit cards, PayPal en [Bitcoin](advanced/pa #### :material-check:{ .pg-green } WireGuard ondersteuning -Proton VPN ondersteunt hoofdzakelijk het WireGuard® protocol. [WireGuard](https://www.wireguard.com) is een nieuwer protocol dat gebruik maakt van geavanceerde [cryptografie](https://www.wireguard.com/protocol/). Bovendien streeft WireGuard ernaar om eenvoudiger en sneller te zijn. +Proton VPN ondersteunt hoofdzakelijk het WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Bovendien streeft WireGuard ernaar om eenvoudiger en sneller te zijn. -Proton VPN [adviseert](https://protonvpn.com/blog/wireguard/) het gebruik van WireGuard met hun dienst. Op de Windows, macOS, iOS, Android, ChromeOS en Android TV apps van Proton VPN is WireGuard het standaardprotocol; [ondersteuning](https://protonvpn.com/support/how-to-change-vpn-protocols/) voor het protocol is echter niet aanwezig in hun Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN ondersteunt momenteel alleen ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, met een leasetijd van 60 seconden. De Windows-app biedt hiervoor een gemakkelijk toegankelijke optie, terwijl je op andere besturingssystemen je eigen [NAT-PMP-client](https://protonvpn.com/support/port-forwarding-manual-setup/)moet draaien. Torrent toepassingen ondersteunen vaak de NAT-PMP volledig. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent toepassingen ondersteunen vaak de NAT-PMP volledig. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobiele Clients -Naast het leveren van standaard OpenVPN-configuratiebestanden, heeft Proton VPN mobiele clients voor [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), en [GitHub](https://github.com/ProtonVPN/android-app/releases) die eenvoudige verbindingen met hun servers mogelijk maken. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Aanvullende functionaliteit -Proton VPN heeft eigen servers en datacenters in Zwitserland, IJsland en Zweden. Ze bieden adblocking en het blokkeren van bekende malware domeinen met hun DNS service. They offer content blocking and known-malware blocking with their DNS service. Bovendien biedt Proton VPN ook "Tor" -servers waarmee je eenvoudig verbinding kunt maken met. onion sites, maar we raden je nog steeds ten zeerste aan om hiervoor [de officiële Tor Browser](https://www.torproject.org/) te gebruiken. +Proton VPN heeft eigen servers en datacenters in Zwitserland, IJsland en Zweden. Ze bieden adblocking en het blokkeren van bekende malware domeinen met hun DNS service. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch-functie is kapot op Intel-gebaseerde Macs -Systeemcrashes [kunnen optreden](https://protonvpn.com/support/macos-t2-chip-kill-switch/) op Intel-gebaseerde Macs bij het gebruik van de VPN killswitch. Als je deze functie nodig hebt, en je gebruikt een Mac met Intel-chipset, moet je overwegen een andere VPN-dienst te gebruiken. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. Als je deze functie nodig hebt, en je gebruikt een Mac met Intel-chipset, moet je overwegen een andere VPN-dienst te gebruiken. ### IVPN @@ -118,9 +118,9 @@ Systeemcrashes [kunnen optreden](https://protonvpn.com/support/macos-t2-chip-kil **IVPN** is een premium VPN-provider en zijn actief sinds 2009. IVPN is gevestigd in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ Systeemcrashes [kunnen optreden](https://protonvpn.com/support/macos-t2-chip-kil - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ Systeemcrashes [kunnen optreden](https://protonvpn.com/support/macos-t2-chip-kil #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Dit komt door een kortere route (minder hops) naar de bestemming. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Dit komt door een kortere route (minder hops) naar de bestemming. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ Wij denken ook dat het beter is voor de veiligheid van de privésleutels van de #### :material-check:{ .pg-green } Onafhankelijk geaudit -IVPN heeft een [no-logging audit ondergaan van Cure53](https://cure53.de/audit-report_ivpn.pdf) die concludeerde in overeenstemming met de no-logging claim van IVPN. IVPN heeft ook een [uitgebreid pentest rapport afgerond Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in januari 2020. IVPN heeft ook gezegd dat het van plan is om in de toekomst [jaarverslagen](https://www.ivpn.net/blog/independent-security-audit-concluded) te publiceren. In april 2022 werd een verdere evaluatie uitgevoerd [](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) en door Cure53 [geproduceerd op hun website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN heeft een [no-logging audit ondergaan van Cure53](https://cure53.de/audit-report_ivpn.pdf) die concludeerde in overeenstemming met de no-logging claim van IVPN. IVPN heeft ook een [uitgebreid pentest rapport afgerond Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in januari 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-source clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Broncode kan worden verkregen van hun [GitHub organisatie](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Broncode kan worden verkregen van hun [GitHub organisatie](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepteert contant geld en Monero @@ -160,25 +160,25 @@ Mullvad accepteert naast creditcards en PayPal ook Bitcoin, Bitcoin Cash, **Mone #### :material-check:{ .pg-green } WireGuard ondersteuning -IVPN ondersteunt het WireGuard® protocol. [WireGuard](https://www.wireguard.com) is een nieuwer protocol dat gebruik maakt van geavanceerde [cryptografie](https://www.wireguard.com/protocol/). Bovendien streeft WireGuard ernaar om eenvoudiger en sneller te zijn. +IVPN ondersteunt het WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Bovendien streeft WireGuard ernaar om eenvoudiger en sneller te zijn. -IVPN [adviseert](https://www.ivpn.net/wireguard/) het gebruik van WireGuard met hun dienst en daarom is het protocol de standaard op alle apps van IVPN. IVPN biedt ook een WireGuard configuratie generator voor gebruik met de officiële WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad ondersteunde voorheen port forwarding, maar heeft deze optie verwijderd in [Mei 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Het ontbreken van deze functie kan bepaalde toepassingen negatief beïnvloeden, met name peer-to-peer applicaties zoals torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Het ontbreken van deze functie kan bepaalde toepassingen negatief beïnvloeden, met name peer-to-peer applicaties zoals torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobiele Clients -Naast het leveren van standaard OpenVPN-configuratiebestanden, heeft IVPN mobiele clients voor [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), en [GitHub](https://github.com/ivpn/android-app/releases) die gemakkelijke verbindingen met hun servers mogelijk maken. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Aanvullende functionaliteit -IVPN-clients ondersteunen tweefactorauthenticatie (de clients van Mullvad niet). IVPN biedt ook "[AntiTracker](https://www.ivpn.net/antitracker)" functionaliteit, die advertentienetwerken en trackers op netwerkniveau blokkeert. +IVPN-clients ondersteunen tweefactorauthenticatie (de clients van Mullvad niet). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN-clients ondersteunen tweefactorauthenticatie (de clients van Mullvad niet). [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN-clients ondersteunen tweefactorauthenticatie (de clients van Mullvad niet). #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Dit komt door een kortere route (minder hops) naar de bestemming. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Dit komt door een kortere route (minder hops) naar de bestemming. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ De VPN-clients van Mullvad zijn geaudit door Cure53 en Assured AB in een pentest > Cure53 en Assured AB zijn blij met de resultaten van de audit en de software laat over het algemeen een positieve indruk achter. Dankzij de inzet van het interne team van Mullvad VPN, twijfelen de testers er niet aan dat het project vanuit een beveiligingsoogpunt op het juiste spoor zit. -In 2020 werd een tweede audit [aangekondigd](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) en werd het [definitieve auditverslag ](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) beschikbaar gesteld op de website van Cure53: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > De resultaten van dit mei-juni 2020-project gericht op het Mullvad-complex zijn vrij positief. [...] Het totale applicatie-ecosysteem dat door Mullvad wordt gebruikt, laat een goede en gestructureerde indruk achter. De algemene structuur van de applicatie maakt het gemakkelijk om patches en fixes op een gestructureerde manier uit te rollen. De bevindingen van Cure53 laten vooral zien hoe belangrijk het is om de huidige lekken voortdurend te controleren en opnieuw te beoordelen, om de privacy van de eindgebruikers altijd te waarborgen. Dat gezegd hebbende, Mullvad beschermt de eindgebruiker uitstekend tegen veelvoorkomende lekken van PII en privacygerelateerde risico's. -In 2020 werd een infstrastructuuraudit [aangekondigd](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) en werd het [definitieve auditverslag ](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) beschikbaar gesteld op de website van Cure53. Een ander rapport werd in opdracht gegeven [in juni 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) en is beschikbaar op [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-source clients @@ -239,17 +239,17 @@ Mullvad accepteert naast creditcards en PayPal ook Bitcoin, Bitcoin Cash, **Mone #### :material-check:{ .pg-green } WireGuard ondersteuning -Mullvad ondersteunt het WireGuard® protocol. [WireGuard](https://www.wireguard.com) is een nieuwer protocol dat gebruik maakt van geavanceerde [cryptografie](https://www.wireguard.com/protocol/). Bovendien streeft WireGuard ernaar om eenvoudiger en sneller te zijn. +Mullvad ondersteunt het WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Bovendien streeft WireGuard ernaar om eenvoudiger en sneller te zijn. -Mullvad [adviseert](https://mullvad.net/en/help/why-wireguard/) het gebruik van WireGuard met hun dienst. Het is het standaard of enige protocol op Mullvad's Android, iOS, macOS en Linux apps, maar op Windows moet je [handmatig](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard inschakelen. Mullvad biedt ook een WireGuard configuratiegenerator voor gebruik met de officiële WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6-ondersteuning -Met Mullvad heb je via [toegang tot services die gehost worden op IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), in tegenstelling tot andere providers die IPv6-verbindingen blokkeren. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad ondersteunde voorheen port forwarding, maar heeft deze optie verwijderd in [Mei 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Het ontbreken van deze functie kan bepaalde toepassingen negatief beïnvloeden, met name peer-to-peer applicaties zoals torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Het ontbreken van deze functie kan bepaalde toepassingen negatief beïnvloeden, met name peer-to-peer applicaties zoals torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobiele Clients -Mullvad heeft [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) en [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients gepubliceerd, die beide een gebruiksvriendelijke interface ondersteunen in plaats van dat je jouw WireGuard-verbinding handmatig moet configureren. De Android client is ook beschikbaar op [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. De Android client is ook beschikbaar op [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Aanvullende functionaliteit -Mullvad is zeer transparant over welke knooppunten zij [bezitten of huren](https://mullvad.net/en/servers/). Ze gebruiken [ShadowSocks](https://shadowsocks.org/) in hun ShadowSocks + OpenVPN-configuratie, waardoor ze beter bestand zijn tegen firewalls met [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) die VPN's proberen te blokkeren. Vermoedelijk moet [China een andere methode gebruiken om ShadowSocks servers te blokkeren](https://github.com/net4people/bbs/issues/22). Mullvad's website is ook toegankelijk via Tor via [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Vermoedelijk moet [China een andere methode gebruiken om ShadowSocks servers te blokkeren](https://github.com/net4people/bbs/issues/22). Mullvad's website is ook toegankelijk via Tor via [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria diff --git a/i18n/pl/CODE_OF_CONDUCT.md b/i18n/pl/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/pl/CODE_OF_CONDUCT.md +++ b/i18n/pl/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/pl/about/index.md b/i18n/pl/about/index.md index 9c3a0d47..618957d5 100644 --- a/i18n/pl/about/index.md +++ b/i18n/pl/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/pl/about/notices.md b/i18n/pl/about/notices.md index d16a70ef..eeb657cd 100644 --- a/i18n/pl/about/notices.md +++ b/i18n/pl/about/notices.md @@ -29,7 +29,7 @@ Nie dotyczy to kodu z zewnętrznych źródeł osadzonego w tym repozytorium lub This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. Znaki towarowe marki Privacy Guides obejmują znak słowny "Privacy Guides" oraz logo tarczy. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -Uważamy, że loga i inne obrazy w `zasobach` pozyskanych od zewnętrznych dostawców znajdują się w domenie publicznej lub zaliczają się do **dozwolonego użytku**. W skrócie, prawnie [dozwolony użytek](https://www.copyright.gov/fair-use/more-info.html) umożliwia używanie zastrzeżonych prawem autorskim treści w celu identyfikacji tematu na potrzeby wyrażenia publicznej opinii. Jednakże te loga i inne obrazy mogą nadal podlegać prawom dotyczącym znaków towarowych w jednej lub kilku jurysdykcjach. Przed wykorzystaniem tych treści należy upewnić się, że służą one identyfikacji podmiotu lub organizacji będącej właścicielem znaku towarowego oraz że masz prawo do ich wykorzystania zgodnie z przepisami prawa, które mają zastosowanie w okolicznościach zamierzonego wykorzystania. *Kopiując treści z tej strony internetowej ponosisz wyłączną odpowiedzialność za zapewnienie, że nie naruszasz cudzego znaku towarowego lub prawa autorskiego.* +Uważamy, że loga i inne obrazy w `zasobach` pozyskanych od zewnętrznych dostawców znajdują się w domenie publicznej lub zaliczają się do **dozwolonego użytku**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. Jednakże te loga i inne obrazy mogą nadal podlegać prawom dotyczącym znaków towarowych w jednej lub kilku jurysdykcjach. Przed wykorzystaniem tych treści należy upewnić się, że służą one identyfikacji podmiotu lub organizacji będącej właścicielem znaku towarowego oraz że masz prawo do ich wykorzystania zgodnie z przepisami prawa, które mają zastosowanie w okolicznościach zamierzonego wykorzystania. *Kopiując treści z tej strony internetowej ponosisz wyłączną odpowiedzialność za zapewnienie, że nie naruszasz cudzego znaku towarowego lub prawa autorskiego.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ You must not conduct any systematic or automated data collection activities on o --- -*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/pl/about/privacytools.md b/i18n/pl/about/privacytools.md index 512ebb93..0c889f62 100644 --- a/i18n/pl/about/privacytools.md +++ b/i18n/pl/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/pl/advanced/communication-network-types.md b/i18n/pl/advanced/communication-network-types.md index 1f07a2c4..f6444ca4 100644 --- a/i18n/pl/advanced/communication-network-types.md +++ b/i18n/pl/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/pl/advanced/dns-overview.md b/i18n/pl/advanced/dns-overview.md index cc7abc73..6159a9a8 100644 --- a/i18n/pl/advanced/dns-overview.md +++ b/i18n/pl/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ Proces podpisywania DNSSEC jest podobny do podpisywania dokumentu prawnego dług DNSSEC wprowadza hierarchiczną politykę podpisywania cyfrowego we wszystkich warstwach DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/pl/advanced/payments.md b/i18n/pl/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/pl/advanced/payments.md +++ b/i18n/pl/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/pl/advanced/tor-overview.md b/i18n/pl/advanced/tor-overview.md index d4235518..abe0b57a 100644 --- a/i18n/pl/advanced/tor-overview.md +++ b/i18n/pl/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/pl/android.md b/i18n/pl/android.md index 901a9fa2..6f26a004 100644 --- a/i18n/pl/android.md +++ b/i18n/pl/android.md @@ -83,9 +83,9 @@ schema: **Android Open Source Project** to system operacyjny o otwartym kodzie źródłowym przeznaczony na urządzenia mobilne, który jest rozwijany przez Google i działa na większości urządzeń mobilnych na Ziemi. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. rekomendacja @@ -113,7 +113,7 @@ Urządzenia z zakończonym okresem wsparcia (takie jak urządzenia z "rozszerzon GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/pl/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/pl/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/pl/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/pl/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/pl/assets/img/how-tor-works/tor-encryption.svg b/i18n/pl/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/pl/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/pl/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/pl/assets/img/how-tor-works/tor-path-dark.svg b/i18n/pl/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/pl/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/pl/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/pl/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/pl/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/pl/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/pl/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/pl/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/pl/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/pl/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/pl/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/pl/assets/img/how-tor-works/tor-path.svg b/i18n/pl/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/pl/assets/img/how-tor-works/tor-path.svg +++ b/i18n/pl/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/pl/basics/account-deletion.md b/i18n/pl/basics/account-deletion.md index 60d31045..2ddf1e58 100644 --- a/i18n/pl/basics/account-deletion.md +++ b/i18n/pl/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Dostawcy sieci VPN @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/pl/basics/common-misconceptions.md b/i18n/pl/basics/common-misconceptions.md index 74650997..5aeaae95 100644 --- a/i18n/pl/basics/common-misconceptions.md +++ b/i18n/pl/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/pl/basics/common-threats.md b/i18n/pl/basics/common-threats.md index a8102469..67bd483b 100644 --- a/i18n/pl/basics/common-threats.md +++ b/i18n/pl/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacy From Service Providers @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/pl/basics/email-security.md b/i18n/pl/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/pl/basics/email-security.md +++ b/i18n/pl/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/pl/basics/multi-factor-authentication.md b/i18n/pl/basics/multi-factor-authentication.md index ec47a3dc..d092397c 100644 --- a/i18n/pl/basics/multi-factor-authentication.md +++ b/i18n/pl/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/pl/basics/passwords-overview.md b/i18n/pl/basics/passwords-overview.md index a8bd2a0d..e551722b 100644 --- a/i18n/pl/basics/passwords-overview.md +++ b/i18n/pl/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/pl/basics/vpn-overview.md b/i18n/pl/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/pl/basics/vpn-overview.md +++ b/i18n/pl/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/pl/basics/why-privacy-matters.md b/i18n/pl/basics/why-privacy-matters.md index c5906649..226ab6de 100644 --- a/i18n/pl/basics/why-privacy-matters.md +++ b/i18n/pl/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Źródła -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/pl/calendar.md b/i18n/pl/calendar.md index ecc49b6a..5c440339 100644 --- a/i18n/pl/calendar.md +++ b/i18n/pl/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Wiele kalendarzy oraz rozszerzone funkcje udostępniania są ograniczone do płatnych subskrybentów. @@ -21,18 +21,18 @@ Wiele kalendarzy oraz rozszerzone funkcje udostępniania są ograniczone do pła [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Wiele kalendarzy oraz rozszerzone funkcje udostępniania są ograniczone do pła Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/pl/cloud.md b/i18n/pl/cloud.md index 34b98b3d..166e2dd6 100644 --- a/i18n/pl/cloud.md +++ b/i18n/pl/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/pl/cryptocurrency.md b/i18n/pl/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/pl/cryptocurrency.md +++ b/i18n/pl/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/pl/data-redaction.md b/i18n/pl/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/pl/data-redaction.md +++ b/i18n/pl/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/pl/desktop-browsers.md b/i18n/pl/desktop-browsers.md index ec0ee880..8928d9ac 100644 --- a/i18n/pl/desktop-browsers.md +++ b/i18n/pl/desktop-browsers.md @@ -70,8 +70,8 @@ Jeśli chcesz przeglądać Internet anonimowo, powinieneś użyć [Tor](tor.md). **Mullvad Browser** to wersja [przeglądarki Tor](tor.md#tor-browser) z usuniętymi integracjami sieci Tor, mająca na celu dostarczenie technologii przeglądarki Tor Browser zapobiegającej odciskom palców użytkownikom VPN. Jest on rozwijany przez Tor Project i dystrybuowany przez [Mullvad](vpn.md#mullvad) i **nie** wymaga korzystania z VPN Mullvad. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ Jeśli chcesz przeglądać Internet anonimowo, powinieneś użyć [Tor](tor.md). -Podobnie jak [Tor Browser](tor.md), przeglądarka Mullvad Browser została zaprojektowana w celu zapobiegania pozostawiania odcisku palcac w sieci poprzez uczynienie odcisku palca przeglądarki identycznym ze wszystkimi innymi użytkownikami Mullvad Browser i zawiera domyślne ustawienia i rozszerzenia, które są automatycznie konfigurowane przez domyślne poziomy bezpieczeństwa: *Standardowy*, *Bezpieczniejszy* i *Najbezpieczniejszy*. Dlatego konieczne jest, aby w ogóle nie modyfikować przeglądarki poza dostosowaniem domyślnych poziomów bezpieczeństwa [](https://tb-manual.torproject.org/security-settings/). Inne modyfikacje sprawiłyby, że odcisk palca byłby unikalny, co uniemożliwiłoby prawidłowe i bezpiecznie korzystanie z tej przeglądarki. Jeśli chcesz bardziej skonfigurować swoją przeglądarkę, a fingerprinting nie jest dla Ciebie problemem, zalecamy zamiast tego [Firefox](#firefox). +Podobnie jak [Tor Browser](tor.md), przeglądarka Mullvad Browser została zaprojektowana w celu zapobiegania pozostawiania odcisku palcac w sieci poprzez uczynienie odcisku palca przeglądarki identycznym ze wszystkimi innymi użytkownikami Mullvad Browser i zawiera domyślne ustawienia i rozszerzenia, które są automatycznie konfigurowane przez domyślne poziomy bezpieczeństwa: *Standardowy*, *Bezpieczniejszy* i *Najbezpieczniejszy*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Inne modyfikacje sprawiłyby, że odcisk palca byłby unikalny, co uniemożliwiłoby prawidłowe i bezpiecznie korzystanie z tej przeglądarki. Jeśli chcesz bardziej skonfigurować swoją przeglądarkę, a fingerprinting nie jest dla Ciebie problemem, zalecamy zamiast tego [Firefox](#firefox). ### Ochrona przed fingerprintingiem @@ -116,17 +116,17 @@ Mullvad Browser jest dostarczany z DuckDuckGo ustawionym jako domyślna wyszukiw **Firefox** zapewnia silne ustawienia prywatności, takie jak [wzmocniona ochrona przed śledzeniem](https://support.mozilla.org/pl/kb/wzmocniona-ochrona-przed-sledzeniem-firefox-desktop), które mogą pomóc zablokować różne [rodzaje śledzenia](https://support.mozilla.org/pl/kb/wzmocniona-ochrona-przed-sledzeniem-firefox-desktop#w_co-blokuje-wzmocniona-ochrona-przed-sledzeniem). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser jest dostarczany z DuckDuckGo ustawionym jako domyślna wyszukiw

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Chroni to użytkownika poprzez blokowanie modułów śledzących w mediach społ ##### Firefox Suggest (tylko USA) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) to funkcja podobna do sugestii wyszukiwania, która jest dostępna tylko w Stanach Zjednoczonych. Zalecamy jej wyłączenie z tego samego powodu, dla którego zalecamy wyłączenie sugestii wyszukiwania. Jeśli nie widzisz tych opcji pod **paskiem adresu strony** , nie masz tej funkcjonalności i możesz zignorować te zmiany. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. Zalecamy jej wyłączenie z tego samego powodu, dla którego zalecamy wyłączenie sugestii wyszukiwania. Jeśli nie widzisz tych opcji pod **paskiem adresu strony** , nie masz tej funkcjonalności i możesz zignorować te zmiany. - [ ] Usuń zaznaczenie **Sugestie z sieci** - [ ] Usuń zaznaczenie **Sugestie od sponsorów** @@ -183,7 +183,7 @@ Chroni to użytkownika przed trwałymi plikami cookie, ale nie chroni przed plik > Firefox wysyła o nas dane o wersji i języku Firefoksa, systemie operacyjnym urządzeniach i konfiguracji sprzętowej, pamięci, podstawowe informacje o awariach i błędach oraz wynikach zautomatyzowanych procesów, takich jak aktualizacje, bezpieczne przeglądanie i aktywacja. Gdy przeglądarka Firefox wysyła nasze dane, adres IP użytkownika jest tymczasowo gromadzony w dziennikach serwera. -Dodatkowo, usługa Konta Firefox gromadzi [niektóre dane techniczne](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). Jeśli korzystasz z konta Firefox, możesz z tego zrezygnować: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). Jeśli korzystasz z konta Firefox, możesz z tego zrezygnować: 1. Otwórz ustawienia profilu [na accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Usuń zaznaczenie **Gromadzenie i wykorzystywanie danych** > **Pomóż ulepszyć konta Firefox** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ We are working on establishing defined criteria for every section of our site, a - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -462,4 +462,4 @@ Our best-case criteria represents what we would like to see from the perfect pro - Must directly impact user privacy, i.e. must not simply provide information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/pl/desktop.md b/i18n/pl/desktop.md index 9b38fccd..b39ded8b 100644 --- a/i18n/pl/desktop.md +++ b/i18n/pl/desktop.md @@ -17,17 +17,17 @@ Dystrybucje systemu Linux są powszechnie polecane, jeśli chodzi o ochronę pry ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. Podczas gdy aktualizacja niektórych pakietów, takich jak [GNOME](https://www.gnome.org) jest wstrzymywana do następnego wydania Fedora, większość pakietów (w tym jądro) jest często aktualizowanych podczas okresu wsparcia dla wydania. Każde wydanie Fedora jest wspierane przez jeden rok, a nowe wersje są wydawane co 6 miesięcy. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Każde wydanie Fedora jest wspierane przez jeden rok, a nowe wersje są wydawane co 6 miesięcy. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. Podczas gdy aktualizacja niektórych pa **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/pl/device-integrity.md b/i18n/pl/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/pl/device-integrity.md +++ b/i18n/pl/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/pl/dns.md b/i18n/pl/dns.md index c9f880b9..d309dece 100644 --- a/i18n/pl/dns.md +++ b/i18n/pl/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## Rekomendowani dostawcy -| Dostawca DNS | Polityka prywatności | Protokoły | Rejestrowane dane | ECS | Filtrowanie | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ----------------- | --------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Niektóre[^1] | Yes | Based on personal configuration. Listę filtrowania możesz znaleźć tutaj: [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Niektóre[^2] | Nie | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Do wyboru[^3] | Nie | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | Żadne[^4] | Nie | Based on personal configuration. Listę filtrowania możesz znaleźć tutaj: [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Do wyboru[^5] | Do wyboru | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Niektóre[^6] | Do wyboru | Based on personal configuration, Malware blocking by default. | +| Dostawca DNS | Polityka prywatności | Protokoły | Rejestrowane dane | ECS | Filtrowanie | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ----------------- | --------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Niektóre[^1] | Yes | Based on personal configuration. Listę filtrowania możesz znaleźć tutaj: [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Niektóre[^2] | Nie | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Do wyboru[^3] | Nie | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | Żadne[^4] | Nie | Based on personal configuration. Listę filtrowania możesz znaleźć tutaj: [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Do wyboru[^5] | Do wyboru | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Niektóre[^6] | Do wyboru | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ After installation of either a configuration profile or an app that uses the DNS #### Signed Profiles -Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home features a polished web interface to view insights and manage blocked content. @@ -144,13 +144,13 @@ AdGuard Home features a polished web interface to view insights and manage block ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -159,8 +159,8 @@ Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to suc
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/pl/email-clients.md b/i18n/pl/email-clients.md index 7434f6bb..c7051cdb 100644 --- a/i18n/pl/email-clients.md +++ b/i18n/pl/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/pl/email.md b/i18n/pl/email.md index c0374704..c4637e6b 100644 --- a/i18n/pl/email.md +++ b/i18n/pl/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail has internal crash reports that they **do not** share with third par #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. +Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -129,7 +129,7 @@ Proton Mail doesn't offer a digital legacy feature. #### :material-check:{ .pg-green } Custom Domains and Aliases -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -137,17 +137,17 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro #### :material-check:{ .pg-green } Account Security -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security -Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } Email Encryption -Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Your account will be set to a restricted user account when your contract ends, a #### :material-information-outline:{ .pg-blue } Additional Functionality -You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. -All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criteria @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/pl/encryption.md b/i18n/pl/encryption.md index eac17eba..94e4be61 100644 --- a/i18n/pl/encryption.md +++ b/i18n/pl/encryption.md @@ -22,15 +22,15 @@ Wymienione tutaj opcje są międzyplatformowe i świetnie nadają się do tworze [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator wykorzystuje szyfrowanie AES-256 do szyfrowania zarówno plików, ja Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** to funkcja pełnego szyfrowania woluminów dołączona do systemów Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** to funkcja pełnego szyfrowania woluminów dołączona do systemów Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/pl/file-sharing.md b/i18n/pl/file-sharing.md index 46b812da..2b881b14 100644 --- a/i18n/pl/file-sharing.md +++ b/i18n/pl/file-sharing.md @@ -19,11 +19,7 @@ Dowiedz się, jak prywatnie udostępniać piki pomiędzy swoimi urządzeniami, z [:octicons-info-16:](https://magic-wormhole.readthedocs.io/){ .card-link title=Dokumentacja} [:octicons-code-16:](https://github.com/magic-wormhole/magic-wormhole){ .card-link title="Kod źródłowy" } -??? pobieranie - - - [:fontawesome-brands-windows: Windows](https://magic-wormhole.readthedocs.io/en/latest/welcome.html#installation) - - [:fontawesome-brands-apple: macOS](https://magic-wormhole.readthedocs.io/en/latest/welcome.html#macos-os-x) - - [:fontawesome-brands-linux: Linux](https://magic-wormhole.readthedocs.io/en/latest/welcome.html#installation) You can use other public instances, or you can host Send yourself. +??? The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -91,7 +87,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -109,9 +105,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -145,16 +141,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/pl/financial-services.md b/i18n/pl/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/pl/financial-services.md +++ b/i18n/pl/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/pl/frontends.md b/i18n/pl/frontends.md index cc80fbbf..0e85b5bc 100644 --- a/i18n/pl/frontends.md +++ b/i18n/pl/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/pl/index.md b/i18n/pl/index.md index 13043495..09b2e025 100644 --- a/i18n/pl/index.md +++ b/i18n/pl/index.md @@ -62,7 +62,7 @@ Trying to protect all your data from everyone all the time is impractical, expen ## We need you! Here's how to get involved: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } [:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } [:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } [:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } diff --git a/i18n/pl/kb-archive.md b/i18n/pl/kb-archive.md index e588f3c5..7a5ac269 100644 --- a/i18n/pl/kb-archive.md +++ b/i18n/pl/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integracja usuwania metadanych](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integracja usuwania metadanych](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/pl/meta/admonitions.md b/i18n/pl/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/pl/meta/admonitions.md +++ b/i18n/pl/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/pl/meta/translations.md b/i18n/pl/meta/translations.md index 670bddcb..a5bb312c 100644 --- a/i18n/pl/meta/translations.md +++ b/i18n/pl/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/pl/meta/uploading-images.md b/i18n/pl/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/pl/meta/uploading-images.md +++ b/i18n/pl/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/pl/meta/writing-style.md b/i18n/pl/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/pl/meta/writing-style.md +++ b/i18n/pl/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/pl/mobile-browsers.md b/i18n/pl/mobile-browsers.md index ab9449cd..017f8aa6 100644 --- a/i18n/pl/mobile-browsers.md +++ b/i18n/pl/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ Oto obecnie polecane przez nas przeglądarki mobilne oraz ich konfiguracje. If y ## Android -Na Androidzie, Firefox jest nadal mniej bezpieczna od alternatyw bazujących na silniku Chromium: Silnik od Mozilla, [GeckoView](https://mozilla.github.io/geckoview/), nie posiada jeszcze wsparcia dla [izolowania witryn](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) oraz włączonego [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ Na Androidzie, Firefox jest nadal mniej bezpieczna od alternatyw bazujących na ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ W systemie iOS każda aplikacja, która umożliwia przeglądanie Internetu [ma o ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/pl/multi-factor-authentication.md b/i18n/pl/multi-factor-authentication.md index 830c33c8..ee60af63 100644 --- a/i18n/pl/multi-factor-authentication.md +++ b/i18n/pl/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/pl/news-aggregators.md b/i18n/pl/news-aggregators.md index 17438718..00b22c26 100644 --- a/i18n/pl/news-aggregators.md +++ b/i18n/pl/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/pl/notebooks.md b/i18n/pl/notebooks.md index a85f2eb1..e5a921f1 100644 --- a/i18n/pl/notebooks.md +++ b/i18n/pl/notebooks.md @@ -34,7 +34,7 @@ Jeśli obecnie używasz aplikacji, takiej jak Evernote, Google Keep lub Microsof - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ Jeśli obecnie używasz aplikacji, takiej jak Evernote, Google Keep lub Microsof ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ Jeśli obecnie używasz aplikacji, takiej jak Evernote, Google Keep lub Microsof Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **EteSync Notes** to bezpieczna, szyfrowana od końca do końca i respektująca prywatność aplikacja do robienia notatek. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/pl/os/android-overview.md b/i18n/pl/os/android-overview.md index f0b1c888..867d12e4 100644 --- a/i18n/pl/os/android-overview.md +++ b/i18n/pl/os/android-overview.md @@ -60,7 +60,7 @@ Aktualizacje oprogramowania mają kluczowe znaczenie dla zachowania bezpieczeńs Firmware updates are critical for maintaining security and without them your device cannot be secure. Dlatego ważne jest, aby zakupić urządzenie, które jest nadal wspierane. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) oraz [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) oferując wsparcie dla swoich urządzeń przez 4 lata, podczas gdy tańsze produkty często mają krótszy okres wsparcia. -Urządzenia bez aktywnego wsparcia producenta układów nie otrzymują już aktualizacji oprogramowania od producentów urządzeń lub niestandardowych dystrybucji Androida. Oznacza to, że luki bezpieczeństwa w tych urządzeniach nie zostaną naprawione. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +Urządzenia bez aktywnego wsparcia producenta układów nie otrzymują już aktualizacji oprogramowania od producentów urządzeń lub niestandardowych dystrybucji Androida. Oznacza to, że luki bezpieczeństwa w tych urządzeniach nie zostaną naprawione. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. Ważne jest, aby nie korzystać z [niewspieranej](https://endoflife.date/android) wersji Androida. Nowsze wersje Androida nie tylko otrzymują poprawki bezpieczeństwa dla systemu operacyjnego, ale także ważne aktualizacje poprawiające prywatność. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). To umożliwi Ci otrzymywanie **niektórych** poprawek bezpieczeństwa od Google bez naruszania modelu zabezpieczeń Androida poprzez używanie systemu pochodnego od Androida i zwiększanie ryzyka na atak. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). To umożliwi Ci otrzymywanie **niektórych** poprawek bezpieczeństwa od Google bez naruszania modelu zabezpieczeń Androida poprzez używanie systemu pochodnego od Androida i zwiększanie ryzyka na atak. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Aktualizacje systemowe Google Play @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/pl/os/ios-overview.md b/i18n/pl/os/ios-overview.md index 949d360e..d2744bad 100644 --- a/i18n/pl/os/ios-overview.md +++ b/i18n/pl/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/pl/os/linux-overview.md b/i18n/pl/os/linux-overview.md index bef6a97c..fe29e338 100644 --- a/i18n/pl/os/linux-overview.md +++ b/i18n/pl/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## Ogólne zalecenia @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/pl/os/macos-overview.md b/i18n/pl/os/macos-overview.md index 5dc34d2c..360dde5f 100644 --- a/i18n/pl/os/macos-overview.md +++ b/i18n/pl/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Recommended Configuration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/pl/os/qubes-overview.md b/i18n/pl/os/qubes-overview.md index 3672ffce..49a76b89 100644 --- a/i18n/pl/os/qubes-overview.md +++ b/i18n/pl/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Android -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/pl/passwords.md b/i18n/pl/passwords.md index d31b7eee..cbddae4e 100644 --- a/i18n/pl/passwords.md +++ b/i18n/pl/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/pl/photo-management.md b/i18n/pl/photo-management.md index f829983a..252eef9e 100644 --- a/i18n/pl/photo-management.md +++ b/i18n/pl/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/pl/productivity.md b/i18n/pl/productivity.md index 7f50408a..708fc02e 100644 --- a/i18n/pl/productivity.md +++ b/i18n/pl/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/pl/real-time-communication.md b/i18n/pl/real-time-communication.md index bb96b9c2..6a1f7de0 100644 --- a/i18n/pl/real-time-communication.md +++ b/i18n/pl/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/pl/router.md b/i18n/pl/router.md index e3ccfe93..fe5966e2 100644 --- a/i18n/pl/router.md +++ b/i18n/pl/router.md @@ -35,10 +35,10 @@ Zapoznaj się z [listą obsługiwanych urządzeń](https://openwrt.org/toh/start **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. Po zainstalowaniu na komputerze pełni rolę dedykowanej zapory sieciowej/routera dla sieci i wyróżnia się niezawodnością oraz oferuje funkcje, które można często znaleźć tylko w drogich zaporach sieciowych. -[:octicons-home-16: Strona WWW](https://opnsense.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Dokumentacja} -[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Kod źródłowy" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Wesprzyj } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/pl/search-engines.md b/i18n/pl/search-engines.md index 7fc05e18..9ffdbb0b 100644 --- a/i18n/pl/search-engines.md +++ b/i18n/pl/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/pl/tools.md b/i18n/pl/tools.md index 3030c0d1..82b055d6 100644 --- a/i18n/pl/tools.md +++ b/i18n/pl/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin Jeśli szukasz konkretnego rozwiązania, oto polecane przez nas narzędzia oraz oprogramowanie w różnych kategoriach. Polecane przez nas narzędzia zostały wybrane głównie na podstawie funkcji zabezpieczeń z dodatkowym naciskiem na te o zdecentralizowane i o otwartym kodzie żródłowym. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Dowiedz się więcej :hero-arrow-circle-right-fill:](dns.md) diff --git a/i18n/pl/tor.md b/i18n/pl/tor.md index 78f1e26a..b42cc5f1 100644 --- a/i18n/pl/tor.md +++ b/i18n/pl/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: Sieć **Tor** to grupa serwerów dostarczanych przez wolontariuszy, która umożliwia bezpłatne łączenie się z Internetem oraz wzmacnia prywatność i bezpieczeństwo. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a -The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake does not increase your privacy in any way, nor is it used to connect t Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/pl/vpn.md b/i18n/pl/vpn.md index 20ba3e86..7d8b19e5 100644 --- a/i18n/pl/vpn.md +++ b/i18n/pl/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria diff --git a/i18n/pt-BR/CODE_OF_CONDUCT.md b/i18n/pt-BR/CODE_OF_CONDUCT.md index 93cf7584..6db1dc98 100644 --- a/i18n/pt-BR/CODE_OF_CONDUCT.md +++ b/i18n/pt-BR/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ O que esperamos dos membros de nossas comunidades: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Comporte-se de um modo positivo e construtivo** diff --git a/i18n/pt-BR/about/index.md b/i18n/pt-BR/about/index.md index 9c3a0d47..618957d5 100644 --- a/i18n/pt-BR/about/index.md +++ b/i18n/pt-BR/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/pt-BR/about/notices.md b/i18n/pt-BR/about/notices.md index 807d0067..6f2406c2 100644 --- a/i18n/pt-BR/about/notices.md +++ b/i18n/pt-BR/about/notices.md @@ -29,7 +29,7 @@ Isto não inclui o código de terceiros incorporado neste repositório, ou códi Isso significa que você pode utilizar o conteúdo legível por humanos neste repositório para o seu próprio projeto, nos termos descritos no texto da licença Creative Commons Attribution-NoDerivatives 4.0 International Public License. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* +We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ You must not conduct any systematic or automated data collection activities on o --- -*Partes deste aviso foram adotadas a partir de [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) no GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Partes deste aviso foram adotadas a partir de [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) no GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/pt-BR/about/privacytools.md b/i18n/pt-BR/about/privacytools.md index 9168e76a..487ea268 100644 --- a/i18n/pt-BR/about/privacytools.md +++ b/i18n/pt-BR/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/pt-BR/advanced/communication-network-types.md b/i18n/pt-BR/advanced/communication-network-types.md index f440706c..ddf59c6e 100644 --- a/i18n/pt-BR/advanced/communication-network-types.md +++ b/i18n/pt-BR/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Alguns mensageiros podem ser auto-hospedados e permitem que você configure seu - Pode incluir [controle ou acesso restrito](https://drewdevault.com/2018/08/08/Signal.html). Isto pode incluir coisas como: - Ser [proibido de conectar clientes alternativos](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) à rede, mesmo podendo oferecer uma melhor customização ou até mesmo uma melhor experiência. Muitas vezes definido nos Termos e Condições de uso. - Documentação pobre ou inexistente para desenvolvedores de terceiros. -- O [proprietário](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), a política de privacidade e operações podem ser facilmente mudadas quando uma só entidade controla tudo, podendo comprometer o serviço mais tarde. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - A auto-hospedagem requer esforço e conhecimento de como configurar um serviço. ## Redes Federadas @@ -60,7 +60,7 @@ Quando auto-hospedados, os membros de um servidor federado podem descobrir e se Os mensageiros P2P se conectam a uma [ rede distribuída](https://en.wikipedia.org/wiki/Distributed_networking) de nós para retransmitir uma mensagem ao destinatário sem um servidor de terceiros. -Clientes (peers) geralmente encontram um ao outro através do uso de um [sistema de processamento distribuído](https://pt.wikipedia.org/wiki/Sistema_de_processamento_distribu%C3%ADdo). Exemplos disso incluem [Distributed hash table](https://pt.wikipedia.org/wiki/Distributed_hash_table) (DHT), usado por [torrents](https://pt.wikipedia.org/wiki/BitTorrent) e [IPFS](https://pt.wikipedia.org/wiki/Sistema_de_Arquivos_Interplanet%C3%A1rio) por exemplo. Outra abordagem é redes baseadas em proximidade, onde uma conexão é estabelecida através de WiFi ou Bluetooth (por exemplo, Briar ou o protocolo de rede social [Scuttlebutt](https://www.scuttlebutt.nz)). +Clientes (peers) geralmente encontram um ao outro através do uso de um [sistema de processamento distribuído](https://pt.wikipedia.org/wiki/Sistema_de_processamento_distribu%C3%ADdo). Exemplos disso incluem [Distributed hash table](https://pt.wikipedia.org/wiki/Distributed_hash_table) (DHT), usado por [torrents](https://pt.wikipedia.org/wiki/BitTorrent) e [IPFS](https://pt.wikipedia.org/wiki/Sistema_de_Arquivos_Interplanet%C3%A1rio) por exemplo. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Uma vez que um peer tenha encontrado uma rota para o seu contato através de qualquer um desses métodos, uma conexão direta entre eles é feita. Embora as mensagens sejam geralmente criptografadas, um observador ainda pode deduzir a localização e a identidade do remetente e do destinatário. diff --git a/i18n/pt-BR/advanced/dns-overview.md b/i18n/pt-BR/advanced/dns-overview.md index bad59b43..df6a4f24 100644 --- a/i18n/pt-BR/advanced/dns-overview.md +++ b/i18n/pt-BR/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### DNS não Criptografado -1. Usando [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (parte do projeto [Wireshark](https://en.wikipedia.org/wiki/Wireshark)), podemos monitorar e registrar o fluxo de pacotes da Internet. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS sobre TLS (DoT) -[**DNS sobre TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) é outro método para criptografar a comunicação de DNS definido em [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). O suporte foi implementado pela primeira vez no Android 9, iOS 14 e no Linux em [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) na versão 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS sobre TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) é outro método para criptografar a comunicação de DNS definido em [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS sobre HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Por que **não deveria** usar DNS criptografado? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/pt-BR/advanced/payments.md b/i18n/pt-BR/advanced/payments.md index 6b10827f..6470f41c 100644 --- a/i18n/pt-BR/advanced/payments.md +++ b/i18n/pt-BR/advanced/payments.md @@ -9,7 +9,7 @@ Há um motivo pelo qual os dados sobre seus hábitos de compra são considerados Por séculos, **dinheiro** tem funcionado como a forma primária de pagamento privado. O dinheiro tem excelentes propriedades de privacidade na maioria dos casos, é amplamente aceito na maioria dos países, e é **fungível**, o que significa que não é único e é completamente intercambiável. -As leis de pagamento em dinheiro variam por país. Nos Estados Unidos, é necessária uma declaração especial para pagamentos em dinheiro acima de US$10.000 para o IRS no [Formulário 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). A empresa recebedora é obrigada a verificar o nome, o endereço, a ocupação, a data de nascimento e o número do seguro social ou outro TIN do beneficiário (com algumas exceções). Existem limites mais baixos sem identificação, tais como $3.000 ou menos, para trocas e transferência de dinheiro. Dinheiro também contém números de série. Eles quase nunca são rastreados pelos comerciantes, mas podem ser usados pelas autoridades policiais em investigações direcionadas. +As leis de pagamento em dinheiro variam por país. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). A empresa recebedora é obrigada a verificar o nome, o endereço, a ocupação, a data de nascimento e o número do seguro social ou outro TIN do beneficiário (com algumas exceções). Existem limites mais baixos sem identificação, tais como $3.000 ou menos, para trocas e transferência de dinheiro. Dinheiro também contém números de série. Eles quase nunca são rastreados pelos comerciantes, mas podem ser usados pelas autoridades policiais em investigações direcionadas. Apesar disso, normalmente é a melhor opção. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/pt-BR/advanced/tor-overview.md b/i18n/pt-BR/advanced/tor-overview.md index c5e75b15..2c1b2200 100644 --- a/i18n/pt-BR/advanced/tor-overview.md +++ b/i18n/pt-BR/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [Como funciona o Tor - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Serviços Tor Onion - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/pt-BR/android.md b/i18n/pt-BR/android.md index f5e554ff..e9a432d1 100644 --- a/i18n/pt-BR/android.md +++ b/i18n/pt-BR/android.md @@ -83,9 +83,9 @@ schema: O **Android Open Source Project** é um sistema operacional de código aberto liderado pelo Google que é usado na maioria dos dispositivos móveis do mundo. A maioria dos celulares vendidos com Android são modificados para incluir integrações invasivas e aplicativos como o Google Play Services. Você pode melhorar a privacidade de seu dispositivo significativamente ao usar uma versão do Android sem esses recursos invasivos. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } Estes são os sistemas operacionais, dispositivos e aplicações Android que recomendamos para maximizar a segurança e privacidade do seu dispositivo móvel. Para saber mais sobre o Android: @@ -113,7 +113,7 @@ Os dispositivos em fim de vida útil (como os dispositivos GrapheneOS ou "suport O GrapheneOS conta com um [hardening](https://pt.wikipedia.org/wiki/Hardening) adicional e melhorias de privacidade. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ O GrapheneOS conta com um [hardening](https://pt.wikipedia.org/wiki/Hardening) a -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. Isso significa que você pode tirar proveito da maioria dos Google Play Services, como [notificações push](https://firebase.google.com/docs/cloud-messaging/), enquanto lhe dá controle total sobre suas permissões e acesso, e ao mesmo tempo contê-los para um perfil de trabalho [específico](os/android-overview.md#work-profile) ou [perfil de usuário](os/android-overview.md#user-profiles) de sua escolha. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Os telefones Google Pixel são os únicos dispositivos que atualmente atendem aos [requisitos de segurança de hardware do GrapheneOS](https://grapheneos.org/faq#device-support). -[Por que recomendamos o GrapheneOS em vez do CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Por que recomendamos o GrapheneOS em vez do CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Os telefones Google Pixel são os únicos dispositivos que atualmente atendem ao ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -O DivestOS implementa alguns patches de fortalecimento desenvolvidos originalmente para o GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 e superior apresenta a opção de [ randomização do MAC](https://en.wikipedia.org/wiki/MAC_address#Randomization) completa por rede do GrapheneOS, controle [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) e [opções de tempo limite](https://grapheneos.org/features) de reinicialização automática/Wi-Fi/Bluetooth. +O DivestOS implementa alguns patches de fortalecimento desenvolvidos originalmente para o GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ Ao adquirir um dispositivo, recomendamos que o adquira o mais novo possível. O Evite comprar telefones de operadoras de redes móveis. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Tenha muito **cuidado** ao comprar celulares usados nas lojas online. Sempre verifique a reputação do vendedor. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). Também existe o risco de você ser associado com a atividade do proprietário anterior. +Tenha muito **cuidado** ao comprar celulares usados nas lojas online. Sempre verifique a reputação do vendedor. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). Também existe o risco de você ser associado com a atividade do proprietário anterior. Mais algumas dicas sobre os aparelhos Android e a compatibilidade do sistema operacional: - Não compre dispositivos que tenham atingido ou estejam próximos do fim de sua vida útil; atualizações adicionais de firmware devem ser fornecidas pelo fabricante. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- Em resumo, se um dispositivo ou distribuição Android não estiver listado aqui, provavelmente há um bom motivo. Confira nosso [fórum](https://discuss.privacyguides.net/) para encontrar detalhes! +- Em resumo, se um dispositivo ou distribuição Android não estiver listado aqui, provavelmente há um bom motivo. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ A Google Play Store exige uma conta do Google para fazer login, o que não é mu **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Instale o [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Devido ao seu processo de criação de aplicativos, os aplicativos no repositório oficial do F-Droid geralmente ficam para trás nas atualizações. Os mantenedores do F-Droid também reutilizam IDs de pacotes ao assinar aplicativos com suas próprias chaves, o que não é ideal, pois dá à equipe do F-Droid a confiança máxima. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. O repositório IzzyOnDroid extrai as compilações diretamente do GitHub e é a melhor opção em relação aos repositórios dos próprios desenvolvedores. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. O repositório IzzyOnDroid extrai as compilações diretamente do GitHub e é a melhor opção em relação aos repositórios dos próprios desenvolvedores. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-Em alguns raros casos, o desenvolvedor só vai disponibilizar o app no F-Droid ([Gadgetbridge](https://gadgetbridge.org/) é um exemplo). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/pt-BR/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/pt-BR/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/pt-BR/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/pt-BR/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/pt-BR/assets/img/how-tor-works/tor-encryption.svg b/i18n/pt-BR/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/pt-BR/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/pt-BR/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/pt-BR/assets/img/how-tor-works/tor-path-dark.svg b/i18n/pt-BR/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/pt-BR/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/pt-BR/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/pt-BR/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/pt-BR/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/pt-BR/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/pt-BR/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/pt-BR/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/pt-BR/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/pt-BR/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/pt-BR/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/pt-BR/assets/img/how-tor-works/tor-path.svg b/i18n/pt-BR/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/pt-BR/assets/img/how-tor-works/tor-path.svg +++ b/i18n/pt-BR/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/pt-BR/basics/account-deletion.md b/i18n/pt-BR/basics/account-deletion.md index 79ac1e75..dfd7a3bb 100644 --- a/i18n/pt-BR/basics/account-deletion.md +++ b/i18n/pt-BR/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Com o tempo, pode ser fácil acumular várias contas online, muitas das quais você pode não mais usar. Excluir essas contas não utilizadas é um passo importante para recuperar sua privacidade, pois contas inativas são vulneráveis a violações de dados. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Com o tempo, pode ser fácil acumular várias contas online, muitas das quais você pode não mais usar. Excluir essas contas não utilizadas é um passo importante para recuperar sua privacidade, pois contas inativas são vulneráveis a violações de dados. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Localizando Contas Antigas ### Gerenciador de Senhas -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Sobrescrevendo Informações da Conta @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Evite Novas Contas -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/pt-BR/basics/common-misconceptions.md b/i18n/pt-BR/basics/common-misconceptions.md index 8fa1aa5b..9f9bc840 100644 --- a/i18n/pt-BR/basics/common-misconceptions.md +++ b/i18n/pt-BR/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/pt-BR/basics/common-threats.md b/i18n/pt-BR/basics/common-threats.md index 3a470d8b..07c71875 100644 --- a/i18n/pt-BR/basics/common-threats.md +++ b/i18n/pt-BR/basics/common-threats.md @@ -55,7 +55,7 @@ Por padrão, **navegadores da Internet**, **clientes de e-mail** e **aplicativos -Se você está preocupado com **ataques físicos**, você deve usar um sistema operacional com uma implementação de inicialização verificada segura, tais como Android, iOS, macOS ou [Windows (com TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacidade dos Prestadores de Serviços @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/pt-BR/basics/email-security.md b/i18n/pt-BR/basics/email-security.md index d640e92b..c490b5f2 100644 --- a/i18n/pt-BR/basics/email-security.md +++ b/i18n/pt-BR/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### Como Protejo Minhas Chaves Privadas? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/pt-BR/basics/multi-factor-authentication.md b/i18n/pt-BR/basics/multi-factor-authentication.md index 3db2ce0a..33782eea 100644 --- a/i18n/pt-BR/basics/multi-factor-authentication.md +++ b/i18n/pt-BR/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/pt-BR/basics/passwords-overview.md b/i18n/pt-BR/basics/passwords-overview.md index 9b75cd62..f1b537a7 100644 --- a/i18n/pt-BR/basics/passwords-overview.md +++ b/i18n/pt-BR/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/pt-BR/basics/vpn-overview.md b/i18n/pt-BR/basics/vpn-overview.md index 3d2443f0..39807b8d 100644 --- a/i18n/pt-BR/basics/vpn-overview.md +++ b/i18n/pt-BR/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Informações Relacionadas a VPN -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Investigação de Aplicativos VPN Gratuitos](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Proprietários Secretos de VPN revelados: 101 produtos VPN operados por apenas 23 empresas](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [Esta empresa chinesa está secretamente por trás de 24 aplicativos populares que pedem permissões perigosas](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Investigação de Aplicativos VPN Gratuitos](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Proprietários Secretos de VPN revelados: 101 produtos VPN operados por apenas 23 empresas](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [Esta empresa chinesa está secretamente por trás de 24 aplicativos populares que pedem permissões perigosas](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/pt-BR/basics/why-privacy-matters.md b/i18n/pt-BR/basics/why-privacy-matters.md index 27d29678..8354d9bc 100644 --- a/i18n/pt-BR/basics/why-privacy-matters.md +++ b/i18n/pt-BR/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacidade é algo que precisa estar incluído por padrão nos [aplicativos e s ## Fontes -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) por Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/pt-BR/calendar.md b/i18n/pt-BR/calendar.md index 06e8322d..00ebba69 100644 --- a/i18n/pt-BR/calendar.md +++ b/i18n/pt-BR/calendar.md @@ -13,7 +13,7 @@ Os calendários contêm alguns de seus dados mais confidenciais; use produtos qu ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). A funcionalidade de múltiplos calendários e compartilhamento adicional é limitada a assinantes pagos. @@ -21,18 +21,18 @@ A funcionalidade de múltiplos calendários e compartilhamento adicional é limi [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ A funcionalidade de múltiplos calendários e compartilhamento adicional é limi Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/pt-BR/cloud.md b/i18n/pt-BR/cloud.md index 21a94523..fa782259 100644 --- a/i18n/pt-BR/cloud.md +++ b/i18n/pt-BR/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/pt-BR/cryptocurrency.md b/i18n/pt-BR/cryptocurrency.md index b12a0926..96daf2ca 100644 --- a/i18n/pt-BR/cryptocurrency.md +++ b/i18n/pt-BR/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/pt-BR/data-redaction.md b/i18n/pt-BR/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/pt-BR/data-redaction.md +++ b/i18n/pt-BR/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/pt-BR/desktop-browsers.md b/i18n/pt-BR/desktop-browsers.md index 0b3d8cbf..5634c3ce 100644 --- a/i18n/pt-BR/desktop-browsers.md +++ b/i18n/pt-BR/desktop-browsers.md @@ -70,8 +70,8 @@ Se você precisa navegar na internet de maneira anônima, você deveria usar o [ **Mullvad Browser** é uma versão do [Tor Browser](tor.md#tor-browser) com a integração na rede Tor removida, buscando providenciar as tecnologias anti-fingerprinting do Tor Browser para usuários de VPN. É desenvolvido pelo Projeto Tor e distribuído pela [Mullvad](vpn.md#mullvad), e **não** requer o uso da VPN da Mullvad. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ Se você precisa navegar na internet de maneira anônima, você deveria usar o [ -Como o [Navegador Tor](tor.md), o Navegador Mullvad foi projetado para evitar a impressão digital, tornando a impressão digital de seu navegador igual a de todas as outras pessoas do Navegador Mullvad, de modo que ele inclui configurações e extensões predefinidas que são configuradas automaticamente pelos seguintes níveis de segurança padrão: Padrão *(Standard)*, Seguro *(Safer)* e O Mais Seguro *(Safest)*. Assim, é importante que você não modifique o navegador de forma alguma a não ser através do ajuste dos [níveis de segurança](https://tb-manual.torproject.org/security-settings/) disponíveis. Outras modificações tornariam a sua impressão digital única, derrotando o propósito de usar este navegador. Se você preferir personalizar mais o navegador e a identificação das suas impressões digitais não é uma preocupação para você, recomendamos o [Firefox](#firefox). +Como o [Navegador Tor](tor.md), o Navegador Mullvad foi projetado para evitar a impressão digital, tornando a impressão digital de seu navegador igual a de todas as outras pessoas do Navegador Mullvad, de modo que ele inclui configurações e extensões predefinidas que são configuradas automaticamente pelos seguintes níveis de segurança padrão: Padrão *(Standard)*, Seguro *(Safer)* e O Mais Seguro *(Safest)*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Outras modificações tornariam a sua impressão digital única, derrotando o propósito de usar este navegador. Se você preferir personalizar mais o navegador e a identificação das suas impressões digitais não é uma preocupação para você, recomendamos o [Firefox](#firefox). ### Anti-impressões Digitais @@ -116,17 +116,17 @@ Navegador de Mullvad vem com o DuckDuckGo definido como o [mecanismo de pesquisa O **Firefox** fornece configurações fortes de privacidade como a [Proteção avançada de rastreio](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), que pode ajudar a bloquear varios [tipos de rastreio](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ O **Firefox** fornece configurações fortes de privacidade como a [Proteção a

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Isso protege você bloqueando rastreadores de mídia social, scripts de impress ##### Firefox Suggest (apenas nos EUA) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) é um recurso semelhante às sugestões de pesquisa que só está disponível nos EUA. Recomendamos desativá-lo pelo mesmo motivo que recomendamos desativar as sugestões de pesquisa. Se você não ver essas opções sob o **cabeçalho da barra de endereços**, você não tem esse novo experimento e pode ignorar essas alterações. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. Recomendamos desativá-lo pelo mesmo motivo que recomendamos desativar as sugestões de pesquisa. Se você não ver essas opções sob o **cabeçalho da barra de endereços**, você não tem esse novo experimento e pode ignorar essas alterações. - [ ] Desmarque **Sugestões da web** - [ ] Desmarque **Sugestões de patrocinadores** @@ -183,7 +183,7 @@ Isso protege você contra cookies persistentes, mas não te protege contra cooki > O Firefox envia dados sobre a sua versão e língua do Firefox; sistema operacional e configuração de hardware; memória, informação básica sobre crashes e erros; resultados de processos automatizados como atualizações, navegação segura e ativação para nós. Quando o Firefox envia dados para nós, seu endereço IP é temporariamente coletado como parte dos registros do nosso servidor. -Adicionalmente, o serviço de contas Firefox coleta alguns [dados técnicos](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). Se você usa uma Conta Firefox, você pode não optar por isso: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). Se você usa uma Conta Firefox, você pode não optar por isso: 1. Abra as suas [configurações de perfil em accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Desmarque **Coleta de dados e uso** > **Ajude a melhorar as contas Firefox** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -O [Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) permite que seus dados de navegação (histórico, favoritos, etc.) sejam acessíveis em todos os seus dispositivos, além de protegê-los com E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Extensões @@ -215,7 +215,7 @@ O [Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) permit -O [projeto Arkenfox](https://github.com/arkenfox/user.js) fornece uma série de opções cuidadosamente selecionadas para o Firefox. Se você [decidir](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) usar o Arkenfox, [algumas opções](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) são subjetivamente estritas e/ou podem fazer alguns sites não funcionarem corretamente - [as quais você pode facilmente mudar](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) para atender as suas necessidades. Nós **fortemente recomendamos** que você leia [a wiki completa do projeto](https://github.com/arkenfox/user.js/wiki). O Arkenfox também suporta o uso de [containers](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users). +O [projeto Arkenfox](https://github.com/arkenfox/user.js) fornece uma série de opções cuidadosamente selecionadas para o Firefox. Se você [decidir](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) usar o Arkenfox, [algumas opções](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) são subjetivamente estritas e/ou podem fazer alguns sites não funcionarem corretamente - [as quais você pode facilmente mudar](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) para atender as suas necessidades. Nós **fortemente recomendamos** que você leia [a wiki completa do projeto](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox apenas mira em impedir básicos ou ingênuos scripts de rastreio através de uma aleatorização de tela e as configurações incorporadas do Firefox para resistir às impressões digitais. Ele não mira em fazer o seu navegador se misturar com uma grande multidão de outros usuários do Arkenfox na mesma forma que o Mullvad Browser ou o Tor Browser fazem, que é a única forma de impedir scripts avançados de rastreio de impressões digitais. Lembre-se que você pode sempre usar vários navegadores, por exemplo, você pode considerar usar o Firefox + Arkenfox para alguns poucos sites que você confia ou deseja permanecer logado, e o Mullvad Browser para a navegação em um geral. @@ -225,23 +225,23 @@ Arkenfox apenas mira em impedir básicos ou ingênuos scripts de rastreio atrav ![Brave logo](assets/img/browsers/brave.svg){ align=right } -O **Brave Browser** inclui um bloqueador de conteúdo embutido e [recursos de privacidade](https://brave.com/privacy-features/), os quais muitos são ativados por padrão. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. O Brave foi construído com base no projeto de navegador Chromium, então deve parecer familiar e ter mínimos problemas de compatibilidade em websites. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ Essas opções podem ser encontradas em :material-menu: → **Configurações**. ##### Shields (Escudos) -A Brave inclui algumas medidas anti-impressão digital na sua funcionalidade [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) . Nós sugerimos configurar essas opções [globalmente](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) em todas as páginas que você visitar. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. As opções do Shields podem ser reduzidas para cada site caso necessário, mas por padrão nós recomendamos configurar as seguintes: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacidade e Segurança
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. O Brave **não** é tão resistente a impressões digitais como o Tor Browser e muito menos pessoas utilizam o Brave com o Tor, então você se destacará. Quando [é necessário um forte anonimato](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-)utilize o Tor Browser[](tor.md#tor-browser). +1. O Brave **não** é tão resistente a impressões digitais como o Tor Browser e muito menos pessoas utilizam o Brave com o Tor, então você se destacará. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ As funcionalidades Web3 do Brave podem potencialmente acrescentar à impressão #### Sync -O [Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) permite que os seus dados de navegação (histórico, marcadores, etc.) sejam acessíveis em todos os seus dispositivos sem necessidade de uma conta e protege-os com E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Recompensas Brave e Carteira @@ -371,7 +371,7 @@ O **uBlock Origin** é um bloqueador de conteúdo popular que pode te ajudar a b
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ Estamos trabalhando para estabelecer critérios definidos para cada seção de n - Disponível em Linux, macOS e Windows. - Quaisquer alterações necessárias para tornar o navegador mais respeitador da privacidade não devem afetar negativamente a experiência do usuário. - Bloqueia cookies de terceiros por padrão. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Melhor Caso Os nossos critérios de melhor caso representam o que gostaríamos de ver no projeto perfeito desta categoria. As nossas recomendações podem não incluir todas ou algumas destas funcionalidades, mas as que as incluem podem ter uma classificação mais elevada do que outras nesta página. - Inclui a funcionalidade de bloqueio de conteúdo integrado. -- Suporta a compartimentação de cookies (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. Isso pode ter vantagens sobre a instalação de aplicações baseadas no Electron, pois te beneficia das atualizações de segurança regulares do seu navegador. - Não inclui funcionalidades adicionais (bloatware) que não afetam a privacidade do usuário. - Não coleta telemetria por padrão. @@ -462,4 +462,4 @@ Os nossos critérios de melhor caso representam o que gostaríamos de ver no pro - Deve ter um impacto direto na privacidade do usuário, ou seja, não deve limitar-se a fornecer informações. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/pt-BR/desktop.md b/i18n/pt-BR/desktop.md index 7b6f0d0a..aeaa6210 100644 --- a/i18n/pt-BR/desktop.md +++ b/i18n/pt-BR/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/pt-BR/device-integrity.md b/i18n/pt-BR/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/pt-BR/device-integrity.md +++ b/i18n/pt-BR/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/pt-BR/dns.md b/i18n/pt-BR/dns.md index 9837a793..5d41f790 100644 --- a/i18n/pt-BR/dns.md +++ b/i18n/pt-BR/dns.md @@ -11,14 +11,14 @@ DNS criptografado com servidores de terceiros só deve ser usado para contornar ## Provedores Recomendados -| Provedor de DNS | Política de Privacidade | Protocolos | Registro | ECS | Filtragem | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Alguns[^1] | Yes | Based on personal configuration. As listas de filtragem usadas podem ser encontradas aqui. [**DNS over HTTPS**](https://en.wikipedia.org/wiki/DNS_over_HTTPS) as defined in [RFC 8484](https://datatracker.ietf.org/doc/html/rfc8484) packages queries in the [HTTP/2](https://en.wikipedia.org/wiki/HTTP/2) protocol and provides security with HTTPS. Support was first added in web browsers such as Firefox 60 and Chrome 83. | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Alguns[^2] | Não | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Opcional[^3] | Não | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | Não[^4] | Não | Based on personal configuration. As listas de filtragem usadas podem ser encontradas aqui. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Opcional[^5] | Opcional | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH/
DoT
DNSCrypt | Alguns[^6] | Opcional | Based on personal configuration, Malware blocking by default. | +| Provedor de DNS | Política de Privacidade | Protocolos | Registro | ECS | Filtragem | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Alguns[^1] | Yes | Based on personal configuration. As listas de filtragem usadas podem ser encontradas aqui. [**DNS over HTTPS**](https://en.wikipedia.org/wiki/DNS_over_HTTPS) as defined in [RFC 8484](https://datatracker.ietf.org/doc/html/rfc8484) packages queries in the [HTTP/2](https://en.wikipedia.org/wiki/HTTP/2) protocol and provides security with HTTPS. Support was first added in web browsers such as Firefox 60 and Chrome 83. | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Alguns[^2] | Não | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Opcional[^3] | Não | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | Não[^4] | Não | Based on personal configuration. As listas de filtragem usadas podem ser encontradas aqui. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Opcional[^5] | Opcional | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH/
DoT
DNSCrypt | Alguns[^6] | Opcional | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ Após a instalação de um perfil de configuração ou de um aplicativo que usa #### Signed Profiles -A Apple não fornece uma interface nativa para a criação de perfis DNS criptografados. Info Perfis assinados são preferidos; a assinatura valida a origem de um perfil e ajuda a garantir a integridade dos perfis. Uma marca de "Verificado" na cor verde é dada aos perfis de configuração assinados. Para mais informações sobre assinatura de código, ver [Sobre Assinatura de Código](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Perfis assinados** são oferecidos por [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), e [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +A Apple não fornece uma interface nativa para a criação de perfis DNS criptografados. Info Perfis assinados são preferidos; a assinatura valida a origem de um perfil e ajuda a garantir a integridade dos perfis. Uma marca de "Verificado" na cor verde é dada aos perfis de configuração assinados. Para mais informações sobre assinatura de código, ver [Sobre Assinatura de Código](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -73,7 +73,7 @@ obnoxious --> | Yes | encryptedDNS(Use<br> encrypted DNS<br> with [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -124,7 +124,7 @@ Uma solução de DNS auto-hospedada é útil para fornecer filtragem em platafor ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** é um programa de código aberto [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) que utiliza [filtragem DNS](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) para bloquear conteúdos web indesejados, tais como anúncios. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home apresenta um painel web amigável para ver informações e gerenciar conteúdos bloqueados. @@ -143,13 +143,13 @@ AdGuard Home apresenta um painel web amigável para ver informações e gerencia ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** é um programa de código aberto [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) que usa [filtragem DNS](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) para bloquear conteúdos web indesejados, como anúncios. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. O Pi-hole foi projetado para ser hospedado em um Raspberry Pi, mas não se limita a esse "hardware". O “software” apresenta uma interface web amigável para visualizar informações e gerenciar conteúdo bloqueado. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -158,8 +158,8 @@ O Pi-hole foi projetado para ser hospedado em um Raspberry Pi, mas não se limit
[^1]: O AdGuard armazena métricas de desempenho agregadas de seus servidores DNS, ou seja, o número de solicitações completas para um determinado servidor, o número de solicitações bloqueadas, e a velocidade de processamento dos pedidos. Eles também coletam e armazenam a base de dados de domínios solicitados nas últimas 24 horas. "Precisamos desta informação para identificar e bloquear novos rastreadores e ameaças". "Também registramos quantas vezes este ou aquele rastreador foi bloqueado. Precisamos desta informação para remover regras desatualizadas dos nossos filtros". [https://adguard-dns.io/pt_br/privacy.html](https://adguard.com/en/privacy/dns.html) -[^2]: O Cloudflare coleta e armazena apenas os dados limitados de consulta de DNS que são enviados para o resolvedor 1.1.1.1. O serviço de resolução 1.1.1.1 não registra dados pessoais, e a maior parte dos limitados dados de consulta, não pessoalmente identificáveis, é armazenado por apenas 25 horas. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: O Cloudflare coleta e armazena apenas os dados limitados de consulta de DNS que são enviados para o resolvedor 1.1.1.1. O serviço de resolução 1.1.1.1 não registra dados pessoais, e a maior parte dos limitados dados de consulta, não pessoalmente identificáveis, é armazenado por apenas 25 horas. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: ControlD somente coleta e armazena métricas para resolvedores "Premium" com perfis DNS personalizados. Resolvedores gratuitos não registram dados. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: O serviço DNS do Mullvad está disponível tanto para assinantes quanto para não assinantes do Mullvad VPN. A sua política de privacidade afirma explicitamente que não armazenam as solicitações DNS de maneira nenhuma. [https://mullvad.net/pt/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: O serviço DNS do Mullvad está disponível tanto para assinantes quanto para não assinantes do Mullvad VPN. A sua política de privacidade afirma explicitamente que não armazenam as solicitações DNS de maneira nenhuma. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. Você pode escolher o tempo de retenção e os locais de armazenamento dos registros para quaisquer registros que você decidir manter. Se não for especificamente solicitado, nenhum dado é armazenado. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 coleta alguns dados para fins de monitoramento e resposta a ameaças. Esses dados podem então ser misturados e divulgados, por exemplo, para fins de pesquisas de segurança. Quad9 não coleta ou grava endereços IP, ou outros dados que eles considerem pessoalmente identificáveis. [https://www.quad9.net/pt/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 coleta alguns dados para fins de monitoramento e resposta a ameaças. Esses dados podem então ser misturados e divulgados, por exemplo, para fins de pesquisas de segurança. Quad9 não coleta ou grava endereços IP, ou outros dados que eles considerem pessoalmente identificáveis. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/pt-BR/email-clients.md b/i18n/pt-BR/email-clients.md index e1e4459d..74c9ae41 100644 --- a/i18n/pt-BR/email-clients.md +++ b/i18n/pt-BR/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ Se você quiser permanecer conectado a sites específicos, você pode permitir e **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/pt-BR/email.md b/i18n/pt-BR/email.md index dafdebd8..1c4d87d7 100644 --- a/i18n/pt-BR/email.md +++ b/i18n/pt-BR/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ O Proton Mail tem relatórios internos de travamento que eles **não** compartil #### :material-check: { .pg-green } Domínios e Pseudônimos Personalizados -Assinantes pagos do Proton Mail podem usar seu próprio domínio com o serviço ou um endereço de [pega-tudo (catch-all)](https://proton.me/support/catch-all). Proton Mail também suporta [subendereçamento](https://proton.me/support/creating-aliases), o que é útil para as pessoas que não querem comprar um domínio. +Assinantes pagos do Proton Mail podem usar seu próprio domínio com o serviço ou um endereço de [pega-tudo (catch-all)](https://proton.me/support/catch-all). Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Métodos de Pagamento Privados @@ -129,7 +129,7 @@ O Proton Mail não oferece um recurso de legado digital. #### :material-check: { .pg-green } Domínios e Pseudônimos Personalizados -Mailbox.org permite que você use seu próprio domínio, e eles suportam [endereços pega-tudo (catch-all)](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain). Mailbox.org também suporta [subendereçamento](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), o que é útil se você não quer comprar um domínio. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Métodos de Pagamento Privados @@ -137,17 +137,17 @@ Mailbox.org não aceita nenhuma criptomoeda como resultado do seu processador de #### :material-check:{ .pg-green } Segurança da Conta -Mailbox.org suporta [autenticação de dois factores](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) apenas para o seu webmail. Você pode usar TOTP ou um [YubiKey](https://en.wikipedia.org/wiki/YubiKey) através do [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Padrões da Web como [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) ainda não são suportados. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Padrões da Web como [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) ainda não são suportados. #### :material-information-outline:{ .pg-blue } Segurança dos Dados -Mailbox.org permite criptografia de e-mails recebidos usando sua [caixa de correio criptografada](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). Novas mensagens que você receber serão imediatamente criptografadas com a sua chave pública. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). Novas mensagens que você receber serão imediatamente criptografadas com a sua chave pública. -No entanto, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), a plataforma de software usada por Mailbox.org, [não suporta](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) a criptografia do seu catálogo de endereços e calendário. Uma [opção autônoma](calendar.md) pode ser mais apropriada para essas informações. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. Uma [opção autônoma](calendar.md) pode ser mais apropriada para essas informações. #### :material-check:{ .pg-green } Criptografia do Email -Mailbox.org tem [criptografia integrada](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) em seu webmail, o que simplifica o envio de mensagens para pessoas com chaves OpenPGP públicas. Eles também permitem que [destinatários remotos descriptografem um e-mail](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) nos servidores da Mailbox.org. Esse recurso é útil quando o destinatário remoto não tem OpenPGP e não pode descriptografar uma cópia do e-mail em sua própria caixa de correio. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. Esse recurso é útil quando o destinatário remoto não tem OpenPGP e não pode descriptografar uma cópia do e-mail em sua própria caixa de correio. Mailbox.org também suporta a descoberta de chaves públicas via HTTP a partir do seu [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). Isso permite que pessoas fora do Mailbox.org encontrem as chaves OpenPGP de contas Mailbox.org facilmente, para criptografia ponta-a-ponta (E2EE) entre provedores. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Sua conta será definida como uma conta de usuário restrita quando o contrato t #### :material-information-outline:{ .pg-blue } Funcionalidades Adicionais -Você pode acessar sua conta do Mailbox.org via IMAP/SMTP usando o seu [serviço ".onion"](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). No entanto, sua interface webmail não pode ser acessada através do seu serviço ".onion" e você pode experimentar erros de certificado TLS. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). No entanto, sua interface webmail não pode ser acessada através do seu serviço ".onion" e você pode experimentar erros de certificado TLS. -Todas as contas vêm com armazenamento limitado na nuvem que [pode ser criptografado](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org também oferece o pseudônimo [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), que impõe a criptografia TLS na conexão entre os servidores de email, caso contrário, a mensagem não será enviada. Mailbox.org também suporta [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync), além dos protocolos de acesso padrão como IMAP e POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org também suporta [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync), além dos protocolos de acesso padrão como IMAP e POP3. Mailbox.org tem um recurso de legado digital para todos os planos. Você pode escolher se quer que os seus dados sejam transmitidos aos seus herdeiros, desde que estes o solicitem e apresentem o seu testamento. Como alternativa, você pode nomear uma pessoa através do seu nome e endereço. @@ -185,18 +185,18 @@ Estes provedores armazenam os seus e-mails com criptografia de conhecimento zero [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check: { .pg-green } Domínios e Pseudônimos Personalizados -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Métodos de Pagamento Privados @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). Isso garante que o contato do cliente com a empresa use o E2EE. O recurso custa 240 euros por ano. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). Isso garante que o contato do cliente com a empresa use o E2EE. O recurso custa 240 euros por ano. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ O uso de um serviço de pseudônimo exige que as mensagens não criptografadas s - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Recursos gratuitos de destaque: @@ -310,8 +310,8 @@ Recursos gratuitos de destaque: **SimpleLogin** é um serviço gratuito que fornece pseudônimos de e-mail em uma variedade de nomes de domínio compartilhados e, opcionalmente, oferece recursos pagos, como pseudônimos ilimitados e domínios personalizados. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Recursos gratuitos de destaque: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin foi [adquirido pelo Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) a partir de 8 de abril de 2022. Se você usa o Proton Mail como sua caixa de correio principal, o SimpleLogin é uma ótima opção. Como os dois produtos agora pertencem à mesma empresa, você só precisa confiar em uma única entidade. Também esperamos que, no futuro, o SimpleLogin seja mais fortemente integrado às ofertas da Proton. SimpleLogin continua a oferecer suporte ao encaminhamento para qualquer provedor de e-mail de sua escolha. A Securitum [auditou](https://simplelogin.io/blog/security-audit/) SimpleLogin no início de 2022 e todos os problemas [foram abordados](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin foi [adquirido pelo Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) a partir de 8 de abril de 2022. Se você usa o Proton Mail como sua caixa de correio principal, o SimpleLogin é uma ótima opção. Como os dois produtos agora pertencem à mesma empresa, você só precisa confiar em uma única entidade. Também esperamos que, no futuro, o SimpleLogin seja mais fortemente integrado às ofertas da Proton. SimpleLogin continua a oferecer suporte ao encaminhamento para qualquer provedor de e-mail de sua escolha. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). Você pode vincular sua conta SimpleLogin com sua conta Proton nas configurações. Se você tiver o Proton Unlimited, Business ou Visionary Plan, terá o SimpleLogin Premium gratuitamente. @@ -352,9 +352,9 @@ Administratores de sistema avançados podem considerar a possibilidade de config **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Administratores de sistema avançados podem considerar a possibilidade de config Para uma abordagem mais manual, selecionamos estes dois artigos: -- [Configurando um servidor de email com OpenSMTPD, Dovecot e Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [Como executar seu próprio servidor de email](https://www.c0ffee.net/blog/mail-server-guide/) (agosto de 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Requisitos @@ -386,7 +386,7 @@ Consideramos esses recursos importantes para fornecer um serviço seguro e otimi **Mínimo Para Qualificação:** - Criptografa os dados da conta de e-mail em repouso com criptografia de acesso zero. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ Consideramos esses recursos importantes para fornecer um serviço seguro e otimi - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Programas de recompensa por bugs e/ou um processo coordenado de divulgação de vulnerabilidades. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Confiança diff --git a/i18n/pt-BR/encryption.md b/i18n/pt-BR/encryption.md index d6619f1d..04895b56 100644 --- a/i18n/pt-BR/encryption.md +++ b/i18n/pt-BR/encryption.md @@ -22,15 +22,15 @@ As opções listadas aqui suportam múltiplas plataformas e são ótimas para cr [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ O Cryptomator usa criptografia AES-256 para criptografar arquivos e nomes de arq Algumas bibliotecas criptográficas do Cryptomator foram [auditadas](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) pela Cure53. O âmbito das bibliotecas auditadas inclui: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) e [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). A auditoria não se estendeu a [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), que é uma biblioteca usada pelo Cryptomator para o iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (Arquivo) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/pt-BR/file-sharing.md b/i18n/pt-BR/file-sharing.md index eaf46c2d..09646cc1 100644 --- a/i18n/pt-BR/file-sharing.md +++ b/i18n/pt-BR/file-sharing.md @@ -15,7 +15,7 @@ Descubra como compartilhar seus arquivos de forma privada entre seus dispositivo ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/pt-BR/financial-services.md b/i18n/pt-BR/financial-services.md index 5e4f9b62..7609b4d8 100644 --- a/i18n/pt-BR/financial-services.md +++ b/i18n/pt-BR/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/pt-BR/frontends.md b/i18n/pt-BR/frontends.md index 01d5ea76..1769b24a 100644 --- a/i18n/pt-BR/frontends.md +++ b/i18n/pt-BR/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/pt-BR/index.md b/i18n/pt-BR/index.md index eb956ef5..7b680d52 100644 --- a/i18n/pt-BR/index.md +++ b/i18n/pt-BR/index.md @@ -62,12 +62,12 @@ Tentar proteger os seus dados contra todos, o tempo todo, é impraticável, caro ## Precisamos de você! Como se envolver: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Participe do nosso fórum" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Siga-nos no Mastodon" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribua para este site" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Ajude a traduzir este site" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Converse conosco no Matrix" } -[:material-information-outline:](about/index.md){ title="Saiba mais sobre nós" } -[:material-hand-coin-outline:](about/donate.md){ title="Apoie o projeto" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } É importante que um site como o Privacy Guides esteja sempre atualizado. Precisamos que nosso público fique de olho nas atualizações de software para os aplicativos listados em nosso site e acompanhe as notícias recentes sobre os serviços que recomendamos. É difícil acompanhar o ritmo acelerado da internet, mas tentamos o nosso melhor. Se você detectar um erro, achar que um serviço não deve ser listado, notar que um serviço qualificado está faltando, acreditar que uma extensão de navegador não é mais a melhor escolha ou descobrir qualquer outro problema, informe-nos. diff --git a/i18n/pt-BR/kb-archive.md b/i18n/pt-BR/kb-archive.md index 9cb406b2..619e5c46 100644 --- a/i18n/pt-BR/kb-archive.md +++ b/i18n/pt-BR/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Algumas páginas que costumavam estar em nossa base de conhecimento agora podem ser encontradas em nosso blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrando a remoção de metadados](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrando a remoção de metadados](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/pt-BR/meta/admonitions.md b/i18n/pt-BR/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/pt-BR/meta/admonitions.md +++ b/i18n/pt-BR/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/pt-BR/meta/translations.md b/i18n/pt-BR/meta/translations.md index 30b4c572..60261b1c 100644 --- a/i18n/pt-BR/meta/translations.md +++ b/i18n/pt-BR/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/pt-BR/meta/uploading-images.md b/i18n/pt-BR/meta/uploading-images.md index e1628884..f27dc453 100644 --- a/i18n/pt-BR/meta/uploading-images.md +++ b/i18n/pt-BR/meta/uploading-images.md @@ -17,7 +17,7 @@ Logotipos de empresa tem tamanho de tela de: ### PNG -Use o [OptiPNG](https://sourceforge.net/projects/optipng/) para otimizar a imagem PNG: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/pt-BR/meta/writing-style.md b/i18n/pt-BR/meta/writing-style.md index fa07abc0..e25cd136 100644 --- a/i18n/pt-BR/meta/writing-style.md +++ b/i18n/pt-BR/meta/writing-style.md @@ -4,11 +4,11 @@ title: Estilo de Redação Privacy Guides foi escrito em inglês americano e você deve consultar as [diretrizes do Estilo APA](https://apastyle.apa.org/style-grammar-guidelines/grammar) em caso de dúvida. -Em geral, as [diretrizes federais de linguagem comum dos Estados Unidos](https://www.plainlanguage.gov/guidelines/) oferecem uma boa visão geral de como escrever de forma clara e concisa. Destacamos abaixo algumas observações importantes dessas diretrizes. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. Destacamos abaixo algumas observações importantes dessas diretrizes. ## Escrevendo para nossa audiência -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/pt-BR/mobile-browsers.md b/i18n/pt-BR/mobile-browsers.md index a096208f..19b4e26f 100644 --- a/i18n/pt-BR/mobile-browsers.md +++ b/i18n/pt-BR/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ Estes são os navegadores de celular e as configurações recomendadas atualment ## Android -No Android, o Firefox continua a ser menos seguro do que as alternativas baseadas no Chromium: O motor da Mozilla, [GeckoView](https://mozilla.github.io/geckoview/), ainda não suporta [isolamento de site](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) nem ativa [isolamento de processo (isolatedProcess)](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ No Android, o Firefox continua a ser menos seguro do que as alternativas baseada ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ Essas opções podem ser encontradas em :material-menu: → **Configurações** ##### Shields (Escudos) -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/pt-BR/multi-factor-authentication.md b/i18n/pt-BR/multi-factor-authentication.md index a9af8425..9869e4f7 100644 --- a/i18n/pt-BR/multi-factor-authentication.md +++ b/i18n/pt-BR/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/pt-BR/news-aggregators.md b/i18n/pt-BR/news-aggregators.md index 3302d314..4428a658 100644 --- a/i18n/pt-BR/news-aggregators.md +++ b/i18n/pt-BR/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/pt-BR/notebooks.md b/i18n/pt-BR/notebooks.md index a6a9beb7..c2c662a0 100644 --- a/i18n/pt-BR/notebooks.md +++ b/i18n/pt-BR/notebooks.md @@ -34,7 +34,7 @@ Se você estiver usando atualmente um aplicativo como Evernote, Google Keep, ou - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ Se você estiver usando atualmente um aplicativo como Evernote, Google Keep, ou ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ Se você estiver usando atualmente um aplicativo como Evernote, Google Keep, ou Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel * *Joplin** é um aplicativo de anotações e tarefas gratuito, de código aberto e com todos os recursos que pode lidar com um grande número de anotações organizadas em blocos de anotações e tags. Ele oferece E2EE e pode sincronizar através do Nextcloud, Dropbox e muito mais. Oferece também uma importação fácil a partir do Evernote e notas de texto simples. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/pt-BR/os/android-overview.md b/i18n/pt-BR/os/android-overview.md index 7414e63b..aacf19e5 100644 --- a/i18n/pt-BR/os/android-overview.md +++ b/i18n/pt-BR/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/pt-BR/os/ios-overview.md b/i18n/pt-BR/os/ios-overview.md index 54464daf..9f2ee0a8 100644 --- a/i18n/pt-BR/os/ios-overview.md +++ b/i18n/pt-BR/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/pt-BR/os/linux-overview.md b/i18n/pt-BR/os/linux-overview.md index 93457d02..6e55edfa 100644 --- a/i18n/pt-BR/os/linux-overview.md +++ b/i18n/pt-BR/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## Recomendações gerais @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/pt-BR/os/macos-overview.md b/i18n/pt-BR/os/macos-overview.md index 0431d91c..be460fe3 100644 --- a/i18n/pt-BR/os/macos-overview.md +++ b/i18n/pt-BR/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Firefox Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/pt-BR/os/qubes-overview.md b/i18n/pt-BR/os/qubes-overview.md index fae7cce1..043b4c9f 100644 --- a/i18n/pt-BR/os/qubes-overview.md +++ b/i18n/pt-BR/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## Como funciona o Qubes OS? -Qubes usa [compartimentação](https://www.qubes-os.org/intro/) para manter o sistema seguro. Os Qubes são criados a partir de modelos, sendo as predefinições para Fedora, Debian e [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Os Qubes são criados a partir de modelos, sendo as predefinições para Fedora, Debian e [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Borda colorida](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Cópia e Colagem de Texto -Você pode [copiar e colar texto](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) usando `qvm-copy-to-vm` ou as instruções abaixo: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Recursos Adicionais -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/pt-BR/passwords.md b/i18n/pt-BR/passwords.md index 2145e415..ce6b27db 100644 --- a/i18n/pt-BR/passwords.md +++ b/i18n/pt-BR/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Gerenciador de Senhas operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Gerenciador de Senhas operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Gerenciador de Senhas operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Gerenciador de Senhas operatingSystem: - Windows @@ -127,7 +127,7 @@ Os gerenciadores de senhas permitem que você armazene e gerencie com segurança Gerenciadores de senhas que vêm de fábrica em aplicativos como navegadores e sistemas operacionais às vezes não são tão bons quanto um aplicativo exclusivo para gerenciamento de senhas. A vantagem de um gerenciador de senhas interno é a boa integração com o programa, mas, em geral, ele pode ser muito simples e não ter os recursos de privacidade e segurança que as ofertas autônomas têm. -Por exemplo, o gerenciador de senhas do Microsoft Edge não oferece em absoluto o E2EE. O gerenciador de senhas do Google tem [optional](https://support.google.com/accounts/answer/11350823) E2EE, e [Apple's](https://support.apple.com/en-us/HT202303) oferece E2EE por padrão. +Por exemplo, o gerenciador de senhas do Microsoft Edge não oferece em absoluto o E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ Esses gerenciadores de senhas sincronizam suas senhas com um servidor em nuvem p [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ Esses gerenciadores de senhas sincronizam suas senhas com um servidor em nuvem p -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ Uma vantagem do 1Password sobre o Bitwarden é seu suporte de primeira classe do Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/pt-BR/photo-management.md b/i18n/pt-BR/photo-management.md index f0ce22ac..4bb9cc33 100644 --- a/i18n/pt-BR/photo-management.md +++ b/i18n/pt-BR/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/pt-BR/productivity.md b/i18n/pt-BR/productivity.md index 639e053a..7d7955ad 100644 --- a/i18n/pt-BR/productivity.md +++ b/i18n/pt-BR/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Nosso critério de melhor caso representa o que gostaríamos de ver em um projet **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Nosso critério de melhor caso representa o que gostaríamos de ver em um projet **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Nosso critério de melhor caso representa o que gostaríamos de ver em um projet - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/pt-BR/real-time-communication.md b/i18n/pt-BR/real-time-communication.md index ebadd93a..a8ac67fb 100644 --- a/i18n/pt-BR/real-time-communication.md +++ b/i18n/pt-BR/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/pt-BR/router.md b/i18n/pt-BR/router.md index ebbdda64..192d4d64 100644 --- a/i18n/pt-BR/router.md +++ b/i18n/pt-BR/router.md @@ -35,10 +35,10 @@ Você pode consultar a tabela [de hardware](https://openwrt.org/toh/start) do Op **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. O OPNsense é comumente implantado como um firewall de perímetro, roteador, ponto de acesso wireless, servidor DHCP, servidor DNS e endpoint de VPN. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentação} +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribuir } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/pt-BR/search-engines.md b/i18n/pt-BR/search-engines.md index 2a4fbe9c..fda6a128 100644 --- a/i18n/pt-BR/search-engines.md +++ b/i18n/pt-BR/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/pt-BR/tools.md b/i18n/pt-BR/tools.md index 698d59e0..3baf0297 100644 --- a/i18n/pt-BR/tools.md +++ b/i18n/pt-BR/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides é o site mais transparente e confiável para encont Se você está procurando uma solução específica para algo, estas são as ferramentas de hardware e software que recomendamos em uma variedade de categorias. Nossas ferramentas de privacidade recomendadas são principalmente escolhidas com base em recursos de segurança, com ênfase adicional em ferramentas descentralizadas e de código aberto. São aplicáveis a uma variedade de modelos de ameaça que vão desde a proteção contra programas globais de vigilância em massa e evitar grandes empresas de tecnologia, até à atenuação de ataques, mas só você pode determinar o que funcionará melhor para as suas necessidades. -Se você estiver à procura de orientação para descobrir as melhores ferramentas de privacidade e programas alternativos para suas necessidades, inicie uma discussão em nosso [fórum](https://discuss.privacyguides.net/) ou em nossa comunidade [Matrix](https://matrix.to/#/#privacyguides:matrix.org)! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! Para mais detalhes sobre cada projeto, porque foram escolhidos, e dicas ou truques adicionais que recomendamos, clique no link "Saiba mais" em cada seção, ou clique na própria recomendação para ser levado a essa seção específica da página. @@ -89,7 +89,7 @@ Para mais detalhes sobre cada projeto, porque foram escolhidos, e dicas ou truqu #### Serviços DNS -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Saiba mais :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/pt-BR/tor.md b/i18n/pt-BR/tor.md index e7da9411..005c210b 100644 --- a/i18n/pt-BR/tor.md +++ b/i18n/pt-BR/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Navegador Tor image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Navegador de Internet operatingSystem: @@ -27,11 +27,11 @@ schema: A rede **Tor** é um grupo de servidores operados por voluntários que permite que você se conecte gratuitamente para melhorar a sua privacidade e segurança na Internet. Os indivíduos e organizações também podem compartilhar informações através da rede Tor com "serviços ocultos .onion", sem comprometer sua privacidade. Como o tráfego do Tor é difícil de bloquear e rastrear, o Tor é uma ferramenta eficaz para contornar a censura. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } O Tor funciona roteando seu tráfego de internet através desses servidores operados por voluntários, em vez de fazer uma conexão direta com o site que você está tentando visitar. Isto esconde de onde vem o tráfego, e nenhum servidor no caminho de conexão consegue ver toda a trajetória de onde o tráfego vem e para onde vai, isto significa que mesmo os servidores que você está usando para conectar não podem quebrar seu anonimato. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b O **Navegador Tor** é a melhor opção se você quer anonimato, pois ele fornece acesso à rede Tor e pontes, e inclui configurações padrão e extensões que são configuradas automaticamente pelos níveis de segurança: *Padrão*, *Mais seguro* e *O Mais Seguro*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -92,7 +92,7 @@ Você nunca deve instalar outras extensões no Navegador Tor ou editar as config -Este navegador dá acesso às Pontes Tor (Tor Bridges) e a \[Rede Tor\](https://en.wikipedia.org/wiki/Tor_(rede)), juntamente com extensões que podem ser configuradas automaticamente para se adaptarem aos três níveis de segurança propostos - *Standard*, *Safer* e *Safest*. Portanto, é importante que você **não** modifique o navegador fora dos [níveis de segurança disponíveis](https://tb-manual.torproject.org/security-settings/). +Este navegador dá acesso às Pontes Tor (Tor Bridges) e a \[Rede Tor\](https://en.wikipedia.org/wiki/Tor_(rede)), juntamente com extensões que podem ser configuradas automaticamente para se adaptarem aos três níveis de segurança propostos - *Standard*, *Safer* e *Safest*. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -104,7 +104,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** é uma VPN Tor gratuita para celulares que encaminha o tráfego de qualquer aplicativo no seu dispositivo através da Rede Tor. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -114,7 +114,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -140,7 +140,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -170,10 +170,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -187,4 +187,4 @@ Snowflake does not increase your privacy in any way, nor is it used to connect t Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. -[^1]: A configuração `"Isolar os endereços de destino"` (IsolateDestAddr) é discutida na [lista de e-mails do Tor](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) e na documentação ["Whonix's Stream Isolation"](https://www.whonix.org/wiki/Stream_Isolation), onde ambos os projetos sugerem que, normalmente, essa não é uma boa opção para a maioria das pessoas. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/pt-BR/vpn.md b/i18n/pt-BR/vpn.md index 36ed76c4..e284118e 100644 --- a/i18n/pt-BR/vpn.md +++ b/i18n/pt-BR/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. Se você está procurando por * * segurança * * adicional, você sempre deve verificar se está se conectando a sites que usam HTTPS. Uma VPN não substitui boas práticas de segurança. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Nossos provedores recomendados usam criptografia, aceitam Monero, suportam WireG **Proton VPN** é um forte concorrente no espaço VPN, e estão em funcionamento desde 2016. Proton AG está sediada na Suíça e oferece um plano gratuito limitado, bem como uma opção paga com mais recursos. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ Nós também consideramos que é melhor para a segurança das chaves privadas do #### :material-check:{ .pg-green } Examinado por auditores externos -Em Janeiro de 2020, ProtonVPN foi submetida a uma auditoria independente pela SEC Consult. A SEC Consult encontrou algumas vulnerabilidades de médio e baixo risco nos aplicativos Windows, Android e iOS da Proton VPN, todos os quais foram "devidamente corrigidos" pela Proton VPN antes que os relatórios fossem publicados. Nenhum dos problemas identificados teria proporcionado acesso remoto ao seu dispositivo ou tráfego. Você pode ver os relatórios individuais para cada plataforma em [protonvpn.com](https://protonvpn.com/blog/open-source/). Em abril de 2022 Proton VPN passou por [outra auditoria](https://protonvpn.com/blog/no-logs-audit/) e o relatório foi [produzido pelo Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). Um [certificado de segurança](https://proton.me/blog/security-audit-all-proton-apps) foi concedido para os aplicativos do Proton Mail em 9 de Novembro de 2021 pela [Securitium](https://research.securitum.com). +Em Janeiro de 2020, ProtonVPN foi submetida a uma auditoria independente pela SEC Consult. A SEC Consult encontrou algumas vulnerabilidades de médio e baixo risco nos aplicativos Windows, Android e iOS da Proton VPN, todos os quais foram "devidamente corrigidos" pela Proton VPN antes que os relatórios fossem publicados. Nenhum dos problemas identificados teria proporcionado acesso remoto ao seu dispositivo ou tráfego. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). Um [certificado de segurança](https://proton.me/blog/security-audit-all-proton-apps) foi concedido para os aplicativos do Proton Mail em 9 de Novembro de 2021 pela [Securitium](https://research.securitum.com). #### :material-check:{ .pg-green } Clientes de Código Aberto (Open-Source) @@ -84,31 +84,31 @@ Proton VPN, além de aceitar cartões de crédito/débito, PayPal e [Bitcoin](ad #### :material-check:{ .pg-green } Suporta WireGuard -Proton VPN suporta principalmente o protocolo WireGuard®. [WireGuard](https://www.wireguard.com) é um protocolo mais recente que usa criptografia de última geração [](https://www.wireguard.com/protocol/). Além disso, WireGuard pretende ser mais simples e mais eficiente. +Proton VPN suporta principalmente o protocolo WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Além disso, WireGuard pretende ser mais simples e mais eficiente. -Proton VPN [recomenda](https://protonvpn.com/blog/wireguard/) o uso do WireGuard em seu serviço. Nos aplicativos do Proton VPN para Windows, macOS, iOS, Android, ChromeOS e Android TV, o WireGuard é o protocolo padrão; no entanto, o [suporte](https://protonvpn.com/support/how-to-change-vpn-protocols/) para o protocolo não está presente em seu aplicativo para Linux. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Encaminhamento de Porta Remoto -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Clientes Móveis -Além de fornecer arquivos de configuração padronizados para o OpenVPN, o Proton VPN tem clientes móveis para a [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US) e [GitHub](https://github.com/ProtonVPN/android-app/releases), permitindo conexões fáceis com seus servidores. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Funcionalidades Adicionais -Os clientes Proton VPN suportam a autenticação de dois fatores em todas as plataformas, exceto no Linux, no momento. Proton VPN tem seus próprios servidores e centros de dados na Suíça, Islândia e Suécia. They offer content blocking and known-malware blocking with their DNS service. Além disso, Proton VPN também oferece servidores "Tor" que permitem que você se conecte facilmente a sites onion, mas ainda recomendamos fortemente o uso do [Navegador Tor oficial](https://www.torproject.org/) para essa finalidade. +Os clientes Proton VPN suportam a autenticação de dois fatores em todas as plataformas, exceto no Linux, no momento. Proton VPN tem seus próprios servidores e centros de dados na Suíça, Islândia e Suécia. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } O recurso Killswitch não funciona em Macs baseados em Intel -Podem [ocorrer falhas](https://protonvpn.com/support/macos-t2-chip-kill-switch/) no sistema em Macs baseados em Intel ao usar o VPN killswitch. Se você precisar desse recurso e estiver usando um Mac com chipset Intel, considere usar outro serviço de VPN. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. Se você precisar desse recurso e estiver usando um Mac com chipset Intel, considere usar outro serviço de VPN. ### IVPN @@ -118,9 +118,9 @@ Podem [ocorrer falhas](https://protonvpn.com/support/macos-t2-chip-kill-switch/) **IVPN** is another premium VPN provider, and they have been in operation since 2009. A IVPN está sediada em Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ Podem [ocorrer falhas](https://protonvpn.com/support/macos-t2-chip-kill-switch/) - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ Podem [ocorrer falhas](https://protonvpn.com/support/macos-t2-chip-kill-switch/) #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Isto deve-se a um caminho mais curto (menos pulos) até ao destino. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Isto deve-se a um caminho mais curto (menos pulos) até ao destino. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ Nós também consideramos que é melhor para a segurança das chaves privadas do #### :material-check:{ .pg-green } Examinado por auditores externos -IVPN foi submetido a uma [auditoria de ausência de registro de dados (no-logging) pela Cure53](https://cure53.de/audit-report_ivpn.pdf), cuja conclusão confirmou a reivindicação de que o IVPN não registra dados. IVPN também elaborou um [relatório completo de Teste de Penetração (pentest) pela Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) em janeiro de 2020. IVPN também disse que eles planejam ter [relatórios anuais](https://www.ivpn.net/blog/independent-security-audit-concluded) no futuro. Uma revisão adicional foi feita [em abril de 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) e foi publicada pela Cure53 [em seu site](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN foi submetido a uma [auditoria de ausência de registro de dados (no-logging) pela Cure53](https://cure53.de/audit-report_ivpn.pdf), cuja conclusão confirmou a reivindicação de que o IVPN não registra dados. IVPN também elaborou um [relatório completo de Teste de Penetração (pentest) pela Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) em janeiro de 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Clientes de Código Aberto (Open-Source) -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). O código-fonte pode ser obtido da sua [organização (GitHub)](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). O código-fonte pode ser obtido da sua [organização (GitHub)](https://github.com/ivpn). #### :material-check:{ .pg-green } Aceita Dinheiro e Monero @@ -160,25 +160,25 @@ Além de aceitar cartões de crédito/débito e PayPal, IVPN aceita Bitcoin, **M #### :material-check:{ .pg-green } Suporta WireGuard -IVPN suporta o protocolo WireGuard®️. [WireGuard](https://www.wireguard.com) é um protocolo mais recente que usa criptografia de última geração [](https://www.wireguard.com/protocol/). Além disso, WireGuard pretende ser mais simples e mais eficiente. +IVPN suporta o protocolo WireGuard®️. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Além disso, WireGuard pretende ser mais simples e mais eficiente. -IVPN [recomenda](https://www.ivpn.net/wireguard/) o uso do WireGuard em seu serviço e, sendo assim, ele é o protocolo padrão em todos os aplicativos do IVPN. O IVPN também oferece um gerador de configuração do WireGuard para ser usado com os [aplicativos](https://www.wireguard.com/install/) oficiais do WireGuard. +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Encaminhamento de Porta Remoto -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Clientes Móveis -Além de disponibilizar os arquivos de configuração padrão do OpenVPN, o IVPN tem aplicativos móveis disponíveis na [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) e [GitHub](https://github.com/ivpn/android-app/releases), facilitando a conexão com seus servidores. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Funcionalidades Adicionais -Aplicativos IVPN suportam autenticação de dois fatores (aplicativos Mullvad não suportam). IVPN também oferece a função "[AntiTracker](https://www.ivpn.net/antitracker)", que bloqueia redes de anúncios e rastreadores desde o nível da rede. +Aplicativos IVPN suportam autenticação de dois fatores (aplicativos Mullvad não suportam). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ Aplicativos IVPN suportam autenticação de dois fatores (aplicativos Mullvad n [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ Aplicativos IVPN suportam autenticação de dois fatores (aplicativos Mullvad n #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Isso se deve a uma rota mais curta (menos saltos) até o destino. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Isso se deve a uma rota mais curta (menos saltos) até o destino. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Clientes de Código Aberto (Open-Source) @@ -239,17 +239,17 @@ Mullvad, além de aceitar cartões de crédito/débito e PayPal, aceita Bitcoin, #### :material-check:{ .pg-green } Suporta WireGuard -Mullvad suporta o protocolo WireGuard®. [WireGuard](https://www.wireguard.com) é um protocolo mais recente que usa criptografia de última geração [](https://www.wireguard.com/protocol/). Além disso, WireGuard pretende ser mais simples e mais eficiente. +Mullvad suporta o protocolo WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Além disso, WireGuard pretende ser mais simples e mais eficiente. -Mullvad [recomenda](https://mullvad.net/en/help/why-wireguard/) o uso do WireGuard em seu serviço. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Encaminhamento de Porta Remoto -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Clientes Móveis -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Funções Adicionais -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Requisitos diff --git a/i18n/pt/CODE_OF_CONDUCT.md b/i18n/pt/CODE_OF_CONDUCT.md index 906f2ed6..8e55c7ee 100644 --- a/i18n/pt/CODE_OF_CONDUCT.md +++ b/i18n/pt/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ O que esperamos dos membros das nossas comunidades: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Comporte-se de uma forma positiva e construtiva** diff --git a/i18n/pt/about/index.md b/i18n/pt/about/index.md index c5e6d627..2bd695eb 100644 --- a/i18n/pt/about/index.md +++ b/i18n/pt/about/index.md @@ -21,19 +21,19 @@ schema: O **Privacy Guides** é um site de motivação social que fornece [informações](/kb) com vista à segurança e a privacidade dos seus dados. A nossa missão é informar o público sobre o valor da privacidade digital e as iniciativas governamentais globais que têm como objetivo monitorizar a sua atividade online. Somos um coletivo sem fins lucrativos, gerido inteiramente por uma [equipa de voluntários](https://discuss.privacyguides.net/g/team) e colaboradores. O nosso site não tem publicidade e não é afiliado a nenhum dos fornecedores listados. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } -[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Código-fonte" } -[:octicons-heart-16:](donate.md){ .card-link title=Contribuir } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } +[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } +[:octicons-heart-16:](donate.md){ .card-link title=Contribute } > Para encontrar aplicações [alternativas centradas na privacidade], consulte sites como Good Reports e **Privacy Guides**, que listam aplicações centradas na privacidade numa variedade de categorias, nomeadamente fornecedores de e-mail (normalmente em planos pagos) que não são geridos pelas grandes empresas tecnológicas. -- [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > Se está à procura de uma nova VPN, pode beneficiar do código de desconto de praticamente qualquer podcast. Se está à procura de uma **boa** VPN, precisa de ajuda profissional. O mesmo se aplica aos clientes de e-mail, browsers, sistemas operativos e gestores de palavras-passe. Como saber qual é a melhor opção no que diz respeito à privacidade? Para isso, existe o **Privacy Guides**, uma plataforma com vários voluntários que pesquisam diariamente as melhores ferramentas de proteção da privacidade para utilizar na Internet. - [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Traduzido do holandês] -Também destacado em: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), e [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## História @@ -41,7 +41,7 @@ O Privacy Guides foi lançado em setembro de 2021 como uma continuação do [def Em 2022, concluímos a transição da estrutura do nosso principal site de Jekyll para MkDocs, utilizando o software de documentação `mkdocs-material`. Esta alteração tornou as contribuições de código aberto para o nosso site significativamente mais fáceis de realizar por pessoas de fora da estrutura, uma vez que deixou de ser necessária a utilização de uma sintaxe complicada para escrever mensagens de forma eficaz, bastando agora escrever um documento em formato Markdown. -Além disso, lançámos o nosso novo fórum de discussão em [discuss.privacyguides.net](https://discuss.privacyguides.net/) como uma plataforma comunitária para partilhar ideias e colocar questões sobre a nossa missão. Com isto, aumentamos a nossa comunidade existente no Matrix e substituimos a nossa anterior plataforma GitHub Discussions, diminuindo a nossa dependência de plataformas de discussão proprietárias. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. Com isto, aumentamos a nossa comunidade existente no Matrix e substituimos a nossa anterior plataforma GitHub Discussions, diminuindo a nossa dependência de plataformas de discussão proprietárias. Até ao momento, lançámos traduções internacionais do nosso site em [Francês](/fr/), [Hebraico](/he/), e [Holandês](/nl/), estando neste momento em preparação versões em mais línguas, graças ao contributo da nossa excelente equipa de tradução do [Crowdin](https://crowdin.com/project/privacyguides). Tencionamos continuar a levar por diante a nossa missão de divulgação e educação e encontrar formas de realçar mais claramente os perigos da falta de sensibilização para a privacidade na era digital moderna, bem como a prevalência e os danos das violações de segurança na indústria tecnológica. diff --git a/i18n/pt/about/notices.md b/i18n/pt/about/notices.md index d6fc057b..7011e8d7 100644 --- a/i18n/pt/about/notices.md +++ b/i18n/pt/about/notices.md @@ -29,7 +29,7 @@ Isto não inclui código de terceiros incorporado neste repositório, ou código Isto significa que pode utilizar o conteúdo legível por humanos neste repositório para o seu próprio projeto, de acordo com os termos descritos no texto da Licença Pública Internacional Creative Commons Attribution-NoDerivatives 4.0. Pode fazê-lo com alguma contenção, de forma a não dar a entender que o Privacy Guides o apoia ou apoia as suas ações. **Não poderá** utilizar a marca Privacy Guides no seu próprio projeto, sem a aprovação expressa do projeto. As marcas registadas do Privacy Guides incluem a marca nominativa "Privacy Guides" e o logótipo do escudo. -Acreditamos que os logótipos e outras imagens em `assets` obtidos de fornecedores terceiros são de domínio público ou de **utilização justa**. Em suma, [a doutrina legal de utilização justa](https://www.copyright.gov/fair-use/more-info.html) permite a utilização de imagens protegidas por direitos de autor para identificar o assunto, para efeitos de comentário público. No entanto, esses logótipos e outras imagens podem ainda estar sujeitos à legislação sobre marcas registadas numa ou mais jurisdições. Antes de utilizar esse conteúdo, certifique-se de que é utilizado para identificar a entidade ou organização proprietária da marca registada e de que tem o direito de o utilizar ao abrigo da legislação aplicável nas circunstâncias da utilização pretendida. *Ao copiar conteúdos deste site, o utilizador é o único responsável por garantir que não infringe a marca registada ou os direitos de autor de terceiros.* +Acreditamos que os logótipos e outras imagens em `assets` obtidos de fornecedores terceiros são de domínio público ou de **utilização justa**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. No entanto, esses logótipos e outras imagens podem ainda estar sujeitos à legislação sobre marcas registadas numa ou mais jurisdições. Antes de utilizar esse conteúdo, certifique-se de que é utilizado para identificar a entidade ou organização proprietária da marca registada e de que tem o direito de o utilizar ao abrigo da legislação aplicável nas circunstâncias da utilização pretendida. *Ao copiar conteúdos deste site, o utilizador é o único responsável por garantir que não infringe a marca registada ou os direitos de autor de terceiros.* Quando contribui para o nosso site, está a fazê-lo ao abrigo das licenças acima referidas e concede ao Privacy Guides uma licença perpétua, mundial, não exclusiva, transferível, isenta de direitos de autor e irrevogável, com o direito de sublicenciar esses direitos através de vários níveis de sublicenciados, para reproduzir, modificar, apresentar, executar e distribuir o seu contributo como parte do nosso projeto. @@ -47,4 +47,4 @@ Não deve realizar quaisquer atividades de recolha de dados sistemáticas ou aut --- -*Algumas partes desta nota foram adotadas de [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) no GitHub. Esse recurso e esta página estão protegidos ao abrigo da licença [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Algumas partes desta nota foram adotadas de [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) no GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/pt/about/privacytools.md b/i18n/pt/about/privacytools.md index 2a685ab0..ac166ccc 100644 --- a/i18n/pt/about/privacytools.md +++ b/i18n/pt/about/privacytools.md @@ -14,13 +14,13 @@ Após esta mudança organizacional, o fundador do PrivacyTools reapareceu e come O PrivacyTools foi criado em 2015 por "BurungHantu", com o objetivo de criar um recurso de informações sobre ferramentas relacionadas com privacidade, logo após as revelações de Snowden. O site transformou-se num projeto de código aberto florescente com [muitos colaboradores](https://github.com/privacytools/privacytools.io/graphs/contributors), alguns deles com várias responsabilidades organizacionais, tais como a gestão de serviços online como Matrix e Mastodon, a gestão e revisão das atualizações do site no GitHub, a procura de patrocinadores para o projeto, a escrita de artigos de blogue e a gestão de redes sociais como o Twitter, entre outras. -Em 2019, BurungHantu começou a distanciar-se cada vez do desenvolvimento ativo do site e das comunidades e começou a atrasar os pagamentos pelos quais era responsável, relacionados com a utilização dos servidores. Para evitar que o administrador do sistema pagasse esses custos do próprio bolso, as contas de doação do PayPal e de criptografia de BurungHantu foram substituídas por uma nova página OpenCollective, em [31 de outubro de 2019](https://web.archive. org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). Este passo fez com que as nossas finanças se tornassem totalmente transparentes, um princípio em que acreditamos fortemente, e dedutíveis nos impostos dos Estados Unidos, pelo facto de estarem a ser mantidas pela Open Collective Foundation 501(c)3. Esta mudança foi unanimemente acordada pela equipa, não tendo sofrido nenhuma contestação. +Em 2019, BurungHantu começou a distanciar-se cada vez do desenvolvimento ativo do site e das comunidades e começou a atrasar os pagamentos pelos quais era responsável, relacionados com a utilização dos servidores. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). Este passo fez com que as nossas finanças se tornassem totalmente transparentes, um princípio em que acreditamos fortemente, e dedutíveis nos impostos dos Estados Unidos, pelo facto de estarem a ser mantidas pela Open Collective Foundation 501(c)3. Esta mudança foi unanimemente acordada pela equipa, não tendo sofrido nenhuma contestação. ## Porque nos mudámos Em 2020, a ausência de BurungHantu tornou-se mais notória. A certa altura, exigimos que os servidores de DNS fossem alterados para servidores de DNS controlados pelo nosso administrador de sistema, de forma a evitar interrupções futuras, uma alteração que só foi atendida após mais de um mês da solicitação inicial. A sua ausência fazia-se sentir durante meses nas salas públicas de chat e nas salas privadas de chat da equipa, no Matrix. Ocasionalmente aparecia para dar um pequeno feedback ou prometer ser mais ativo, desaparecendo em seguida. -Em outubro de 2020, o administrador de sistema do PrivacyTools (Jonah) [abandonou](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) o projeto devido a essas dificuldades, passando o controle para outro colaborador de longa data. Durante a ausência de BurungHantu, era Jonah quem operava quase todos os serviços do PrivacyTools, atuando como o líder de projeto *de facto* do desenvolvimento do site, portanto, sua saída pelo que a sua saída foi uma mudança impactante na organização. Na altura, e devido a esse impacto significativo na organização, BurungHantu prometeu à restante equipa que voltaria, daí em diante, a assumir o controle do projeto. ==Nos meses seguintes, a equipe do PrivacyTools tentou o contacto através de vários meios de comunicação, não tendo, contudo, recebido qualquer resposta.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Durante a ausência de BurungHantu, era Jonah quem operava quase todos os serviços do PrivacyTools, atuando como o líder de projeto *de facto* do desenvolvimento do site, portanto, sua saída pelo que a sua saída foi uma mudança impactante na organização. Na altura, e devido a esse impacto significativo na organização, BurungHantu prometeu à restante equipa que voltaria, daí em diante, a assumir o controle do projeto. ==Nos meses seguintes, a equipe do PrivacyTools tentou o contacto através de vários meios de comunicação, não tendo, contudo, recebido qualquer resposta.== ## Confiança no Domínio @@ -34,25 +34,25 @@ Em meados de 2021, a equipa do PrivacyTools contactou Jonah, que acedeu em regre ## Apelo à Ação da Comunidade -No final de julho de 2021, [informámos](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) a comunidade PrivacyTools da nossa intenção de escolher um novo nome e continuar o projeto num novo domínio, a ser [escolhido](https://web.archive.org/web/20210729190935/https://aragon.cloud /apps/forms/cMPxG9KyopapBbcw) até 2 de agosto de 2022. "Privacy Guides" foi o nome selecionado, aproveitando o domínio `privacyguides.org` que já pertencia a Jonah, e que tinha sido reservado para um projeto paralelo de 2020, que entretanto não foi desenvolvido. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. "Privacy Guides" foi o nome selecionado, aproveitando o domínio `privacyguides.org` que já pertencia a Jonah, e que tinha sido reservado para um projeto paralelo de 2020, que entretanto não foi desenvolvido. ## Controle de r/privacytoolsIO -Em simultâneo com os problemas contínuos do site privacytools.io, a equipa de moderação do r/privacytoolsIO estava a enfrentar desafios para gerir o subreddit. O subreddit sempre foi gerido de forma independente do desenvolvimento do site, mas BurungHantu também era o principal moderador do subreddit, e o único moderador com privilégios de "Controle total". u/trai_dep era o único moderador ativo na altura, e [publicou](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) uma solicitação aos administradores do Reddit, em 28 de junho de 2021, com o objetivo de ser promovido a moderador principal, com privilégios de controle total, de forma a poder fazer as alterações necessárias no Subreddit. +Em simultâneo com os problemas contínuos do site privacytools.io, a equipa de moderação do r/privacytoolsIO estava a enfrentar desafios para gerir o subreddit. O subreddit sempre foi gerido de forma independente do desenvolvimento do site, mas BurungHantu também era o principal moderador do subreddit, e o único moderador com privilégios de "Controle total". u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. O Reddit exige que os subreddits tenham moderadores ativos. Se o moderador principal estiver inativo durante um longo período de tempo (por exemplo, um ano), a posição de moderador principal pode ser atribuída ao moderador seguinte. Para que esse pedido fosse atendido, era necessário que BurungHantu tivesse estado completamente ausente de todas as atividades do Reddit durante um longo período de tempo, o que era consistente com o seu comportamento noutras plataformas. > Se perder o privilégio de moderador de um subreddit através de um pedido do Reddit, significa que foram a sua falta de resposta e falta de atividade que qualificaram o subreddit para uma transferência r/redditrequest. > -> r/redditrequest é a forma que o Reddit tem de garantir que as comunidades tenham moderadores ativos, como consta no [Código de Conduta do Moderador](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Início da Transição -Em 14 de setembro de 2021, [anunciámos](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) o início de nossa migração para este novo domínio: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] Considerámos necessário fazer a mudança o mais rapidamente possível, de forma a garantir que as pessoas tivessem, o quanto antes, conhecimento desse facto. Essa estratégia dá-nos o tempo suficiente para fazer a transição de domínio, que está atualmente a ser redirecionado para www.privacyguides.org, na esperança que dê a todos o tempo suficiente para que a mudança seja percebida, para a atualização dos favoritos e sites, etc. -Esta alteração [implicou:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecionamento de www.privacytools.io para [www.privacyguides.org](https://www.privacyguides.org). - Arquivamento do código-fonte no GitHub para preservação do trabalho anterior e do rastreador de problemas, que continuámos a usar durante meses no desenvolvimento futuro deste site. @@ -63,11 +63,11 @@ As coisas pareciam estar a correr bem, uma vez que a maioria da nossa comunidade ## Eventos Posteriores -Cerca de uma semana após a transição, BurungHantu voltou a ficar online pela primeira vez em quase um ano, sem que ninguém da nossa equipa estivesse disposto a retornar ao PrivacyTools, devido à sua já histórica falta de confiabilidade. Em vez de pedir desculpa pela sua ausência prolongada, passou imediatamente a adotar uma postura ofensiva e qualificou a transição para o Privacy Guides como um ataque pessoal e como um ataque contra o seu projeto. Posteriormente, [apagou](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) muitos desses posts, quando foi apontado pela comunidade como um indivíduo ausente e como alguém que abandonou o projeto. +Cerca de uma semana após a transição, BurungHantu voltou a ficar online pela primeira vez em quase um ano, sem que ninguém da nossa equipa estivesse disposto a retornar ao PrivacyTools, devido à sua já histórica falta de confiabilidade. Em vez de pedir desculpa pela sua ausência prolongada, passou imediatamente a adotar uma postura ofensiva e qualificou a transição para o Privacy Guides como um ataque pessoal e como um ataque contra o seu projeto. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. Aí chegados, BurungHantu alegou que queria continuar a trabalhar no privacytools.io por conta própria e solicitou que fosse removido o redirecionamento de www.privacytools.io para [www. privacyguides.org](https://www.privacyguides.org). Acedemos ao pedido e solicitámos que fossem mantidos os subdomínios Matrix, Mastodon e PeerTube ativos para que pudessem prestar um serviço público à nossa comunidade, pelo menos durante alguns meses, a fim de permitir que os utilizadores dessas plataformas migrassem facilmente para outras contas. Devido à natureza federada dos serviços que fornecíamos, estes estavam vinculados a domínios específicos, o que tornava a migração muito difícil (e, em alguns casos, até impossível). -Infelizmente, uma vez que o controle do subreddit r/privacytoolsIO não foi devolvido a BurungHantu a seu pedido (mais informações abaixo), esses subdomínios foram [cortados](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/ comment/hexwrps/) no início de outubro, não deixando qualquer possibilidade de migração aos utilizadores que ainda estivessem a utilizar esses serviços. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Em seguida, BurungHantu fez falsas acusações de que Jonah roubava donativos ao projeto. Passou mais de um ano desde que o suposto incidente ocorreu, sem que BurungHantu tenha informado alguém, o que veio a acontecer apenas após a migração do Privacy Guides. Repetidamente, a equipa [e a comunidade](https://twitter.com/TommyTran732/status/1526153536962281474) solicitaram a BurungHantu que fornecesse provas e explicasse o motivo do seu silêncio. @@ -77,11 +77,11 @@ BurungHantu, inclusive, fez uma [publicação no Twitter](https://twitter.com/pr Desde 25 de setembro de 2022, que vemos que os planos de BurungHantu se estão a concretizar em privacytools.io, motivo pelo qual decidimos criar esta página explicativa. O site que ele está a gerir parece ser uma versão altamente otimizada para SEO, que recomenda ferramentas em troca de compensação financeira. Muito recentemente, IVPN e Mullvad, dois fornecedores de VPN recorrentemente [recomendados](../vpn.md) pela comunidade de privacidade, e notáveis pela sua política contra programas afiliados, foram removidos do PrivacyTools. E no seu lugar? No seu lugar estão agora NordVPN, Surfshark, ExpressVPN e hide.me; grandes fornecedores de VPN com plataformas e práticas comerciais pouco confiáveis, conhecidas pelo marketing agressivo e programa de afiliados. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Aqueles de nós que realmente lutam pela privacidade não estão a lutar uns contra os outros e não estão a ceder a pressões de quem paga mais. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Aqueles de nós que realmente lutam pela privacidade não estão a lutar uns contra os outros e não estão a ceder a pressões de quem paga mais. ## r/privacytoolsIO Agora -Após o lançamento de [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), era impraticável para u/trai_dep continuar a moderar ambos os subreddits e com a comunidade a bordo da transição, r/privacytoolsIO foi [feito](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) um sub restrito numa publicação de 1 de novembro de 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] O crescimento deste sub foi fruto de um grande esforço, ao longo de vários anos, da equipa PrivacyGuides.org. E do esforço de cada um de vós. > @@ -89,7 +89,7 @@ Após o lançamento de [r/PrivacyGuides](https://www.reddit.com/r/privacyguides) Os subreddits não pertencem a ninguém e, sobretudo, não pertencem aos detentores de marcas. Eles pertencem às suas comunidades, e a comunidade e os seus moderadores tomaram a decisão de apoiar a mudança para r/PrivacyGuides. -Nos meses que se seguiram, BurungHantu ameaçou e implorou para que fosse devolvido o controle do subreddit à sua conta em [violação](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) das regras do Reddit: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Não é permitido a qualquer moderador retaliar em relação a pedidos de remoção. @@ -107,12 +107,12 @@ Por esse motivo, os fundos no OpenCollective pertencem ao Privacy Guides, foram Este tópico foi amplamente discutido nas nossas comunidades, em vários locais, e provavelmente a maioria das pessoas que estão a ler esta página já esteja familiarizada com os motivos que levaram à mudança para o Privacy Guides. Algumas das nossas publicações anteriores sobre o assunto poderão ter detalhes extra que omitimos aqui, apenas por questões de brevidade. Por uma questão de rigor e de disponibilização do máximo de informação possível, deixámos os links das publicações abaixo. -- [28 de junho de 2021 pedido de controle de r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [27 de julho de 2021 anúncio das nossas intenções de continuar o blogue PrivacyTools, escrito pela equipa](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [13 de setembro de 2021 anúncio do início da nossa transição para o Privacy Guides em r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [28 de junho de 2021 pedido de controle de r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [27 de julho de 2021 anúncio das nossas intenções de continuar o blogue PrivacyTools, escrito pela equipa](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [13 de setembro de 2021 anúncio do início da nossa transição para o Privacy Guides em r/privacytoolsIO](https://reddit.com/pnql46) - [17 de setembro de 2021 anúncio no OpenCollective de Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [30 de setembro de 2021 Tópico do Twitter com detalhes sobre a maioria dos eventos agora descritos nesta página](https://twitter.com/privacy_guides/status/1443633412800225280) -- [1 de outubro de 2021 publicação de u/dng99 dando conta da falha no subdomínio](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [2 de abril de 2022 resposta de u/dng99 à publicação de blogue acusatória do PrivacyTools](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [1 de outubro de 2021 publicação de u/dng99 dando conta da falha no subdomínio](https://reddit.com/comments/pymthv/comment/hexwrps) +- [2 de abril de 2022 resposta de u/dng99 à publicação de blogue acusatória do PrivacyTools](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [16 de maio de 2022 resposta de @TommyTran732 no Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [3 de setembro de 2022 publicação no fórum da Techlore por @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/pt/advanced/communication-network-types.md b/i18n/pt/advanced/communication-network-types.md index 4687213c..e5b737f0 100644 --- a/i18n/pt/advanced/communication-network-types.md +++ b/i18n/pt/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Algumas aplicações de mensagens instantâneas permitem-lhe a opção de auto-h - Pode incluir [controlo ou acesso restrito](https://drewdevault.com/2018/08/08/Signal.html). Ou seja: - Estar [impedida a ligação de clientes de terceiros](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) à rede centralizada, o que poderia permitir uma maior personalização ou uma melhor experiência. Frequentemente definido nos Termos e Condições de utilização. - Documentação deficiente ou inexistente para os programadores terceiros. -- A [propriedade](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), a política de privacidade e gestão do serviço podem mudar facilmente quando uma única entidade os controla, podendo ficar assim, mais tarde, comprometido o serviço. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - A auto-hospedagem requer esforço e conhecimento para a configuração do serviço. ## Redes Federadas @@ -60,7 +60,7 @@ Numa solução auto-hospedada, os membros de um servidor federado podem descobri As aplicações de mensagens instantâneas P2P ligam-se a uma [rede distribuída](https://en.wikipedia.org/wiki/Distributed_networking) de nós para retransmitir a mensagem ao destinatário, sem utilizar um servidor de terceiros. -Os clientes (peers) comunicam através da utilização de uma rede de [computação distribuída](https://en.wikipedia.org/wiki/Distributed_computing). Exemplos do atrás dito incluem [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), utilizadas por [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) e [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System), por exemplo. Outra abordagem é a das redes de proximidade, em que uma ligação é estabelecida através de WiFi ou Bluetooth (por exemplo, Briar ou o protocolo de rede social [Scuttlebutt](https://www.scuttlebutt.nz)). +Os clientes (peers) comunicam através da utilização de uma rede de [computação distribuída](https://en.wikipedia.org/wiki/Distributed_computing). Exemplos do atrás dito incluem [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), utilizadas por [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) e [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System), por exemplo. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Uma vez que um peer tenha encontrado uma rota para o seu contacto através de qualquer um destes métodos, é estabelecida uma ligação direta entre eles. Embora as mensagens sejam normalmente encriptadas, um observador pode ainda assim deduzir a localização e a identidade do remetente e do destinatário. diff --git a/i18n/pt/advanced/dns-overview.md b/i18n/pt/advanced/dns-overview.md index 0f2a8364..22e4f078 100644 --- a/i18n/pt/advanced/dns-overview.md +++ b/i18n/pt/advanced/dns-overview.md @@ -18,7 +18,7 @@ Abaixo, discutimos e fornecemos um tutorial que prova o que um observador extern ### DNS não encriptado -1. Utilizando o [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (que faz parte do projeto [Wireshark](https://en.wikipedia.org/wiki/Wireshark)), podemos monitorizar e gravar o fluxo de pacotes da Internet. Este é um comando que regista os pacotes que cumprem determinadas regras: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. Este é um comando que regista os pacotes que cumprem determinadas regras: ```bash tshark -w /tmp/dns.pcap udp porto 53 e host 1.1.1.1 ou host 8.8.8.8 @@ -39,7 +39,7 @@ Abaixo, discutimos e fornecemos um tutorial que prova o que um observador extern nslookup privacyguides.org 8.8.8.8 ``` -3. Em seguida, vamos [analisar](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) os resultados: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: ==== "Wireshark" @@ -74,7 +74,7 @@ O [**DNSCrypt**](https://en.wikipedia.org/wiki/DNSCrypt) foi um dos primeiros m ### DNS sobre TLS (DoT) -O [**DNS sobre TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) é outro método para encriptar a comunicação DNS, definido em [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). O suporte foi implementado pela primeira vez no Android 9, iOS 14 e no Linux, no [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=), na versão 237. Nos últimos anos, o setor tem vindo a afastar-se do DoT em favor do DoH, uma vez que o DoT é um [protocolo complexo](https://dnscrypt.info/faq/) e tem uma conformidade variável com o RFC nas implementações existentes. O DoT também funciona numa porta dedicada, a 853, que pode ser facilmente bloqueada por firewalls restritivas. +O [**DNS sobre TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) é outro método para encriptar a comunicação DNS, definido em [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. O DoT também funciona numa porta dedicada, a 853, que pode ser facilmente bloqueada por firewalls restritivas. ### DNS sobre HTTPS (DoH) @@ -106,7 +106,7 @@ Neste exemplo, vamos registar o que acontece quando fazemos um pedido ao DoH: wireshark -r /tmp/dns_doh.pcap ``` -Podemos ver o [estabelecimento da ligação](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) e o [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) que ocorre com qualquer ligação encriptada. Ao olhar para os pacotes de "dados da aplicação" que se seguem, verificamos que nenhum deles contém o domínio que pedimos ou o endereço IP devolvido. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. Ao olhar para os pacotes de "dados da aplicação" que se seguem, verificamos que nenhum deles contém o domínio que pedimos ou o endereço IP devolvido. ## Por que razão **não devo** utilizar DNS encriptado? @@ -158,9 +158,9 @@ A indicação do nome do servidor é normalmente utilizada quando um endereço I tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -Isto significa que mesmo que estejamos a utilizar servidores "DNS Encriptados", o domínio será provavelmente divulgado através do SNI. O protocolo [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) traz consigo o [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), que impede este tipo de fuga de informação. +Isto significa que mesmo que estejamos a utilizar servidores "DNS Encriptados", o domínio será provavelmente divulgado através do SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Os governos, em particular a [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) e a [Rússia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), já [começaram a bloquear](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) ou manifestaram o desejo de o fazer. Recentemente, a Rússia [começou a bloquear sites estrangeiros](https://github.com/net4people/bbs/issues/108) que utilizam a norma [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3). Isto deve-se ao facto do protocolo [QUIC](https://en.wikipedia.org/wiki/QUIC), que faz parte do HTTP/3, exigir que o `ClientHello` também seja encriptado. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recentemente, a Rússia [começou a bloquear sites estrangeiros](https://github.com/net4people/bbs/issues/108) que utilizam a norma [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3). Isto deve-se ao facto do protocolo [QUIC](https://en.wikipedia.org/wiki/QUIC), que faz parte do HTTP/3, exigir que o `ClientHello` também seja encriptado. ### Protocolo de estado dos certificados em linha (OCSP) @@ -289,7 +289,7 @@ O processo de assinatura DNSSEC é semelhante ao de alguém que assina um docume O DNSSEC implementa uma política de assinatura digital hierárquica em todos os níveis do DNS. Por exemplo, no caso de uma pesquisa em `privacyguides.org`, um servidor DNS de raiz assinaria uma chave para o DNS de `.org`, e o DNS de `.org` assinaria então uma chave para o DNS autoritário `privacyguides.org`. -Adaptado de [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) da Google e [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) da Cloudflare, ambos licenciados sob [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## O que é a minimização de QNAME? diff --git a/i18n/pt/advanced/payments.md b/i18n/pt/advanced/payments.md index 5328021d..6aae0337 100644 --- a/i18n/pt/advanced/payments.md +++ b/i18n/pt/advanced/payments.md @@ -9,7 +9,7 @@ Há uma razão para que os dados sobre os seus hábitos de compra sejam consider Durante séculos, o **dinheiro** foi a principal forma de pagamento. O numerário tem excelentes propriedades de privacidade na maioria dos casos, é amplamente aceite na maioria dos países e é **fungível**, o que significa que não é único e é completamente intercambiável. -A legislação relativa ao pagamento em numerário varia de acordo com o país. Nos Estados Unidos, os pagamentos em dinheiro superiores a 10 mil dólares devem ser comunicados no IRS, através do [formulário 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). A empresa recetora é obrigada a verificar o nome, a morada, a profissão, a data de nascimento e o número de segurança social ou NIF do beneficiário (com algumas exceções). É possível pagar sem que seja necessária a identificação, nos casos de câmbio ou transmissão de dinheiro em que o valor não exceda os 3 mil dólares. O dinheiro também contém números de série. Estes quase nunca são monitorizados pelos comerciantes, mas podem ser utilizados pelas autoridades policiais em investigações específicas. +A legislação relativa ao pagamento em numerário varia de acordo com o país. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). A empresa recetora é obrigada a verificar o nome, a morada, a profissão, a data de nascimento e o número de segurança social ou NIF do beneficiário (com algumas exceções). É possível pagar sem que seja necessária a identificação, nos casos de câmbio ou transmissão de dinheiro em que o valor não exceda os 3 mil dólares. O dinheiro também contém números de série. Estes quase nunca são monitorizados pelos comerciantes, mas podem ser utilizados pelas autoridades policiais em investigações específicas. Apesar disso, pagar em dinheiro é normalmente a melhor opção. @@ -60,7 +60,7 @@ Há uma série de projetos de criptomoeda que pretendem proporcionar privacidade - [Criptomoedas recomendadas :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -As moedas que pretendem garantir privacidade têm sido objeto de um controlo crescente por parte das agências governamentais. Em 2020, [o IRS publicou uma recompensa de 625 mil dólares](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) para quem desenvolvesse ferramentas capazes de quebrar a Bitcoin Lightning Network e/ou a privacidade das transações do Monero. Acabaram [por pagar a duas empresas, a ](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis e a Integra Fec), um total de 1,25 milhões de dólares por ferramentas que supostamente o fazem (desconhece-se qual a rede de criptomoedas visada por estas ferramentas). Há muito secretismo a rodear ferramentas como estas, ==nenhum destes métodos de rastreio de criptomoedas foi confirmado de forma independente.== No entanto, é bastante provável que existam ferramentas que ajudem investigações relacionadas com transações de criptomoedas orientadas para a privacidade, o que deixa espaço para que estas apenas consigam impedir a vigilância em massa. +As moedas que pretendem garantir privacidade têm sido objeto de um controlo crescente por parte das agências governamentais. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. Acabaram [por pagar a duas empresas, a ](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis e a Integra Fec), um total de 1,25 milhões de dólares por ferramentas que supostamente o fazem (desconhece-se qual a rede de criptomoedas visada por estas ferramentas). Há muito secretismo a rodear ferramentas como estas, ==nenhum destes métodos de rastreio de criptomoedas foi confirmado de forma independente.== No entanto, é bastante provável que existam ferramentas que ajudem investigações relacionadas com transações de criptomoedas orientadas para a privacidade, o que deixa espaço para que estas apenas consigam impedir a vigilância em massa. ### Outras moedas (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ Nas criptomoedas, existem duas formas de carteiras: carteiras com custódia e ca ### Aquisição -Comprar com privacidade [criptomoedas](../cryptocurrency.md) como o Monero pode ser difícil. Mercados P2P como o [LocalMonero](https://localmonero.co/), uma plataforma que facilita as transações entre pessoas, são uma opção a considerar. Se a utilização de uma casa de câmbio que exija KYC for um risco aceitável para si, desde que as transações subsequentes não possam ser rastreadas, uma opção muito mais fácil será comprar Monero numa casa de câmbio como a [Kraken](https://kraken.com/), ou comprar Bitcoin/Litecoin numa casa de câmbio KYC que pode depois ser trocada por Monero. Depois, pode retirar o Monero comprado para a sua própria carteira sem custódia para o utilizar com privacidade a partir desse momento. +Comprar com privacidade [criptomoedas](../cryptocurrency.md) como o Monero pode ser difícil. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Depois, pode retirar o Monero comprado para a sua própria carteira sem custódia para o utilizar com privacidade a partir desse momento. Se optar por esta via, certifique-se de que compra Monero em alturas diferentes das que vão ser utilizadas para o gastar, bem como em montantes diferentes. Se comprar 5 mil dólares de Monero numa casa de câmbio e fizer uma compra de 5 mil euros em Monero uma hora mais tarde, esse comportamento pode ser potencialmente correlacionado por um observador externo, independentemente do caminho que o Monero tomou. O escalonamento das compras e a compra antecipada de grandes quantidades de Monero para depois gastar em várias transações mais pequenas pode evitar esta armadilha. diff --git a/i18n/pt/advanced/tor-overview.md b/i18n/pt/advanced/tor-overview.md index 9006d5a1..3c6102b3 100644 --- a/i18n/pt/advanced/tor-overview.md +++ b/i18n/pt/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [Como funciona o Tor - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Serviços Onion Tor - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: O primeiro relé no seu circuito chama-se "guarda de entrada" ou "guarda". Trata-se de um retransmissor rápido e estável que permanece o primeiro no seu circuito durante 2-3 meses, a fim de o proteger contra um ataque conhecido de quebra de anonimato. O resto do seu circuito muda a cada novo site que visita e, em conjunto, estes relés fornecem todas as proteções de privacidade do Tor. Para obter mais informações sobre o funcionamento dos relés de proteção, consulte esta [publicação no blogue](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) e o [documento](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sobre proteções de entrada. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: O primeiro relé no seu circuito chama-se "guarda de entrada" ou "guarda". Trata-se de um retransmissor rápido e estável que permanece o primeiro no seu circuito durante 2-3 meses, a fim de o proteger contra um ataque conhecido de quebra de anonimato. O resto do seu circuito muda a cada novo site que visita e, em conjunto, estes relés fornecem todas as proteções de privacidade do Tor. Para obter mais informações sobre o funcionamento dos relés de proteção, consulte esta [publicação no blogue](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) e o [documento](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) sobre proteções de entrada. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Flag do relé: uma (des)qualificação especial de relés para posições de circuito (por exemplo, "Guard", "Exit", "BadExit"), propriedades de circuito (por exemplo, "Fast", "Stable"), ou funções (por exemplo, "Authority", "HSDir"), tal como atribuídas pelas autoridades de diretório e definidas mais pormenorizadamente na especificação do protocolo de diretório. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/pt/android.md b/i18n/pt/android.md index 5ee7da93..f7cb5ff1 100644 --- a/i18n/pt/android.md +++ b/i18n/pt/android.md @@ -83,9 +83,9 @@ schema: O **Projeto de Código Aberto do Android** é um sistema operativo móvel de código aberto liderado pela Google que alimenta a maioria dos dispositivos móveis do mundo. A maioria dos telemóveis vendidos com Android são modificados para incluir integrações e aplicações invasivas, como o Google Play Services, pelo que pode melhorar significativamente a sua privacidade no seu dispositivo móvel substituindo a instalação predefinida do seu telemóvel por uma versão do Android sem estas funcionalidades invasivas. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Página Inicial } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Código fonte" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } Estes são os sistemas operativos, dispositivos e aplicações Android que recomendamos para maximizar a segurança e a privacidade do seu dispositivo móvel. Para saber mais sobre o Android: @@ -113,27 +113,27 @@ O **GrapheneOS** é a melhor escolha quando se trata de privacidade e segurança O GrapheneOS proporciona melhorias adicionais [reforço da segurança](https://en.wikipedia.org/wiki/Hardening_(computing)) e da privacidade. Tem um [alocador de memória reforçado](https://github.com/GrapheneOS/hardened_malloc), permissões de rede e de sensor e várias outras [características de segurança](https://grapheneos.org/features). O GrapheneOS também vem com atualizações de firmware completas e compilações assinadas, pelo que o arranque verificado é totalmente suportado. -[:octicons-home-16: Página Inicial](https://grapheneos.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Política de Privacidade" } -[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentação} -[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Código fonte" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } -GrapheneOS suporta o [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), que executa [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) totalmente sandboxed como qualquer outro aplicativo regular. Isto significa que pode tirar partido da maioria dos serviços do Google Play, como as notificações push [](https://firebase.google.com/docs/cloud-messaging/), ao mesmo tempo que lhe dá controlo total sobre as suas permissões e acesso, e, ao mesmo tempo, que os restringe a um perfil de trabalho específico [](os/android-overview.md#work-profile) ou a um perfil de utilizador [](os/android-overview.md#user-profiles) à sua escolha. +GrapheneOS suporta o [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), que executa [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) totalmente sandboxed como qualquer outro aplicativo regular. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Os telemóveis Google Pixel são os únicos dispositivos que cumprem atualmente os requisitos de segurança de hardware do GrapheneOS [](https://grapheneos.org/faq#device-support). -[Por que recomendamos GrapheneOS em vez de CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Por que recomendamos GrapheneOS em vez de CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS
-![Logótipo do DivestOS](assets/img/android/divestos.svg){ align=right } +![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** é um soft-fork do [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. Tem compilações assinadas, possibilitando ter [arranque verificado](https://source.android.com/security/verifiedboot) em alguns dispositivos não Pixel. [:octicons-home-16: Página Inicial](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d
-O DivestOS tem vulnerabilidades automatizadas do kernel ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), menos blobs proprietários, e um ficheiro [hosts](https://divested.dev/index.php?page=dnsbl) personalizado. O seu WebView reforçado, [Mulch](https://gitlab.com/divested-mobile/mulch), permite [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) para todas as arquiteturas e [particionamento do estado da rede](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), e recebe atualizações fora de banda. O DivestOS também inclui patches de kernel do GrapheneOS e habilita todos os recursos de segurança do kernel disponíveis via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). Todos os kernels mais recentes que a versão 3.4 incluem [sanitização de página inteira](https://lwn.net/Articles/334747/) e todos os ~22 kernels compilados pela Clang têm [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) ativado. +O DivestOS tem vulnerabilidades automatizadas do kernel ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), menos blobs proprietários, e um ficheiro [hosts](https://divested.dev/index.php?page=dnsbl) personalizado. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. O DivestOS também inclui patches de kernel do GrapheneOS e habilita todos os recursos de segurança do kernel disponíveis via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -O DivestOS implementa alguns patches de proteção de sistema originalmente desenvolvidos para o GrapheneOS. O DivestOS 16.0 e superior implementa as permissões [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) e SENSORS do GrapheneOS, [alocador de memória endurecido](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constificação](https://en.wikipedia.org/wiki/Const_(computer_programming)), e patchsets parciais de endurecimento [bionic](https://en.wikipedia.org/wiki/Bionic_(software)). 17.1 e superior apresenta a opção de randomização completa do GrapheneOS por rede [MAC](https://en.wikipedia.org/wiki/MAC_address#Randomization), [`controle ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html), e opções de tempo limite de reinicialização automática/Wi-Fi/Bluetooth [](https://grapheneos.org/features). +O DivestOS implementa alguns patches de proteção de sistema originalmente desenvolvidos para o GrapheneOS. O DivestOS 16.0 e superior implementa as permissões [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) e SENSORS do GrapheneOS, [alocador de memória endurecido](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constificação](https://en.wikipedia.org/wiki/Const_(computer_programming)), e patchsets parciais de endurecimento [bionic](https://en.wikipedia.org/wiki/Bionic_(software)). 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -O DivestOS utiliza o F-Droid como loja de aplicações por padrão. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. Para outras aplicações, os nossos métodos recomendados para as obter continuam a aplicar-se. +O DivestOS utiliza o F-Droid como loja de aplicações por padrão. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. Para outras aplicações, os nossos métodos recomendados para as obter continuam a aplicar-se.

Warning

@@ -166,13 +166,13 @@ Ao comprar um dispositivo, recomendamos que o adquira o mais novo possível. O s Evite comprar telemóveis a operadores de redes móveis. Estes têm frequentemente um **bootloader bloqueado** e não suportam [desbloqueio OEM](https://source.android.com/devices/bootloader/locking_unlocking). Estas variantes de telemóvel impedem-no de instalar qualquer tipo de distribuição alternativa do Android. -Tenha muito **cuidado** ao comprar telemóveis em segunda mão em mercados online. Verifique sempre a reputação do vendedor. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). Existe também o risco de estar associado à atividade do proprietário anterior. +Tenha muito **cuidado** ao comprar telemóveis em segunda mão em mercados online. Verifique sempre a reputação do vendedor. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). Existe também o risco de estar associado à atividade do proprietário anterior. Mais algumas dicas sobre dispositivos Android e compatibilidade com o sistema operativo: - Não compre dispositivos que tenham atingido ou estejam perto do fim da sua vida útil; as atualizações de firmware adicionais devem ser fornecidas pelo fabricante. - Não compre telemóveis LineageOS ou /e/ OS pré-carregados ou quaisquer telemóveis Android sem o devido suporte [Verified Boot](https://source.android.com/security/verifiedboot) e atualizações de firmware. Estes dispositivos também não permitem verificar se foram adulterados. -- Em suma, se um dispositivo ou uma distribuição Android não constar da lista, existe provavelmente um bom motivo. Consulte o nosso [fórum](https://discuss.privacyguides.net/) para obter mais informações! +- Em suma, se um dispositivo ou uma distribuição Android não constar da lista, existe provavelmente um bom motivo. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Os Secure Elements, como o Titan M2, são mais limitados do que o Trusted Execut Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -A instalação do GrapheneOS num telemóvel Pixel é fácil com o seu [instalador por web](https://grapheneos.org/install/web). Se não se sentir à vontade para o fazer por si mesmo e estiver disposto a gastar um pouco mais de dinheiro, consulte o [NitroPhone](https://shop.nitrokey.com/shop), uma vez que vem pré-carregado com GrapheneOS da reputada empresa [Nitrokey](https://www.nitrokey.com/about). +A instalação do GrapheneOS num telemóvel Pixel é fácil com o seu [instalador por web](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. Mais algumas dicas para comprar um Google Pixel: @@ -218,16 +218,16 @@ Nós recomendamos uma grande variedade de aplicações Android neste sítio web. O Shelter suporta o bloqueio da pesquisa de contactos entre perfis e a partilha de ficheiros entre perfis através do gestor de ficheiros predefinido ([DocumentsUI](https://source.android.com/devices/architecture/modular-system/documentsui)). -[:octicons-repo-16: Repositório](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } -[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Código fonte" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribuir } +[:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } +[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-O Shelter é recomendado em relação a [Insular](https://secure-system.gitlab.io/Insular/) e [Island](https://github.com/oasisfeng/island), uma vez que suporta [bloqueio de pesquisa de contactos] (https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). Ao utilizar o Shelter, deposita a total confiança no seu programador, uma vez que o Shelter atua como [Device Admin] (https://developer.android.com/guide/topics/admin/device-admin) para criar o Perfil de Trabalho com um acesso alargado aos dados armazenados no Perfil de Trabalho. @@ -322,11 +322,11 @@ O **Secure PDF Viewer** é um visualizador de PDF baseado em [pdf.js](https://en
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### Loja de Aplicações GrapheneOS -A loja de aplicações GrapheneOS está disponível no [GitHub](https://github.com/GrapheneOS/Apps/releases). Suporta o Android 12 e superior, e é capaz de se atualizar. A loja de aplicações tem aplicações autónomas criadas pelo projeto GrapheneOS, tais como [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), e [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). Se estiver à procura destas aplicações, recomendamos vivamente que as obtenha na loja de aplicações GrapheneOS em vez de na Play Store, uma vez que as aplicações na sua loja são assinadas pela própria assinatura do projeto GrapheneOS, à qual a Google não tem acesso. +A loja de aplicações GrapheneOS está disponível no [GitHub](https://github.com/GrapheneOS/Apps/releases). Suporta o Android 12 e superior, e é capaz de se atualizar. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). Se estiver à procura destas aplicações, recomendamos vivamente que as obtenha na loja de aplicações GrapheneOS em vez de na Play Store, uma vez que as aplicações na sua loja são assinadas pela própria assinatura do projeto GrapheneOS, à qual a Google não tem acesso. ### Loja Aurora @@ -338,7 +338,7 @@ A Google Play Store requer uma conta do Google para entrar, o que não é ótimo A **Aurora Store** é um cliente da Google Play Store que não requer uma Conta Google, Google Play Services ou microG para transferir aplicações. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ No GitLab, utilizando [Aurora Store](#aurora-store) como exemplo, navegará para Se descarregar ficheiros APK para instalar manualmente, pode verificar a sua assinatura com a ferramenta [`apksigner`](https://developer.android.com/studio/command-line/apksigner), que faz parte do Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Instale [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Descarregue as ferramentas de linha de comandos do [Android Studio](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ Se descarregar ficheiros APK para instalar manualmente, pode verificar a sua ass ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. Os hashes resultantes podem então ser comparados com outra fonte. Alguns programadores, como o Signal, [mostram as impressões digitais](https://signal.org/android/apk/) no seus sítio web. +5. Os hashes resultantes podem então ser comparados com outra fonte. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ Se descarregar ficheiros APK para instalar manualmente, pode verificar a sua ass ![Logótipo do F-Droid](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. A opção de adicionar repositórios de terceiros e não ficar confinado ao jardim murado do Google levou à sua popularidade. Além disso, o F-Droid tem [builds reproduzíveis](https://f-droid.org/en/docs/Reproducible_Builds/) para algumas aplicações e dedica-se ao software livre e de código aberto. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. A opção de adicionar repositórios de terceiros e não ficar confinado ao jardim murado do Google levou à sua popularidade. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Devido ao seu processo de criação de aplicações, as aplicações no repositório oficial do F-Droid atrasam-se frequentemente nas atualizações. Os manejadores do F-Droid também reutilizam IDs de pacotes enquanto assinam aplicativos com as suas próprias chaves, o que não é ideal, por dar à equipe do F-Droid a confiança final. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. O repositório IzzyOnDroid puxa as compilações diretamente do GitHub e é a melhor coisa a seguir aos repositórios dos próprios programadores. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. Embora isso faça sentido (uma vez que o objetivo desse repositório em particular é alojar aplicações antes de serem aceites no repositório principal do F-Droid), pode deixá-lo com aplicações instaladas que já não recebem atualizações. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. O repositório IzzyOnDroid puxa as compilações diretamente do GitHub e é a melhor coisa a seguir aos repositórios dos próprios programadores. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. Embora isso faça sentido (uma vez que o objetivo desse repositório em particular é alojar aplicações antes de serem aceites no repositório principal do F-Droid), pode deixá-lo com aplicações instaladas que já não recebem atualizações. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-Em alguns casos raros, o programador de uma aplicação só a distribui através do F-Droid ([Gadgetbridge](https://gadgetbridge.org/) é um exemplo disso). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/pt/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/pt/assets/img/how-tor-works/tor-encryption-dark.svg index 23ca3f3b..0f1e0716 100644 --- a/i18n/pt/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/pt/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - O seu - - dispositivo - - - - A enviar dados para um website - - - - - A receber dados de um website - - - - - O seu - - dispositivo - - - - Entrada - - - - - Meio - - - - - Sair - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entrada - - - - - Meio - - - - - Sair - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/pt/assets/img/how-tor-works/tor-encryption.svg b/i18n/pt/assets/img/how-tor-works/tor-encryption.svg index 9e503934..f954fb0f 100644 --- a/i18n/pt/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/pt/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - O seu - - dispositivo - - - - A enviar dados para um website - - - - - A receber dados de um website - - - - - O seu - - dispositivo - - - - Entrada - - - - - Meio - - - - - Sair - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entrada - - - - - Meio - - - - - Sair - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/pt/assets/img/how-tor-works/tor-path-dark.svg b/i18n/pt/assets/img/how-tor-works/tor-path-dark.svg index b0cb61a3..b438698c 100644 --- a/i18n/pt/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/pt/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - O seu - dispositivo - - - - Entrada - - - - - Médio - - - - - Sair - - - - - PrivacyGuides.org - - - - - - - - + + + + O seu + dispositivo + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/pt/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/pt/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index 2981b3b0..ce51beee 100644 --- a/i18n/pt/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/pt/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - O seu - - - Dispositivo - - - - - - Guardião - - - Relay - - - Relay - - - - - oculto...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entrada - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/pt/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/pt/assets/img/how-tor-works/tor-path-hidden-service.svg index a39cbb98..8d008447 100644 --- a/i18n/pt/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/pt/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - O seu - - - Dispositivo - - - - - - Guardião - - - Relé - - - Relé - - - - - onion...oculto - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relé - - - - - Entrada - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/pt/assets/img/how-tor-works/tor-path.svg b/i18n/pt/assets/img/how-tor-works/tor-path.svg index 8a671294..3e96a60f 100644 --- a/i18n/pt/assets/img/how-tor-works/tor-path.svg +++ b/i18n/pt/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/pt/basics/account-deletion.md b/i18n/pt/basics/account-deletion.md index 3aa65246..0253c689 100644 --- a/i18n/pt/basics/account-deletion.md +++ b/i18n/pt/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: É fácil acumular um grande número de contas na Internet. Eis algumas dicas sobre como reduzir a sua coleção. --- -Com o passar do tempo, pode ser fácil acumular uma série de contas em linha, muitas das quais podem já não ser utilizadas. A eliminação destas contas não utilizadas é um passo importante para recuperar a sua privacidade, uma vez que as contas inativas são vulneráveis a violações de dados. Uma violação de dados ocorre quando a segurança de um serviço é comprometida e as informações protegidas são visualizadas, transmitidas ou roubadas por pessoas não autorizadas. Infelizmente, as violações de dados são [demasiado comuns](https://haveibeenpwned.com/PwnedWebsites) atualmente, pelo que praticar uma boa higiene digital é a melhor forma de minimizar o impacto tido na sua vida. O objetivo deste guia é ajudá-lo a navegar pelo processo incómodo de eliminação de contas, muitas vezes dificultado pelo [design enganador](https://www.deceptive.design/), para melhorar a sua presença online. +Com o passar do tempo, pode ser fácil acumular uma série de contas em linha, muitas das quais podem já não ser utilizadas. A eliminação destas contas não utilizadas é um passo importante para recuperar a sua privacidade, uma vez que as contas inativas são vulneráveis a violações de dados. Uma violação de dados ocorre quando a segurança de um serviço é comprometida e as informações protegidas são visualizadas, transmitidas ou roubadas por pessoas não autorizadas. Infelizmente, as violações de dados são [demasiado comuns](https://haveibeenpwned.com/PwnedWebsites) atualmente, pelo que praticar uma boa higiene digital é a melhor forma de minimizar o impacto tido na sua vida. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Encontrar Contas Antigas ### Gestor de Palavras-Passe -Se tiver um gestor de palavras-passe que tenha utilizado durante toda a sua vida digital, esta parte será muito fácil. Muitas vezes, incluem funcionalidades incorporadas para detetar se as suas credenciais foram expostas numa violação de dados — como o Relatório de violação de dados [da Bitwarden](https://bitwarden.com/blog/have-you-been-pwned/). +Se tiver um gestor de palavras-passe que tenha utilizado durante toda a sua vida digital, esta parte será muito fácil. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Funcionalidade do Relatório de Violação de Dados da Bitwarden](../assets/img/account-deletion/exposed_passwords.png)
-Mesmo que nunca tenha utilizado explicitamente um gestor de palavras-passe, é provável que já o tenha feito no seu navegador ou no seu telemóvel sem se aperceber. Por exemplo: [Gestor de Palavras-Passe da Google](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Gestor de Palavras-Passe da Google](https://passwords.google.com/intro) e [Gestor de Palavras-Passe da Google](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Mesmo que nunca tenha utilizado explicitamente um gestor de palavras-passe, é provável que já o tenha feito no seu navegador ou no seu telemóvel sem se aperceber. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). As plataformas de ambiente de trabalho também têm frequentemente um gestor de palavras-passe que pode ajudá-lo a recuperar palavras-passe esquecidas: -- [Gestor de Credenciais](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) Windows -- [Palavras-passe](https://support.apple.com/en-us/HT211145) macOS -- [Palavras-passe](https://support.apple.com/en-us/HT211146) iOS +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, que pode ser acedido através de [Seahorse](https://wiki.gnome.org/Apps/Seahorse) ou [KDE Wallet Manager](https://userbase.kde.org /KDE_Wallet_Manager) ### Correio eletrónico @@ -39,7 +39,7 @@ Ao tentar recuperar o acesso, se o sítio web devolver uma mensagem de erro a in ### RGPD (somente residentes no EEE) -Os residentes do EEE têm direitos adicionais relativamente à eliminação de dados especificados em [Artigo 17](https://www.gdpr.org/regulation/article-17.html) do RGPD. Se for aplicável ao seu caso, leia a política de privacidade de um determinado serviço para obter informações sobre como exercer o seu direito ao apagamento. A leitura da política de privacidade pode revelar-se importante, uma vez que alguns serviços têm uma opção "Eliminar conta" que apenas desativa a sua conta e, para uma verdadeira eliminação, tem de tomar medidas adicionais. Por vezes, a eliminação efetiva pode implicar o preenchimento de inquéritos, o envio de uma mensagem de correio eletrónico ao responsável pela proteção de dados do serviço ou mesmo a prova da sua residência no EEE. Se pretender seguir este caminho, **não** substitua as informações da conta — a sua identidade como residente no EEE pode ser exigida. Note-se que a localização do serviço não é importante; o RGPD aplica-se a todos os que servem utilizadores europeus. Se o serviço não respeitar o seu direito ao apagamento, pode contactar a sua [Autoridade de Proteção de Dados](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) nacional, e poderá ter direito a uma compensação monetária. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. Se for aplicável ao seu caso, leia a política de privacidade de um determinado serviço para obter informações sobre como exercer o seu direito ao apagamento. A leitura da política de privacidade pode revelar-se importante, uma vez que alguns serviços têm uma opção "Eliminar conta" que apenas desativa a sua conta e, para uma verdadeira eliminação, tem de tomar medidas adicionais. Por vezes, a eliminação efetiva pode implicar o preenchimento de inquéritos, o envio de uma mensagem de correio eletrónico ao responsável pela proteção de dados do serviço ou mesmo a prova da sua residência no EEE. Se pretender seguir este caminho, **não** substitua as informações da conta — a sua identidade como residente no EEE pode ser exigida. Note-se que a localização do serviço não é importante; o RGPD aplica-se a todos os que servem utilizadores europeus. Se o serviço não respeitar o seu direito ao apagamento, pode contactar a sua [Autoridade de Proteção de Dados](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) nacional, e poderá ter direito a uma compensação monetária. ### Subscrever Informações da Conta @@ -59,4 +59,4 @@ Mesmo quando é possível eliminar uma conta, não há garantia de que todas as ## Evitar Contas Novas -Como diz o velho ditado, "mais vale um grama de prevenção do que um quilo de cura." Sempre que se sentir tentado a inscrever-se numa nova conta, pergunte a si próprio: "Preciso mesmo disto? Posso fazer o que preciso sem uma conta?" Muitas vezes, pode ser muito mais difícil apagar uma conta do que criar uma. E mesmo após apagar ou alterar as informações da sua conta, poderá existir uma versão em memória transitória de terceiros, como o [Internet Archive](https://archive.org/). Evite a tentação quando puder — o seu futuro o agradecer-lhe-á! +Como diz o velho ditado, "mais vale um grama de prevenção do que um quilo de cura." Sempre que se sentir tentado a inscrever-se numa nova conta, pergunte a si próprio: "Preciso mesmo disto? Posso fazer o que preciso sem uma conta?" Muitas vezes, pode ser muito mais difícil apagar uma conta do que criar uma. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Evite a tentação quando puder — o seu futuro o agradecer-lhe-á! diff --git a/i18n/pt/basics/common-misconceptions.md b/i18n/pt/basics/common-misconceptions.md index 425af8e9..54556df7 100644 --- a/i18n/pt/basics/common-misconceptions.md +++ b/i18n/pt/basics/common-misconceptions.md @@ -88,7 +88,7 @@ Nas compras online, a utilização de um [armário de encomendas](https://en.wik 2. **Identidade desconhecida** - Uma identidade desconhecida pode ser um pseudónimo estável que utiliza regularmente. Não é anónimo porque não muda. Se faz parte de uma comunidade online, pode querer manter uma personalidade que os outros conheçam. Este pseudónimo não é anónimo porque — se for monitorizado durante tempo suficiente — os detalhes sobre o proprietário podem revelar mais informações, como a forma como escreve, o seu conhecimento geral sobre tópicos de interesse, etc. -Para o efeito, poderá utilizar uma VPN para ocultar o seu endereço IP. As transações financeiras são mais difíceis de mascarar: pode considerar a utilização de criptomoedas anónimas, como [Monero](https://www.getmonero.org/). A utilização da mudança de altcoin também pode ajudar a disfarçar a origem da sua moeda. Normalmente, as bolsas exigem que o COSC (conheça o seu cliente) seja concluído antes de permitirem a troca de moeda fiduciária por qualquer tipo de moeda criptográfica. As opções de encontros locais também podem ser uma solução; no entanto, estas são frequentemente mais caras e, por vezes, também exigem COSC. +Para o efeito, poderá utilizar uma VPN para ocultar o seu endereço IP. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). A utilização da mudança de altcoin também pode ajudar a disfarçar a origem da sua moeda. Normalmente, as bolsas exigem que o COSC (conheça o seu cliente) seja concluído antes de permitirem a troca de moeda fiduciária por qualquer tipo de moeda criptográfica. As opções de encontros locais também podem ser uma solução; no entanto, estas são frequentemente mais caras e, por vezes, também exigem COSC. 3. **Identidade anónima** - Mesmo com experiência, as identidades anónimas são difíceis de manter durante longos períodos de tempo. Devem ser identidades de curto prazo e de curta duração, sendo objeto de rotação regular. diff --git a/i18n/pt/basics/common-threats.md b/i18n/pt/basics/common-threats.md index 556db61b..7b5bee40 100644 --- a/i18n/pt/basics/common-threats.md +++ b/i18n/pt/basics/common-threats.md @@ -55,7 +55,7 @@ Por definição, os **browsers**, os **clientes de e-mail** e as **suites de esc -Se estiver preocupado com **ataques físicos** deve utilizar um sistema operativo com uma implementação de arranque seguro verificado, como o Android, iOS, macOS ou [Windows (com TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). Deve também certificar-se de que a sua unidade está encriptada e que o sistema operativo utiliza um TPM, Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) ou [Element](https://developers.google.com/android/security/android-ready-se) para limitar as tentativas de introdução da frase-chave de encriptação. Deve evitar partilhar o seu computador com pessoas em quem não confia, uma vez que a maioria dos sistemas operativos de computador de secretária não encripta os dados separadamente por utilizador. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). Deve também certificar-se de que a sua unidade está encriptada e que o sistema operativo utiliza um TPM, Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) ou [Element](https://developers.google.com/android/security/android-ready-se) para limitar as tentativas de introdução da frase-chave de encriptação. Deve evitar partilhar o seu computador com pessoas em quem não confia, uma vez que a maioria dos sistemas operativos de computador de secretária não encripta os dados separadamente por utilizador. ## Privacidade dos prestadores de serviços @@ -89,16 +89,16 @@ A vigilância em massa é o esforço intrincado para monitorizar o "comportament

Atlas of Surveillance

-Se quiser saber mais sobre os métodos de vigilância e a forma como são aplicados na sua cidade, pode consultar o [Atlas da Vigilância] (https://atlasofsurveillance.org/) da [Electronic Frontier Foundation] (https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Os governos justificam frequentemente os programas de vigilância em massa como meios necessários para combater o terrorismo e prevenir a criminalidade. No entanto, e violando os direitos humanos, é mais frequentemente utilizado para atingir de forma desproporcionada grupos minoritários e dissidentes políticos, entre outros.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

Perante [as revelações de Edward Snowden sobre programas governamentais como [PRISM](https://en.wikipedia.org/wiki/PRISM) e [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], os funcionários dos serviços secretos também admitiram que a NSA recolhia secretamente, há anos, registos sobre praticamente todas as chamadas telefónicas dos americanos - quem liga a quem, quando são feitas e quanto tempo duram. Este tipo de informação, quando recolhida pela NSA dia após dia, pode revelar pormenores incrivelmente sensíveis sobre a vida e as associações das pessoas, como por exemplo, se telefonaram a um pastor, a um fornecedor de abortos, a um conselheiro de toxicodependência ou a uma linha de apoio ao suicídio. @@ -144,7 +144,7 @@ Se já submeteu as suas informações reais a sites que não as deveriam ter, co A censura online pode ser realizada (em diferentes graus) por diversos atores, incluindo governos totalitários, administradores de redes e prestadores de serviços. Estes esforços para controlar a comunicação e restringir o acesso à informação serão sempre incompatíveis com o direito humano à liberdade de expressão.[^5] -A censura nas plataformas corporativas é cada vez mais comum, uma vez que plataformas como o Twitter e o Facebook cedem à procura pública, às pressões do mercado e às pressões das agências governamentais. As pressões do governo podem ser solicitações dissimuladas a empresas, como no caso em que a Casa Branca [solicitou a retirada](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) de um vídeo provocador do YouTube, ou, de forma evidente, quando o Governo chinês exige que as empresas respeitem um regime rigoroso de censura. +A censura nas plataformas corporativas é cada vez mais comum, uma vez que plataformas como o Twitter e o Facebook cedem à procura pública, às pressões do mercado e às pressões das agências governamentais. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. As pessoas que se preocupam com a ameaça da censura podem usar tecnologias como o [Tor](../advanced/tor-overview.md) para contorná-la, e utilizar plataformas de comunicação resistentes à censura, como o [Matrix](../real-time-communication.md#element), que não tem uma autoridade de conta centralizada que pode fechar as contas arbitrariamente. @@ -162,5 +162,5 @@ Deve sempre considerar os riscos de tentar contornar a censura, as possíveis co [^1]: Wikipedia: [*Vigilância em massa*](https://en.wikipedia.org/wiki/Mass_surveillance) e [*Vigilância*](https: //en.wikipedia.org/wiki/Surveillance). [^2]: Conselho de Supervisão de Privacidade e Liberdades Civis dos Estados Unidos: [*Relatório sobre o Programa de Registos Telefónicos Conduzido ao abrigo da Secção 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Capitalismo de vigilância<*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Deve empregar outras técnicas de mitigação. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Deve empregar outras técnicas de mitigação. [^5]: Nações Unidas: [*Declaração Universal dos Direitos Humanos *](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/pt/basics/email-security.md b/i18n/pt/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/pt/basics/email-security.md +++ b/i18n/pt/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/pt/basics/multi-factor-authentication.md b/i18n/pt/basics/multi-factor-authentication.md index b5954d42..2d189e39 100644 --- a/i18n/pt/basics/multi-factor-authentication.md +++ b/i18n/pt/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you Se você tem uma chave de segurança de hardware com suporte a TOTP (como uma YubiKey com [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), recomendamos que você armazene os seus "segredos compartilhados" no hardware. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -Ao contrário de [FIDO2 / U2F](#fido2-u2f), TOTP não oferece protecção contra [phishing](https://en.wikipedia.org/wiki/Phishing) ou ataques de reutilização. Se um adversário obtém um código válido de você, ele pode usá-lo quantas vezes quiser até que expire (geralmente 60 segundos). A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Se um adversário obtém um código válido de você, ele pode usá-lo quantas vezes quiser até que expire (geralmente 60 segundos). A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Um adversário poderia criar um site para imitar um serviço oficial, numa tentativa de enganá-lo para dar o seu nome de usuário, senha e código TOTP atual. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Yubico tem um guia [Usando o seu YubiKey como Smart Card em macOS](https://suppo ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. A maioria das coisas deve ser a mesma independentemente da distribuição, no entanto os comandos do gerenciador de pacotes, como "apt-get" e nomes de pacotes podem ser diferentes. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. A maioria das coisas deve ser a mesma independentemente da distribuição, no entanto os comandos do gerenciador de pacotes, como "apt-get" e nomes de pacotes podem ser diferentes. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### SO Qubes -As bases de dados KeePass e KeePassXC podem ser protegidas usando Challenge-Response ou HOTP como um segundo factor de autenticação. Yubico forneceu um documennt para KeePass [Usando a sua YubiKey com KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) e também existe um no website [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) . +As bases de dados KeePass e KeePassXC podem ser protegidas usando Challenge-Response ou HOTP como um segundo factor de autenticação. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Chaves de Segurança de Hardware -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Palavra-passe única baseada no tempo (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (e KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/pt/basics/passwords-overview.md b/i18n/pt/basics/passwords-overview.md index f005d57f..75a563fe 100644 --- a/i18n/pt/basics/passwords-overview.md +++ b/i18n/pt/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/pt/basics/vpn-overview.md b/i18n/pt/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/pt/basics/vpn-overview.md +++ b/i18n/pt/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/pt/basics/why-privacy-matters.md b/i18n/pt/basics/why-privacy-matters.md index bcfcefce..e8845fb2 100644 --- a/i18n/pt/basics/why-privacy-matters.md +++ b/i18n/pt/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ A privacidade é algo que precisamos ter feito no [software e serviços](../tool ## Fontes -- [Porque a Privacidade Importa](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) por Neil Richards -- [O Novo Petróleo: Porque a Privacidade e a Segurança importam](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [O Novo Petróleo: Porque a Privacidade e a Segurança importam](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/pt/calendar.md b/i18n/pt/calendar.md index 6cb905d0..1373e0d1 100644 --- a/i18n/pt/calendar.md +++ b/i18n/pt/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/pt/cloud.md b/i18n/pt/cloud.md index 97059f56..300f9d60 100644 --- a/i18n/pt/cloud.md +++ b/i18n/pt/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Framadate diff --git a/i18n/pt/cryptocurrency.md b/i18n/pt/cryptocurrency.md index b5e49b4b..a0aea1bc 100644 --- a/i18n/pt/cryptocurrency.md +++ b/i18n/pt/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Faça transações com cuida **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/pt/data-redaction.md b/i18n/pt/data-redaction.md index 3a05741c..2413ecec 100644 --- a/i18n/pt/data-redaction.md +++ b/i18n/pt/data-redaction.md @@ -94,12 +94,12 @@ The app offers multiple ways to erase metadata from images. 17.1 e 18.1 caracter **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -113,7 +113,7 @@ The app offers multiple ways to erase metadata from images. 17.1 e 18.1 caracter **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -122,7 +122,7 @@ The app offers multiple ways to erase metadata from images. 17.1 e 18.1 caracter Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/pt/desktop-browsers.md b/i18n/pt/desktop-browsers.md index cbc961ba..0cecebcb 100644 --- a/i18n/pt/desktop-browsers.md +++ b/i18n/pt/desktop-browsers.md @@ -70,8 +70,8 @@ Se precisar de navegar anonimamente na internet, deverá usar antes o [Tor](tor. O **Mullvad Browser ** é baseado no [Tor](tor.md#tor-browser), mas com as integrações da rede Tor removidas. O objetivo é beneficiar das suas tecnologias de bloqueio de impressão digital para quem utilize uma VPN. É desenvolvido pelo Projeto Tor e distribuído por [Mullvad](vpn.md#mullvad), e **não** requer a utilização da VPN do Mullvad. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ O **Mullvad Browser ** é baseado no [Tor](tor.md#tor-browser), mas com as integ -Tal como o [Tor](tor.md), o Mullvad Browser foi concebido para evitar a recolha da sua impressão digital, tornando-a idêntica a todos os outros utilizadores do Mullvad Browser, e inclui configurações padrão e extensões que são configuradas automaticamente para níveis de segurança padrão: *Standard*, *Mais seguro* e *Segurança máxima*. Por esse motivo, é imperativo que não altere os ajustes dos [níveis de segurança](https://tb-manual.torproject.org/security-settings/) padrão do browser. Quaisquer modificações tornariam a sua impressão digital única, anulando o objetivo da utilização deste browser. Se pretender configurar o seu browser de uma forma mais musculada e a impressão digital não for uma preocupação para si, recomendamos o [Firefox](#firefox). +Tal como o [Tor](tor.md), o Mullvad Browser foi concebido para evitar a recolha da sua impressão digital, tornando-a idêntica a todos os outros utilizadores do Mullvad Browser, e inclui configurações padrão e extensões que são configuradas automaticamente para níveis de segurança padrão: *Standard*, *Mais seguro* e *Segurança máxima*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Quaisquer modificações tornariam a sua impressão digital única, anulando o objetivo da utilização deste browser. Se pretender configurar o seu browser de uma forma mais musculada e a impressão digital não for uma preocupação para si, recomendamos o [Firefox](#firefox). ### Bloqueio de impressão digital @@ -116,17 +116,17 @@ O Mullvad Browser vem com o motor de pesquisa DuckDuckGo predefinido [](search-e O **Firefox** possui definições de privacidade fortes, como a [Proteção Melhorada contra Monitorização] (https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), que pode ajudar a bloquear vários [tipos de rastreio] (https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ O **Firefox** possui definições de privacidade fortes, como a [Proteção Melh

Aviso

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Esta proteção bloqueia rastreadores de redes sociais, scripts de impressões d ##### Firefox Suggest (apenas nos EUA) -[O Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) é uma funcionalidade semelhante às sugestões de pesquisa que só está disponível nos EUA. Recomendamos a sua desativação pelo mesmo motivo que recomendamos a desativação das sugestões de pesquisa. Se não vir essa opções no cabeçalho da **Barra de endereço**, é porque não dispõe dessa nova experiência, devendo ignorar estas alterações. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. Recomendamos a sua desativação pelo mesmo motivo que recomendamos a desativação das sugestões de pesquisa. Se não vir essa opções no cabeçalho da **Barra de endereço**, é porque não dispõe dessa nova experiência, devendo ignorar estas alterações. - [ ] Desmarque **Sugestões da web** - [ ] Desmarque **Sugestões de patrocinadores** @@ -183,7 +183,7 @@ Esta ação protege-o dos cookies persistentes, mas não o protege dos cookies a > O Firefox envia-nos dados sobre a sua versão e idioma do Firefox; sistema operativo e configuração de hardware do dispositivo; memória, informações básicas sobre falhas e erros; resultado de processos automatizados como atualizações, navegação segura e ativação. Quando o Firefox nos envia dados, o seu endereço IP é temporariamente recolhido como parte dos registos do nosso servidor. -Além disso, o serviço de contas Firefox recolhe [alguns dados técnicos](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). Se utilizar uma conta Firefox, pode optar por não participar: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). Se utilizar uma conta Firefox, pode optar por não participar: 1. Abra as definições do seu perfil [em accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Desmarque **Recolha e utilização de dados** > **Ajudar a melhorar as contas Firefox** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sincronizar -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) permite que os seus dados de navegação (histórico, marcadores, etc.) estejam acessíveis em todos os seus dispositivos e protege-os com E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (avançado) @@ -215,7 +215,7 @@ O [Mullvad Browser](#mullvad-browser) fornece as mesmas proteções de bloqueio -O projeto [Arkenfox](https://github.com/arkenfox/user.js) fornece um conjunto de opções cuidadosamente escolhidas para o Firefox. Se [decidir](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) utilizar o Arkenfox, algumas [opções](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) são subjetivamente restritivas e/ou podem fazer com que alguns sites não funcionem corretamente - [algo que pode facilmente alterar](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) de forma a satisfazer as suas necessidades. Recomendamos vivamente a **** a leitura integral da sua [wiki](https://github.com/arkenfox/user.js/wiki). O Arkenfox também ativa o suporte de contentor [](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users). +O projeto [Arkenfox](https://github.com/arkenfox/user.js) fornece um conjunto de opções cuidadosamente escolhidas para o Firefox. Se [decidir](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) utilizar o Arkenfox, algumas [opções](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) são subjetivamente restritivas e/ou podem fazer com que alguns sites não funcionem corretamente - [algo que pode facilmente alterar](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) de forma a satisfazer as suas necessidades. Recomendamos vivamente a **** a leitura integral da sua [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. O Arkenfox apenas pretende impedir scripts de rastreio básicos ou naive, através da aleatorização do ecrã e das definições de configuração de resistência à impressão digital incorporadas no Firefox. Não tem como objetivo fazer com que o seu browser se misture com uma grande multidão de outros utilizadores do Arkenfox, como o Mullvad Browser ou o Tor, e que é a única forma de impedir scripts avançados de rastreio de impressões digitais. Lembre-se que pode sempre utilizar vários browsers. Pode, por exemplo, utilizar o Firefox+Arkenfox para alguns sites em que pretende manter a sessão iniciada ou em que confia, e o Mullvad Browser para navegação geral. @@ -223,25 +223,25 @@ O Arkenfox apenas pretende impedir scripts de rastreio básicos ou naive, atrav
-![Logótipo Brave](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -O **Brave** inclui um bloqueador de conteúdos incorporado e [funcionalidades de privacidade] (https://brave.com/privacy-features/), muitas das quais estão ativadas por predefinição. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. O Brave foi desenvolvido com base no projeto do Chromium, pelo que deve ser familiar a muitos utilizadores e não deverá ter grandes problemas de compatibilidade com sites. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ Estas opções podem ser encontradas em :material-menu: → **Definições...**. ##### Proteções -O Brave inclui algumas medidas de bloqueio de impressão digital nas suas [Proteções](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Sugerimos que configure estas opções [globalmente](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) em todas as páginas que visitar. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. As opções de proteção podem ser revogadas por cada site, de acordo com as necessidades, mas por predefinição recomendamos as seguintes definições: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave
-1. Esta opção disponibiliza uma funcionalidade semelhante aos modos de bloqueio avançados do uBlock Origin [](https://github.com/gorhill/uBlock/wiki/Blocking-mode) ou à extensão [NoScript](https://noscript.net/). +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacidade e segurança
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. O Brave **não é** tão resistente à recolha de impressões digitais como o Tor e muito menos pessoas utilizam o Brave com o Tor, pelo que a sua presença se destacará. Quando [é necessário um forte anonimato](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-), utilize o navegador Tor [](tor.md#tor-browser). +1. O Brave **não é** tão resistente à recolha de impressões digitais como o Tor e muito menos pessoas utilizam o Brave com o Tor, pelo que a sua presença se destacará. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ As funcionalidades Web3 do Brave podem potencialmente aumentar a impressão digi #### Sincronização -[A Sincronização do Brave](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) permite que os seus dados de navegação (histórico, marcadores, etc.) estejam acessíveis em todos os seus dispositivos, sem necessidade de uma conta, e protege-os com E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Recompensar Brave @@ -371,7 +371,7 @@ O **uBlock Origin** é um popular bloqueador de conteúdos que pode ajudá-lo a
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ Estamos a trabalhar no sentido de estabelecer critérios para cada secção do n - Disponível em Linux, macOS e Windows. - Alterações necessárias para tornar o browser mais respeitador da privacidade não devem afetar negativamente a experiência do utilizador. - Bloqueio de cookies de terceiros por defeito. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Melhor caso Estes são os critérios que consideramos essenciais para um projeto perfeito nesta categoria. As nossas recomendações podem não incluir todas as funcionalidades, mas incluem as que, na nossa opinião, têm um impacto mais elevado. - Inclui a funcionalidade de bloqueio de conteúdos incorporada. -- Suporta a compartimentação de cookies (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. Isto pode ter vantagens sobre a instalação de aplicações baseadas no Electron, uma vez que beneficia das atualizações de segurança regulares do seu browser. - Não inclui funcionalidades adicionais (bloatware) que não afetam a privacidade do utilizador. - Não recolhe telemetria por predefinição. @@ -462,4 +462,4 @@ Estes são os critérios que consideramos essenciais para um projeto perfeito ne - Deve ter um impacto direto na privacidade do utilizador, ou seja, não deve limitar-se a fornecer informações. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/pt/desktop.md b/i18n/pt/desktop.md index 46d60ab4..4e961f8f 100644 --- a/i18n/pt/desktop.md +++ b/i18n/pt/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. A Fedora geralmente adota novas tecnologias antes de outras distribuições, por exemplo, [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org), e em breve, [FS-Verity](https://fedoraproject.org/wiki/Changes/FsVerityRPM). Estas novas tecnologias muitas vezes vêm com melhorias na segurança, privacidade e usabilidade em geral. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). Estas novas tecnologias muitas vezes vêm com melhorias na segurança, privacidade e usabilidade em geral. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,9 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** é uma distribuição estável [lançamento rolante](https://en.wikipedia.org/wiki/Rolling_release). -O openSUSE Tumbleweed tem um sistema [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) que usa [Btrfs](https://en.wikipedia.org/wiki/Btrfs) e [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) para garantir que os instantâneos possam ser rolados de volta caso haja algum problema. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[Visite get.opensuse.org](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -55,7 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** é uma distribuição leve, faça-você-mesmo (faça você mesmo), o que significa que você só recebe o que você instala. Para mais informações consulte o seu [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[Visite archlinux.org](https://archlinux.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -79,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -104,7 +108,9 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS é uma distribuição independente baseada no gerenciador de pacotes Nix com foco na reprodutibilidade e confiabilidade. -[Visite nixos.org](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -130,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. O seu objectivo é proporcionar privacidade, segurança e anonimato na Internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -141,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Caudas @@ -153,7 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** é um sistema operacional live baseado no Debian que roteia todas as comunicações através do Tor. Pode arrancar em quase qualquer computador a partir de um DVD, pen USB ou sdcard. -O seu objectivo é preservar a privacidade e o anonimato, contornando a censura e não deixando qualquer vestígio de si no computador em que é utilizado. +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -170,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -182,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -207,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/pt/device-integrity.md b/i18n/pt/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/pt/device-integrity.md +++ b/i18n/pt/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/pt/dns.md b/i18n/pt/dns.md index d0fada84..fac87abe 100644 --- a/i18n/pt/dns.md +++ b/i18n/pt/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## Provedores recomendados -| DNS | Política de Privacidade | Protocolo | Protocolos | Logging | ECS | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ----------------------------------------------------------- | ------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Cleartext
DoH
DoT
DNSCrypt | Yes | Based on personal configuration. Filter list being used can be found here. [**DNS sobre HTTPS**](https://en.wikipedia.org/wiki/DNS_over_HTTPS) como definido em [RFC 8484](https://datatracker.ietf.org/doc/html/rfc8484) consultas de pacotes no protocolo [HTTP/2](https://en.wikipedia.org/wiki/HTTP/2) e fornece segurança com [HTTPS](https://en.wikipedia.org/wiki/HTTPS). | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Comercial | Cleartext
DoH
DoT | 4 | Based on personal configuration. | -| [**ControlID**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Comercial | Cleartext
DoH
DoT | 4 | Based on personal configuration. | -| [**IVPN**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | Comercial | DoH
DoT | 4 | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**PróximoDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Comercial | Cleartext
DoH
DoT
DNSCrypt | Opcional[^5] | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Comercial | Some[^6] | Opcional[^5] | Based on personal configuration, Malware blocking by default. | +| DNS | Política de Privacidade | Protocolo | Protocolos | Logging | ECS | +| ----------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ----------------------------------------------------------- | ------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Cleartext
DoH
DoT
DNSCrypt | Yes | Based on personal configuration. Filter list being used can be found here. [**DNS sobre HTTPS**](https://en.wikipedia.org/wiki/DNS_over_HTTPS) como definido em [RFC 8484](https://datatracker.ietf.org/doc/html/rfc8484) consultas de pacotes no protocolo [HTTP/2](https://en.wikipedia.org/wiki/HTTP/2) e fornece segurança com [HTTPS](https://en.wikipedia.org/wiki/HTTPS). | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Comercial | Cleartext
DoH
DoT | 4 | Based on personal configuration. | +| [**ControlID**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Comercial | Cleartext
DoH
DoT | 4 | Based on personal configuration. | +| [**IVPN**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | Comercial | DoH
DoT | 4 | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**PróximoDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Comercial | Cleartext
DoH
DoT
DNSCrypt | Opcional[^5] | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Comercial | Some[^6] | Opcional[^5] | Based on personal configuration, Malware blocking by default. | ### Framadate @@ -52,7 +52,7 @@ A Apple não fornece uma interface nativa para a criação de perfis DNS criptog #### Signed Profiles -Apple does not provide a native interface for creating encrypted DNS profiles. Informações Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple does not provide a native interface for creating encrypted DNS profiles. Informações Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -77,7 +77,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -128,7 +128,7 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home features a polished web interface to view insights and manage blocked content. @@ -147,13 +147,13 @@ AdGuard Home features a polished web interface to view insights and manage block ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -162,8 +162,8 @@ Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to suc
[^1]: Armazenamos métricas agregadas de desempenho do nosso servidor DNS, nomeadamente o número de pedidos completos para um determinado servidor, o número de pedidos bloqueados, a velocidade de processamento dos pedidos. Nós mantemos e armazenamos a base de dados de domínios solicitados nas últimas 24 horas. Precisamos dessas informações para identificar e bloquear novos rastreadores e ameaças. Também registramos quantas vezes este ou aquele rastreador foi bloqueado. Precisamos desta informação para remover regras desactualizadas dos nossos filtros.[https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: O Cloudflare recolhe e armazena apenas os dados limitados da consulta DNS que são enviados para o resolvedor 1.1.1.1. O serviço resolver 1.1.1.1 não registra dados pessoais, e a maior parte dos dados de consulta limitados não identificáveis pessoalmente é armazenada apenas por 25 horas.[https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: O Cloudflare recolhe e armazena apenas os dados limitados da consulta DNS que são enviados para o resolvedor 1.1.1.1. O serviço resolver 1.1.1.1 não registra dados pessoais, e a maior parte dos dados de consulta limitados não identificáveis pessoalmente é armazenada apenas por 25 horas.[https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/pt/email-clients.md b/i18n/pt/email-clients.md index 08e78c61..dfc91526 100644 --- a/i18n/pt/email-clients.md +++ b/i18n/pt/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ Estas opções podem ser encontradas na página *Privacidade & Segurança* confi **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,18 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![K-9 Logotipo do correio](/assets/img/email-clients/k9mail.svg){ align=right } -**K-9 Mail*** é uma aplicação de correio independente que suporta tanto caixas de correio POP3 como IMAP, mas só suporta push mail para IMAP. [Visite k9mail.app](https://k9mail.app){ .md-button .md-button--primary } [Política de Privacidade](https://k9mail.app/privacy){ .md-button } - -**Downloads*** -- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=com.fsck.k9) -- [:pg-f-droid: F-Droid](https://f-droid.org/packages/com.fsck.k9) -- [:fontawesome-brands-github: Source](https://github.com/k9mail) +**K-9 Mail*** é uma aplicação de correio independente que suporta tanto caixas de correio POP3 como IMAP, mas só suporta push mail para IMAP. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -185,7 +180,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -224,9 +219,9 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -246,8 +241,8 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -273,9 +268,9 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/pt/email.md b/i18n/pt/email.md index f69d2b3c..5ea200ae 100644 --- a/i18n/pt/email.md +++ b/i18n/pt/email.md @@ -55,7 +55,7 @@ O **Proton Mail** é um serviço de e-mail que privilegia a privacidade, a encri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ O Proton Mail tem relatórios internos de falhas que **não** partilham com terc #### :material-check:{ .pg-green } Domínios e aliases personalizados -Os subscritores do Proton Mail podem utilizar o seu próprio domínio com o serviço ou um endereço [catch-all](https://proton.me/support/catch-all). O Proton Mail também suporta [sub-endereçamento](https://proton.me/support/creating-aliases), o que é útil para as pessoas que não querem comprar um domínio. +Os subscritores do Proton Mail podem utilizar o seu próprio domínio com o serviço ou um endereço [catch-all](https://proton.me/support/catch-all). Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Métodos de pagamento privados @@ -129,7 +129,7 @@ O Proton Mail não oferece funcionalidade de legado digital. #### :material-check:{ .pg-green } Domínios e aliases personalizados -O Mailbox.org permite-lhe utilizar o seu próprio domínio e suporta endereços [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain). O Mailbox.org também suporta o sub-endereçamento [](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), o que é útil se não quiser comprar um domínio. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Métodos de pagamento privados @@ -137,17 +137,17 @@ O Mailbox.org não aceita quaisquer criptomoedas devido ao facto do seu processa #### :material-check:{ .pg-green } Segurança da conta -O Mailbox.org suporta [autenticação de dois fatores](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) apenas para o seu webmail. Pode utilizar o TOTP ou uma [YubiKey](https://en.wikipedia.org/wiki/YubiKey) através da [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Normas Web como a [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) ainda não são suportadas. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Normas Web como a [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) ainda não são suportadas. #### :material-information-outline:{ .pg-blue } Segurança dos dados -O Mailbox.org permite a encriptação do correio recebido utilizando a sua caixa de e-mail encriptada [](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). As novas mensagens recebidas serão imediatamente encriptadas com a sua chave pública. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). As novas mensagens recebidas serão imediatamente encriptadas com a sua chave pública. -No entanto, a [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), a plataforma de software utilizada pelo Mailbox.org, [não suporta](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) a encriptação do seu livro de endereços e calendário. Uma opção standalone [](calendar.md) pode ser mais adequada para salvaguardar a segurança dessa informação. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. Uma opção standalone [](calendar.md) pode ser mais adequada para salvaguardar a segurança dessa informação. #### :material-check:{ .pg-green } Encriptação de e-mail -O Mailbox.org tem [encriptação integrada](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) no seu webmail, o que simplifica o envio de mensagens para pessoas com chaves OpenPGP públicas. Também possibilitam que [destinatários remotos desencriptem uma mensagem de e-mail](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) nos servidores de Mailbox.org. Esta funcionalidade é útil quando o destinatário remoto não tem o OpenPGP e não consegue desencriptar uma cópia do e-mail na sua própria caixa de correio. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. Esta funcionalidade é útil quando o destinatário remoto não tem o OpenPGP e não consegue desencriptar uma cópia do e-mail na sua própria caixa de correio. O Mailbox.org também suporta a descoberta de chaves públicas via HTTP a partir do seu [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). Isto permite que pessoas que não utilizem o Mailbox.org encontrem facilmente as chaves OpenPGP das contas Mailbox.org, para E2EE entre fornecedores. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Após o termo do contrato, a sua conta será definida como uma conta de utilizad #### :material-information-outline:{ .pg-blue } Funcionalidade adicional -Pode aceder à sua conta Mailbox.org através de IMAP/SMTP utilizando o serviço [.onion](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). No entanto, a sua interface de webmail não pode ser acedida através do serviço .onion e podem ocorrer erros de certificado TLS. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). No entanto, a sua interface de webmail não pode ser acedida através do serviço .onion e podem ocorrer erros de certificado TLS. -Todas as contas incluem um armazenamento em nuvem limitado que [pode ser encriptado](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). O Mailbox.org também oferece pseudónimo [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), que força a encriptação TLS na ligação entre servidores de e-mail. Se isso não acontecer, a mensagem não será enviada. O Mailbox.org também suporta [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync), para além dos protocolos de acesso padrão como IMAP e POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. O Mailbox.org também suporta [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync), para além dos protocolos de acesso padrão como IMAP e POP3. O Mailbox.org tem uma funcionalidade de legado digital para todos os planos. Pode escolher se quer que os seus dados sejam transmitidos aos seus herdeiros, desde que estes o solicitem e apresentem o seu testamento. Em alternativa, pode nomear uma pessoa, fornecendo o seu nome e endereço. @@ -185,18 +185,18 @@ Estes fornecedores armazenam as suas mensagens eletrónicas com encriptação de [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Domínios e Aliases Personalizados -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Métodos de pagamento privados @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). Isto garante que todos os contactos do cliente com a empresa utilizam o E2EE. Esta funcionalidade custa 240 euros por ano. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). Isto garante que todos os contactos do cliente com a empresa utilizam o E2EE. Esta funcionalidade custa 240 euros por ano. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ A utilização de um serviço de aliasing requer a sua confiança no fornecedor - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Funcionalidades gratuitas dignas de nota: @@ -310,8 +310,8 @@ Funcionalidades gratuitas dignas de nota: O **SimpleLogin** é um serviço gratuito que fornece aliases de e-mail numa variedade de nomes de domínio partilhados e, opcionalmente, fornece funcionalidades pagas, como aliases ilimitados e domínios personalizados. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ O **SimpleLogin** é um serviço gratuito que fornece aliases de e-mail numa var - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-O SimpleLogin foi [adquirido pela Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces), em 8 de abril de 2022. Se utiliza o Proton Mail para a sua caixa de correio principal, o SimpleLogin é uma ótima escolha. Uma vez que ambos os produtos são agora propriedade da mesma empresa, só tem de confiar numa única entidade. Também esperamos que o SimpleLogin seja integrado de forma mais estreita com as ofertas da Proton no futuro. O SimpleLogin continua a suportar o reencaminhamento para qualquer fornecedor de e-mail de sua preferência. A Securitum [auditou o](https://simplelogin.io/blog/security-audit/) SimpleLogin no início de 2022 e todas os problemas identificados [foram resolvidos](https://simplelogin.io/audit2022/web.pdf). +O SimpleLogin foi [adquirido pela Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces), em 8 de abril de 2022. Se utiliza o Proton Mail para a sua caixa de correio principal, o SimpleLogin é uma ótima escolha. Uma vez que ambos os produtos são agora propriedade da mesma empresa, só tem de confiar numa única entidade. Também esperamos que o SimpleLogin seja integrado de forma mais estreita com as ofertas da Proton no futuro. O SimpleLogin continua a suportar o reencaminhamento para qualquer fornecedor de e-mail de sua preferência. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). Nas definições, pode associar a sua conta SimpleLogin à sua conta Proton. Se tiver o Plano Proton Unlimited, Business ou Visionary, terá o SimpleLogin Premium gratuitamente. @@ -352,9 +352,9 @@ Os administradores de sistemas avançados podem considerar a possibilidade de co **Mailcow** é um servidor de e-mail mais avançado, perfeito para quem tem um pouco mais de experiência em Linux. Tem tudo o que é necessário num contentor Docker: um servidor de e-mail com suporte DKIM, antivírus e monitorização de spam, webmail e ActiveSync com SOGo, e administração baseada na Web com suporte 2FA. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentação} -[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Código-fonte" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribuir } +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Os administradores de sistemas avançados podem considerar a possibilidade de co Para uma abordagem mais manual, selecionámos estes dois artigos: -- [Configurar um servidor de e-mail com OpenSMTPD, Dovecot e Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [Como gerir o seu próprio servidor de e-mail](https://www.c0ffee.net/blog/mail-server-guide/) (agosto de 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Critérios @@ -386,7 +386,7 @@ Consideramos que estas características são importantes para podermos prestar u **Mínimos de qualificação:** - Encriptação de todos os dados da conta de e-mail em estado de repouso, com encriptação de acesso zero. -- Capacidade de exportação como [Mbox](https://en.wikipedia.org/wiki/Mbox) ou .eml individual com a norma [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) . +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Permitir que aos utilizadores configurar o seu próprio nome de domínio [](https://en.wikipedia.org/wiki/Domain_name). Os nomes de domínio personalizados são importantes para os utilizadores, porque lhes permitem manter a sua agência do serviço, caso este se torne mau ou seja adquirido por outra empresa que não dê prioridade à privacidade. - Funciona com uma infraestrutura própria, isto é, não se baseia em fornecedores de serviços de e-mail de terceiros. @@ -397,7 +397,7 @@ Consideramos que estas características são importantes para podermos prestar u - Suporte para [WKD](https://wiki.gnupg.org/WKD) para permitir uma melhor descoberta de chaves OpenPGP públicas através de HTTP. Os utilizadores do GnuPG podem obter uma chave escrevendo: `gpg --locate-key example_user@example.com` - Suporte para uma caixa de correio temporária para utilizadores externos. Isto é útil quando se pretende enviar uma mensagem de e-mail encriptada, sem enviar uma cópia real ao destinatário. Estas mensagens de e-mail têm normalmente um tempo de vida limitado e depois são automaticamente eliminadas. Também não requerem que o destinatário configure qualquer criptografia como o OpenPGP. - Disponibilidade dos serviços do fornecedor de e-mail através de um serviço onion [](https://en.wikipedia.org/wiki/.onion). -- Suporte de [Sub-endereçamento](https://en.wikipedia.org/wiki/Email_address#Subaddressing). +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Funcionalidade de Catch-all ou alias para quem possui os seus próprios domínios. - Utilização de protocolos normais de acesso ao e-mail, como IMAP, SMTP ou [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Os protocolos de acesso normalizados garantem que os clientes podem transferir facilmente todo o seu e-mail, caso pretendam mudar para outro fornecedor. @@ -425,13 +425,13 @@ Os servidores de e-mail lidam com uma grande quantidade de dados muito sensívei - Proteção do webmail com 2FA, como o TOTP. - Encriptação de acesso zero, baseada na encriptação em estado de repouso. Vedar o acesso do fornecedor às chaves de desencriptação dos dados. Isto impede que um funcionário desonesto divulgue os dados a que tem acesso ou que um adversário remoto divulgue os dados que roubou ao obter acesso não autorizado ao servidor. - [Suporte DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions). -- Nenhum erro ou vulnerabilidade de TLS ao ser analisado por ferramentas como [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), ou [Qualys SSL Labs](https://www.ssllabs.com/ssltest); isto inclui erros relacionados com certificados e parâmetros DH fracos, como os que levaram a [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - Uma opção de suite de servidor (opcional no TLSv1.3) para suites de cifras fortes que suportem encaminhamento sigiloso e encriptação autenticada. - Uma política válida [MTA-STS](https://tools.ietf.org/html/rfc8461) e [TLS-RPT](https://tools.ietf.org/html/rfc8460). - Registos [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) válidos. - Registos [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) e [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) válidos. - Registo e política [DMARC](https://en.wikipedia.org/wiki/DMARC) adequados ou [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) para autenticação. Se estiver a ser utilizada a autenticação DMARC, a política deve ser definida como `reject` ou `quarantine`. -- Uma opção de suite de servidor por TLS 1.2 ou posterior e um plano para [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - Submissão [SMTPS](https://en.wikipedia.org/wiki/SMTPS), assumindo que é utilizado o SMTP. - Normas de segurança de sites Web, tais como: - [Segurança de transporte estrito HTTP](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Os servidores de e-mail lidam com uma grande quantidade de dados muito sensívei - Programas de recompensa de bugs e/ou um processo coordenado de divulgação de vulnerabilidades. - Normas de segurança de sites Web, tais como: - [Política de segurança de conteúdo (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Confiança diff --git a/i18n/pt/encryption.md b/i18n/pt/encryption.md index e4dd9f0a..9971b4eb 100644 --- a/i18n/pt/encryption.md +++ b/i18n/pt/encryption.md @@ -23,15 +23,15 @@ As opções listadas aqui são multi-plataforma e excelentes para criar backups [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -46,7 +46,7 @@ O VeraCrypt é um garfo do projeto TrueCrypt descontinuado. De acordo com seus d Ao encriptar com VeraCrypt, o utilizador tem a opção de seleccionar de diferentes [funções hash](https://en.wikipedia.org/wiki/VeraCrypt#Encryption_scheme). Sugerimos aos utilizadores **apenas** seleccione [SHA-512](https://en.wikipedia.org/wiki/SHA-512) e deve ficar com o [AES](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) cifra de bloco. The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Truecrypt foi [auditada várias vezes](https://en.wikipedia.org/wiki/TrueCrypt#Security_audits) e VeraCrypt também foi [auditada separadamente](https://en.wikipedia.org/wiki/VeraCrypt#VeraCrypt_audit). +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Criptomador @@ -91,15 +91,15 @@ Truecrypt foi [auditada várias vezes](https://en.wikipedia.org/wiki/TrueCrypt#S [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -121,15 +121,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](/assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** é a solução de encriptação de volume completo, em conjunto com o Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** é a solução de encriptação de volume completo, em conjunto com o Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[Visite microsoft.com](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .md-button .md-button--primary } +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -146,7 +146,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powerhell Get-Disk 0 | findstr GPT && echo Este é um disco do sistema GPT! ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -193,7 +193,9 @@ We recommend storing a local recovery key in a secure place as opposed to using **LUKS*** é o método padrão de criptografia de disco completo para Linux. Ele pode ser usado para criptografar volumes completos, partições ou criar containers criptografados. -[Visite gitlab.com](https://gitlab.com/cryptsetup/cryptsetup){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -239,20 +241,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![logo Kryptor](/assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** é uma ferramenta de criptografia e assinatura de arquivos livre e de código aberto que faz uso de algoritmos criptográficos modernos e seguros. Pretende ser uma versão melhor de [age](https://github.com/FiloSottile/age) e [Minisign](https://jedisct1.github.io/minisign/) para fornecer uma alternativa simples e amigável ao GPG. +**Kryptor** é uma ferramenta de criptografia e assinatura de arquivos livre e de código aberto que faz uso de algoritmos criptográficos modernos e seguros. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -266,10 +268,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** é uma shell wrapper de linha de comando para LUKS. Ele suporta esteganografia através de [ferramentas de terceiros](https://github.com/dyne/Tomb#how-does-it-work). -[Visite dyne.org](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } - -**Downloads*** -- [:fontawesome-brands-github: Fonte](https://github.com/dyne/Tomb) +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -279,12 +281,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. Dica "Use padrões futuros ao gerar uma chave". For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -298,7 +300,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](/assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** é uma alternativa GPL-licenciada ao conjunto de software criptográfico PGP. GnuPG está em conformidade com [RFC 4880](https://tools.ietf.org/html/rfc4880), que é a especificação atual da IETF do OpenPGP. O projeto GnuPG tem trabalhado em um [rascunho atualizado](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) numa tentativa de modernizar o OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** é uma alternativa GPL-licenciada ao conjunto de software criptográfico PGP. GnuPG está em conformidade com [RFC 4880](https://tools.ietf.org/html/rfc4880), que é a especificação atual da IETF do OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -377,11 +379,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![logótipo OpenKeychain](/assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** é uma implementação Android do GnuPG. É normalmente exigido por clientes de e-mail como [K-9 Mail](/email-clients/#k-9-mail) e [FairEmail](/email-clients/#fairemail) e outros aplicativos Android para fornecer suporte à criptografia. Cure53 concluiu uma [auditoria de segurança](https://www.openkeychain.org/openkeychain-3-6) da OpenKeychain 3.6 em outubro de 2015. Detalhes técnicos sobre a auditoria e as soluções OpenKeychain podem ser encontrados [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** é uma implementação Android do GnuPG. É normalmente exigido por clientes de e-mail como [K-9 Mail](/email-clients/#k-9-mail) e [FairEmail](/email-clients/#fairemail) e outros aplicativos Android para fornecer suporte à criptografia. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Detalhes técnicos sobre a auditoria e as soluções OpenKeychain podem ser encontrados [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/pt/file-sharing.md b/i18n/pt/file-sharing.md index bf0fd5db..48cd4e1d 100644 --- a/i18n/pt/file-sharing.md +++ b/i18n/pt/file-sharing.md @@ -15,7 +15,7 @@ Descubra como partilhar os seus ficheiros em privado entre os seus dispositivos, ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** é um fork do serviço Firefox Send, descontinuado pela Mozilla, que lhe permite enviar ficheiros para outros com uma hiperligação. Os ficheiros são encriptados no seu dispositivo para não poderem ser lidos pelo servidor e, opcionalmente, também podem ser protegidos por palavra-passe. O responsável pelo envio aloja uma [instância pública](https://send.vis.ee/). Pode utilizar outras instâncias públicas ou pode alojar o Send por si. +**Send** é um fork do serviço Firefox Send, descontinuado pela Mozilla, que lhe permite enviar ficheiros para outros com uma hiperligação. Os ficheiros são encriptados no seu dispositivo para não poderem ser lidos pelo servidor e, opcionalmente, também podem ser protegidos por palavra-passe. The maintainer of Send hosts a [public instance](https://send.vis.ee). Pode utilizar outras instâncias públicas ou pode alojar o Send por si. [:octicons-home-16: Página Inicial](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Instâncias Públicas"} @@ -83,7 +83,7 @@ Estamos a trabalhar no sentido de estabelecer critérios definidos para cada sec [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ Estamos a trabalhar no sentido de estabelecer critérios definidos para cada sec [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -139,16 +139,16 @@ Estamos a trabalhar no sentido de estabelecer critérios definidos para cada sec [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/pt/financial-services.md b/i18n/pt/financial-services.md index 7f85bfd9..85d9950a 100644 --- a/i18n/pt/financial-services.md +++ b/i18n/pt/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -85,9 +85,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/pt/frontends.md b/i18n/pt/frontends.md index 1c61c169..67cf609d 100644 --- a/i18n/pt/frontends.md +++ b/i18n/pt/frontends.md @@ -19,7 +19,7 @@ Quando estiver a utilizar uma instância gerida por outra pessoa, certifique-se ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ Por predefinição, o FreeTube bloqueia todos os anúncios do YouTube. Além dis [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ Por predefinição, o FreeTube bloqueia todos os anúncios do YouTube. Além dis

Warning

-Ao utilizar o FreeTube, o seu endereço IP pode ainda ser do conhecimento do YouTube, [Invidious](https://instances.invidious.io) ou [SponsorBlock](https://sponsor.ajay.app/), dependendo da sua configuração. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ Ao utilizar o FreeTube, o seu endereço IP pode ainda ser do conhecimento do You O **Yattee** é um leitor de vídeos do [YouTube](https://youtube.com), gratuito e de código aberto, orientado para a privacidade, com versões para iOS, tvOS e macOS. Quando utiliza o Yattee, a sua lista de subscrições é guardada localmente no seu dispositivo. -Terá de efetuar alguns [passos extra] (https://gonzoknows.com/posts/Yattee/) antes de poder utilizar o Yattee para ver o YouTube, devido a restrições da App Store. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ Terá de efetuar alguns [passos extra] (https://gonzoknows.com/posts/Yattee/) an
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ Terá de efetuar alguns [passos extra] (https://gonzoknows.com/posts/Yattee/) an

Warning

-Ao utilizar o Yattee, o seu endereço IP pode ainda ser do conhecimento do YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) ou [SponsorBlock](https://sponsor.ajay.app/), dependendo da sua configuração. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ O LibreTube permite-lhe armazenar a sua lista de subscrição e listas de reprod

Warning

-Ao utilizar o LibreTube, o seu endereço IP será visível para a instância [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) que escolher e/ou [SponsorBlock](https://sponsor.ajay.app/), dependendo da sua configuração. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -149,17 +149,17 @@ Por defeito, o LibreTube bloqueia todos os anúncios do YouTube. Além disso, o
-![Logótipo Newpipe](assets/img/frontends/newpipe.svg){ align=right } +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** é uma aplicação Android gratuita e de código aberto para [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com) e [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). A sua lista de subscrição e listas de reprodução são guardadas localmente no seu dispositivo Android. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ A sua lista de subscrição e listas de reprodução são guardadas localmente n
-1. A instância predefinida é [FramaTube](https://framatube.org/), mas podem ser adicionadas mais através de **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -191,10 +191,10 @@ O **Invidious** é um frontend gratuito e de código aberto para [YouTube](https There are a number of public instances, with some instances having [Tor](tor.md) onion services support. [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Instâncias Públicas"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentação} -[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Código-fonte" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribuir } +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -224,11 +224,11 @@ O **Piped** é um frontend gratuito e de código aberto para [YouTube](https://y O Piped requer JavaScript para funcionar e existem várias instâncias públicas. -[:octicons-repo-16: Repositório](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Instâncias Públicas"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentação} -[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Código-fonte" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribuir } +[:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } +[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/pt/index.md b/i18n/pt/index.md index cf202cab..ad2c21c3 100644 --- a/i18n/pt/index.md +++ b/i18n/pt/index.md @@ -62,12 +62,12 @@ Tentar proteger os seus dados de toda a gente, a toda a hora, é impraticável, ## Precisamos de si! Eis como participar: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Junte-se ao Fórum" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Siga-nos no Mastodon" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribua para este site" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Ajude a traduzir o site" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Fale connosco no Matrix" } -[:material-information-outline:](about/index.md){ title="Saiba mais sibre nós" } -[:material-hand-coin-outline:](about/donate.md){ title="Apoie o projeto" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } É importante que um site como o Privacy Guides esteja sempre atualizado. Precisamos que o nosso público esteja atento às atualizações de software para as aplicações listadas no nosso site e siga as notícias recentes sobre os fornecedores que recomendamos. É difícil acompanhar o ritmo acelerado da Internet, mas tentamos fazer o nosso melhor. Se detetar um erro, se achar que um fornecedor não deveria constar da lista, se notar que falta um fornecedor qualificado, se achar que um plugin do browser já não é a melhor opção ou se descobrir qualquer outro problema, informe-nos. diff --git a/i18n/pt/kb-archive.md b/i18n/pt/kb-archive.md index 069272be..5e1e55ce 100644 --- a/i18n/pt/kb-archive.md +++ b/i18n/pt/kb-archive.md @@ -8,10 +8,10 @@ description: Algumas páginas que costumavam estar na nossa base de conhecimento Algumas páginas que costumavam estar na nossa base de conhecimento podem agora ser encontradas no nosso blogue: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Robustecimento da configuração do Signal](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - Robsutecimento do sistema](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Sandboxing para aplicações](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Eliminação segura de dados](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integração da remoção de metadados](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [Guia de configuração do iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Robustecimento da configuração do Signal](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - Robsutecimento do sistema](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Sandboxing para aplicações](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Eliminação segura de dados](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integração da remoção de metadados](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [Guia de configuração do iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/pt/meta/admonitions.md b/i18n/pt/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/pt/meta/admonitions.md +++ b/i18n/pt/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/pt/meta/translations.md b/i18n/pt/meta/translations.md index df031e4c..628fa67e 100644 --- a/i18n/pt/meta/translations.md +++ b/i18n/pt/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -80,4 +80,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/pt/meta/uploading-images.md b/i18n/pt/meta/uploading-images.md index 04acfa47..57ace81c 100644 --- a/i18n/pt/meta/uploading-images.md +++ b/i18n/pt/meta/uploading-images.md @@ -17,7 +17,7 @@ Os logótipos das empresas devem ter um tamanho de tela de: ### PNG -Use o [OptiPNG](https://sourceforge.net/projects/optipng/) para otimizar a imagem PNG: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/pt/meta/writing-style.md b/i18n/pt/meta/writing-style.md index 13d26bcb..bb8eff5e 100644 --- a/i18n/pt/meta/writing-style.md +++ b/i18n/pt/meta/writing-style.md @@ -4,11 +4,11 @@ title: Normas de Estilo Privacy Guides está originalmente escrito em inglês dos EU, pelo que deve consultar as [normas de estilo da APA](https://apastyle.apa.org/style-grammar-guidelines/grammar) em caso de dúvida. -Em geral, as [as diretrizes federais de linguagem simples dos Estados Unidos](https://www.plainlanguage.gov/guidelines/) fornecem uma boa visão geral de como escrever de forma clara e concisa. Em seguida, destacamos algumas notas orientativas importantes. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. Em seguida, destacamos algumas notas orientativas importantes. ## Escreva para o nosso público -O [público-alvo](https://www.plainlanguage.gov/guidelines/audience/) do Privacy Guides é sobretudo público adulto, utilizador de tecnologia. Não assuma uma postura diletante, simplificando o conteúdo como se estivesse a dirigir-se a uma turma do ensino básico ou médio. Contudo, não use terminologia demasiado complicada, sobretudo quando estão em causa conceitos com os quais os utilizadores comuns não estão familiarizados. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Não assuma uma postura diletante, simplificando o conteúdo como se estivesse a dirigir-se a uma turma do ensino básico ou médio. Contudo, não use terminologia demasiado complicada, sobretudo quando estão em causa conceitos com os quais os utilizadores comuns não estão familiarizados. ### Aborde apenas o que as pessoas querem saber @@ -24,7 +24,7 @@ Escrevemos *para* uma grande variedade de pessoas, mas escrevemos *sobretudo par > > Quando usa “você” para se referir aos utilizadores, é mais provável que eles entendam a sua responsabilidade. -Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Evite "utilizadores" @@ -37,7 +37,7 @@ A organização é primordial. O conteúdo deve estar organizado de forma a que, - Um documento não deve ter mais do que cinco ou seis secções. Documentos longos deverão ser desdobrados em páginas separadas. - Assinale as ideias importantes com **negrito** ou *itálico*. -Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Comece com uma frase de tópico @@ -45,7 +45,7 @@ Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > Muitas vezes escrevemos de acordo com a nossa opinião, apresentando primeiro as nossas premissas e depois a nossa conclusão. Será talvez a forma natural de desenvolver as ideias, mas acabaremos por chegar apenas ao essencial do tópico no final do parágrafo. Coloque o essencial do tópico no início, informando os utilizadores sobre qual a direção que será seguida. Evite que os seus leitores acumulem demasiada informação nas suas cabeças, antes de chegarem ao essencial do tópico. -Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Escolha as suas palavras com cuidado @@ -65,7 +65,7 @@ Deveremos evitar a utilização de abreviaturas, sempre que possível, embora sa > Palavras desnecessárias desperdiçam tempo ao seu público. Uma boa escrita é como uma conversa. Omita informações desnecessárias. Pode ser uma tarefa difícil para quem é especialista no tema, pelo que é importante que alguém possa validar a informação da perspetiva do público. -Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Mantenha o texto em tom de conversa @@ -77,7 +77,7 @@ Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > A voz ativa torna claro quem deve fazer o quê. Elimina ambiguidades em relação às responsabilidades. Não diga "deve ser feito", mas antes "tem de o fazer." -Fonte: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "deve" para requisitos diff --git a/i18n/pt/mobile-browsers.md b/i18n/pt/mobile-browsers.md index 24abe07f..64ce461f 100644 --- a/i18n/pt/mobile-browsers.md +++ b/i18n/pt/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Origem do uBlock image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,22 +41,22 @@ Estes são os navegadores para dispositivos móveis e as configurações atualme ## Android -No Android, o Firefox continua a ser menos seguro do que as alternativas baseadas no Chromium: o motor da Mozilla, [GeckoView](https://mozilla.github.io/geckoview/), ainda não suporta [o isolamento de sites](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) nem ativa [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave
-![Logótipo Brave](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -O **Brave** inclui um bloqueador de conteúdos incorporado e [funcionalidades de privacidade] (https://brave.com/privacy-features/), muitas das quais estão ativadas por predefinição. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Inclui [características de privacidade](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0), tais como Proteção de Rastreamento Inteligente, Relatório de Privacidade, abas isoladas de Navegação Privada, iCloud Private Relay, e atualizações automáticas de HTTPS. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ Estas opções podem ser encontradas em :material-menu: → **Definições** → ##### Proteções -A Brave inclui algumas medidas de bloqueio de impressão digital na sua funcionalidade [Proteção](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Sugerimos que configure estas opções [globalmente](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) em todas as páginas que visitar. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Predefinições globais das proteções do Brave @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Esta opção disponibiliza uma funcionalidade semelhante aos modos de bloqueio avançados do uBlock Origin [](https://github.com/gorhill/uBlock/wiki/Blocking-mode) ou à extensão [NoScript](https://noscript.net/). +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Limpar dados de navegação @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Sincronização do Brave -[A Sincronização do Brave](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) permite que os seus dados de navegação (histórico, marcadores, etc.) estejam acessíveis em todos os seus dispositivos, sem necessidade de uma conta, e protege-os com E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,11 +141,11 @@ No iOS, qualquer aplicação que possa navegar na Web está [limitada](https://d ![Logótipo Safari](assets/img/browsers/safari.svg){ align=right } -O **Safari** é o navegador predefinido no iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +O **Safari** é o navegador predefinido no iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Política de Privacidade" } -[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentação} +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ O Relatório de Privacidade é acessível através do menu de Configurações. - [ ] Desativar **Medidor de Anúncios Respeitador de Privacidade** -A medição de clique em anúncios tem usado tradicionalmente a tecnologia de rastreamento que viola a privacidade do utilizador. A [Medição de Clique Privado](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) é um recurso de WebKit e um padrão proposto para permitir que anunciantes meçam a eficácia de campanhas na web sem comprometer a privacidade do utilizador. +A medição de clique em anúncios tem usado tradicionalmente a tecnologia de rastreamento que viola a privacidade do utilizador. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. A funcionalidade tem poucas preocupações de privacidade por si só, então enquanto pode optar por deixá-lo ligado, nós consideramos que ele é automaticamente desativado na navegação privativa como um indicador para desativar o recurso. @@ -201,9 +201,9 @@ Tenha em atenção que a Navegação Privada não guarda cookies e dados de sít ##### Sincronização iCloud -A sincronização do histórico do Safari, grupos de separadores, separadores do iCloud e palavras-passe guardadas são E2EE. No entanto, por predefinição, os marcadores não [são](https://support.apple.com/en-us/HT202303). A Apple pode desencriptá-los e aceder-lhes segundo a sua [política de privacidade](https://www.apple.com/legal/privacy/en-ww/). +A sincronização do histórico do Safari, grupos de separadores, separadores do iCloud e palavras-passe guardadas são E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -Pode ativar o E2EE para os seus favoritos e transferências do Safari ativando a [Proteção Avançada de Dados](https://support.apple.com/en-us/HT212520). Aceda ao seu **Nome de ID Apple → iCloud → Proteção de Dados Avançada**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Aceda ao seu **Nome de ID Apple → iCloud → Proteção de Dados Avançada**. - [x] Ligue a **Proteção de Dados Avançada** @@ -227,7 +227,7 @@ O AdGuard para iOS tem algumas funcionalidades premium; no entanto, o bloqueio d
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/pt/multi-factor-authentication.md b/i18n/pt/multi-factor-authentication.md index 49b15c3c..e18731c7 100644 --- a/i18n/pt/multi-factor-authentication.md +++ b/i18n/pt/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-fator-authentication/yubikey.png) -As **YubiKeys** estão entre as chaves de segurança mais populares. Alguns modelos YubiKey têm uma vasta gama de características, como por exemplo: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 WebAuthn](https://en.wikipedia.org/wiki/WebAuthn), [Yubico OTP](https://developers.yubico.com/OTP/), [PIV](https://en.wikipedia.org/wiki/FIPS_201), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP e HOTP](https://developers.yubico.com/OATH/) autenticação. +As **YubiKeys** estão entre as chaves de segurança mais populares. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -Um dos benefícios da YubiKey é o facto de ser uma chave que pode fazer quase tudo (YubiKey 5), e que realmente tudo aquilo que se espera de uma chave de segurança de hardware. Aconselhamo-lo a consultar o sítio [quiz](https://www.yubico.com/quiz/) antes de comprar, para ter a certeza de que faz a escolha certa. +Um dos benefícios da YubiKey é o facto de ser uma chave que pode fazer quase tudo (YubiKey 5), e que realmente tudo aquilo que se espera de uma chave de segurança de hardware. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Política de Privacidade" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentação} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-A [tabela de comparação](https://www.yubico.com/store/compare/) compara as características dos diferentes tipos de YubiKeys. Recomendamos vivamente que selecione as chaves da série YubiKey 5. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. Recomendamos vivamente que selecione as chaves da série YubiKey 5. -As YubiKeys podem ser programadas utilizando o [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) ou [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Para gerir os códigos TOTP, pode utilizar o [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. Para os modelos que suportam HOTP e TOTP, existem 2 slots na interface OTP que podem ser utilizadas para HOTP e 32 slots que permitem armazenar segredos TOTP. Estes segredos são armazenados de forma encriptada na chave e nunca são expostos aos dispositivos a que estão ligados. Uma vez que uma semente (segredo compartilhado) é dada ao Yubico Authenticator, o output só consistirá num código de seis dígitos, e nunca na semente. Este modelo de segurança ajuda a limitar o que um atacante pode fazer se comprometer um dos dispositivos que executam o Yubico Authenticator, fazendo com que a YubiKey seja resistente a um atacante físico. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. Se pretender no A **Nitrokey** tem uma chave de segurança que suporta [FIDO2 e WebAuthn](basics/multi-fator-authentication.md#fido-fast-identity-online) chamada **Nitrokey FIDO2**. Para suporte de PGP, é necessário adquirir uma das outras chaves, como a **Nitrokey Start**, **Nitrokey Pro 2** ou **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Política de Privacidade" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentação} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation} -A [tabela de comparação](https://www.nitrokey.com/#comparison) compara as características dos diferentes modelos Nitrokey. O **Nitrokey 3** listado terá um conjunto de características combinadas. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. O **Nitrokey 3** listado terá um conjunto de características combinadas. -Os modelos Nitrokey podem ser configurados através da aplicação [Nitrokey](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). Para os modelos que suportam HOTP e TOTP, existem 3 slots para HOTP e 15 para TOTP. Alguns Nitrokeys podem funcionar como gestores de palavras-passe. Podem armazenar 16 credenciais diferentes e encriptá-las utilizando a mesma palavra-passe que a interface OpenPGP. @@ -74,7 +74,7 @@ A reposição da interface OpenPGP numa Nitrokey também fará com que a base de -A Nitrokey Pro 2, a Nitrokey Storage 2 e a futura Nitrokey 3 suportam a verificação da integridade do sistema para computadores portáteis com o firmware [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/). +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. O firmware dos modelos NitroKey modernos (exceto o **NitroKey Pro 2**) pode ser atualizado. @@ -127,7 +127,7 @@ Recomendamos vivamente que utilize aplicações TOTP para dispositivos móveis, Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ Recomendamos vivamente que utilize aplicações TOTP para dispositivos móveis, [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/pt/news-aggregators.md b/i18n/pt/news-aggregators.md index 51c5ef64..8dd481a7 100644 --- a/i18n/pt/news-aggregators.md +++ b/i18n/pt/news-aggregators.md @@ -21,7 +21,7 @@ O **Akregator** é um leitor de feeds de notícias que faz parte do projeto [KDE [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ O **Fluent Reader** é um agregador de notícias seguro e multiplataforma que po [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ O **Fluent Reader** é um agregador de notícias seguro e multiplataforma que po O **NetNewsWire** é um leitor de feeds gratuito e de código aberto para macOS e iOS, centrado num design nativo e num conjunto de funcionalidades. Suporta os formatos de feeds típicos, juntamente com suporte integrado para feeds do Reddit. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ O Reddit permite-lhe subscrever subreddits através de RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ Pode subscrever canais do YouTube sem iniciar sessão e associar informações d To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/pt/notebooks.md b/i18n/pt/notebooks.md index 312397d2..1c56b3bf 100644 --- a/i18n/pt/notebooks.md +++ b/i18n/pt/notebooks.md @@ -34,7 +34,7 @@ Logótipo Standard Notes](assets/img/notebooks/standard-notes.svg){ align=right - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ Logótipo Standard Notes](assets/img/notebooks/standard-notes.svg){ align=right ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. Possui encriptação de ponta a ponta em todas as plataformas e uma sincronização poderosa para que possa escrever as suas notas em qualquer local e dispositivo. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. Possui encriptação de ponta a ponta em todas as plataformas e uma sincronização poderosa para que possa escrever as suas notas em qualquer local e dispositivo. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ Logótipo Standard Notes](assets/img/notebooks/standard-notes.svg){ align=right Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** é uma aplicação gratuita, de código aberto e com todas as funcionalidades características de uma aplicação do género. É capaz de lidar com um grande número de notas markdown, organizadas em cadernos e tags. Oferece E2EE e pode ser sincronizada através do Nextcloud, Dropbox e muito mais. Também permite a importação fácil do Evernote e de notas de texto simples. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -135,9 +135,9 @@ O Cryptee oferece 100MB de armazenamento gratuito, com opções pagas para o cas
-![Logótipo Org-mode](assets/img/notebooks/org-mode.svg){ align=right } +![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -O **Org-mode** é um [modo principal] (https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) para o GNU Emacs. Serve para tomar notas, manter listas de tarefas, planear projetos e criar documentos, através de um sistema de texto simples, rápido e eficaz. Permite sincronização com as ferramentas de [sincronização de ficheiros] (file-sharing.md#file-sync). +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Serve para tomar notas, manter listas de tarefas, planear projetos e criar documentos, através de um sistema de texto simples, rápido e eficaz. Permite sincronização com as ferramentas de [sincronização de ficheiros] (file-sharing.md#file-sync). [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentação} diff --git a/i18n/pt/os/android-overview.md b/i18n/pt/os/android-overview.md index ec306298..bfcede00 100644 --- a/i18n/pt/os/android-overview.md +++ b/i18n/pt/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/pt/os/ios-overview.md b/i18n/pt/os/ios-overview.md index 7848e75b..6caa99c9 100644 --- a/i18n/pt/os/ios-overview.md +++ b/i18n/pt/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/pt/os/linux-overview.md b/i18n/pt/os/linux-overview.md index 434a879d..b79f925b 100644 --- a/i18n/pt/os/linux-overview.md +++ b/i18n/pt/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## Recomendações Gerais @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/pt/os/macos-overview.md b/i18n/pt/os/macos-overview.md index 62ebdced..d50a7c6c 100644 --- a/i18n/pt/os/macos-overview.md +++ b/i18n/pt/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Configuração recomendada Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/pt/os/qubes-overview.md b/i18n/pt/os/qubes-overview.md index abd8dbb6..ee8826e1 100644 --- a/i18n/pt/os/qubes-overview.md +++ b/i18n/pt/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Recursos Adicionais -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/pt/passwords.md b/i18n/pt/passwords.md index 4ea2278d..5d102b9e 100644 --- a/i18n/pt/passwords.md +++ b/i18n/pt/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Gestor de Palavras-Passe operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Gestor de Palavras-Passe operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Gestor de Palavras-Passe operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Gestor de Palavras-Passe operatingSystem: - Windows @@ -127,7 +127,7 @@ Os gestores de palavras-passe permitem-lhe armazenar e gerir de forma segura as Os gestores de palavras-passe integrados em software, como browsers e sistemas operativos, não são, por vezes, tão bons como o software dedicado de gestão de palavras-passe. A vantagem de um gestor de palavras-passe integrado é a sua boa integração com o software em causa, mas muitas vezes pode ser muito simples e carecer de funcionalidades de privacidade e segurança que as ofertas autónomas possuem. -Por exemplo, o gestor de palavras-passe no Microsoft Edge não oferece E2EE. O gestor de palavras-passe da Google tem [optional](https://support.google.com/accounts/answer/11350823) E2EE, e o [da Apple](https://support.apple.com/en-us/HT202303) oferece E2EE por predefinição. +Por exemplo, o gestor de palavras-passe no Microsoft Edge não oferece E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ Estes gestores de palavras-passe sincronizam as suas palavras-passe com um servi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ Estes gestores de palavras-passe sincronizam as suas palavras-passe com um servi
-O Bitwarden também inclui [Bitwarden Send](https://bitwarden.com/products/send/), que lhe permite partilhar texto e ficheiros de forma segura com [encriptação de ponta a ponta](https://bitwarden.com/help/send-encryption). Pode ser necessária uma palavra-passe [palavra-passe](https://bitwarden.com/help/send-privacy/#send-passwords) juntamente com o link de envio. O Bitwarden Send também inclui [eliminação automática](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). Pode ser necessária uma palavra-passe [palavra-passe](https://bitwarden.com/help/send-privacy/#send-passwords) juntamente com o link de envio. O Bitwarden Send também inclui [eliminação automática](https://bitwarden.com/help/send-lifespan). É necessário o [Plano Premium](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) para poder partilhar ficheiros. O plano gratuito apenas permite a partilha de texto. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![Logótipo 1Password](assets/img/password-management/1password.svg){ align=right } -**1Password** é um gestor de palavras-passe com um forte foco na segurança e facilidade de utilização, que lhe permite guardar palavras-passe, cartões de crédito, licenças de software e qualquer outra informação sensível num cofre digital seguro. Seu cofre é hospedado nos servidores do 1Password por uma [taxa mensal] (https://1password.com/sign-up/). O 1Password é [audited](https://support.1password.com/security-assessments/) regularmente e oferece um apoio ao cliente excecional. O 1Password é de código fechado; no entanto, a segurança do produto está documentada de forma exaustiva no seu [livro branco de segurança] (https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** é um gestor de palavras-passe com um forte foco na segurança e facilidade de utilização, que lhe permite guardar palavras-passe, cartões de crédito, licenças de software e qualquer outra informação sensível num cofre digital seguro. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. O 1Password é de código fechado; no entanto, a segurança do produto está documentada de forma exaustiva no seu [livro branco de segurança] (https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ Uma vantagem do 1Password sobre o Bitwarden é o seu suporte de primeira classe Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ O **KeePassXC** é um fork comunitário do KeePassX, um port nativo multi-plataf [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ O KeePassXC armazena os seus dados de exportação em formato [CSV](https://en.w O **KeePassDX** é um gestor de palavras-passe leve para Android, que permite editar dados encriptados num único ficheiro, no formato KeePass, e preencher os formulários de forma segura. O [Contributor Pro] (https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) permite desbloquear conteúdos de personalização e funcionalidades de protocolo não normalizadas, e, mais importante, ajuda e incentiva o desenvolvimento. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ O **KeePassDX** é um gestor de palavras-passe leve para Android, que permite ed ![Logótipo Strongbox](assets/img/password-management/strongbox.svg){ align=right } -O **Strongbox** é um gestor de palavras-passe nativo e de código aberto para iOS e macOS. Suportando os formatos KeePass e Password Safe, o Strongbox pode ser utilizado em conjunto com outros gestores de palavras-passe, como o KeePassXC, em plataformas que não sejam da Apple. Ao empregar um [modelo freemium] (https://strongboxsafe.com/pricing/), a Strongbox inclui a maioria das funcionalidades no plano gratuito, estando as funcionalidades orientadas para a conveniência [features](https://strongboxsafe.com/comparison/) - como a autenticação biométrica - disponíveis através de subscrição ou licença perpétua. +O **Strongbox** é um gestor de palavras-passe nativo e de código aberto para iOS e macOS. Suportando os formatos KeePass e Password Safe, o Strongbox pode ser utilizado em conjunto com outros gestores de palavras-passe, como o KeePassXC, em plataformas que não sejam da Apple. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Além disso, é oferecida uma versão offline: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). Esta versão é simplificada e procura reduzir a superfície de ataque. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Esta versão é simplificada e procura reduzir a superfície de ataque. ### Linha de comando @@ -356,7 +356,7 @@ Estes produtos são gestores de palavras-passe minimalistas, que podem ser utili **gopass** é um gestor de palavras-passe para a linha de comandos, escrito em Go. Funciona em todos os principais sistemas operativos para desktop e servidor (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ Estes produtos são gestores de palavras-passe minimalistas, que podem ser utili
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/pt/photo-management.md b/i18n/pt/photo-management.md index e47f8717..ae816c56 100644 --- a/i18n/pt/photo-management.md +++ b/i18n/pt/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/pt/productivity.md b/i18n/pt/productivity.md index fe533ff1..e242df9c 100644 --- a/i18n/pt/productivity.md +++ b/i18n/pt/productivity.md @@ -19,9 +19,9 @@ O **Nextcloud** é um conjunto de software cliente-servidor gratuito e de códig [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,10 +53,10 @@ Não recomendamos a utilização da [E2EE App](https://apps.nextcloud.com/apps/e O **CryptPad** é uma alternativa privada por design às ferramentas de escritório populares. Todos os conteúdos deste serviço Web são encriptados de ponta a ponta e podem ser facilmente partilhados com outros utilizadores. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Olítica de Privacidade" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentação} -[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Código-fonte" } -[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribuir } +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute }
@@ -99,20 +99,20 @@ Os nossos melhores critérios representam o que gostaríamos de ver num projeto O **LibreOffice** é uma suíte de escritório gratuita e de código aberto com uma vasta funcionalidade. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ O **LibreOffice** é uma suíte de escritório gratuita e de código aberto com **OnlyOffice** é uma suíte de escritório gratuita e de código aberto, baseada na nuvem, com uma vasta funcionalidade, incluindo a integração com a Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ O **LibreOffice** é uma suíte de escritório gratuita e de código aberto com - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,9 +176,9 @@ Em geral, definimos suites de escritório como aplicações que podem razoavelme O **PrivateBin** é um pastebin online minimalista e de código aberto, e cujo servidor não tem conhecimento dos dados colados. Os dados são encriptados/desencriptados no browser utilizando AES de 256 bits. É a versão melhorada do ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Instâncias Públicas"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentação} -[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Código-fonte" } +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
diff --git a/i18n/pt/real-time-communication.md b/i18n/pt/real-time-communication.md index 4e52d0d4..a979b0d8 100644 --- a/i18n/pt/real-time-communication.md +++ b/i18n/pt/real-time-communication.md @@ -22,18 +22,18 @@ Estas aplicações de mensagens são ótimas para proteger as suas comunicaçõe **Signal** é uma aplicação para dispositivos móveis desenvolvida pela Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Os perfis pessoais também são encriptados e apenas são partilhados com os contactos com quem conversa. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. O Signal tem metadados mínimos quando se ativa o[Sealed Sender](https://signal.org/blog/sealed-sender/). O endereço do remetente é encriptado juntamente com o corpo da mensagem e apenas o endereço do destinatário é visível para o servidor. O Sealed Sender só está ativado para as pessoas da sua lista de contactos, mas pode ser ativado para todos os destinatários, com o risco acrescido de poder receber spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Os perfis pessoais também são encriptados e apenas são partilhados com os contactos com quem conversa. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. O endereço do remetente é encriptado juntamente com o corpo da mensagem e apenas o endereço do destinatário é visível para o servidor. O Sealed Sender só está ativado para as pessoas da sua lista de contactos, mas pode ser ativado para todos os destinatários, com o risco acrescido de poder receber spam. -O protocolo foi objeto de uma [auditoria](https://eprint.iacr.org/2016/1013.pdf) independente em 2016. A especificação do protocolo Signal pode ser encontrada na sua [documentação](https://signal.org/docs/). +O protocolo foi objeto de uma [auditoria](https://eprint.iacr.org/2016/1013.pdf) independente em 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). Temos algumas dicas adicionais sobre como configurar e fortalecer a sua instalação do Signal: -[Configuração e robustecimento do Signal :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Configuração e robustecimento do Signal :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ O **SimpleX** Chat é uma aplicação descentralizada de mensagens instantâneas Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -96,22 +96,22 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and
-![Logótipo Briar](assets/img/messengers/briar.svg){ align=right } +![Briar logo](assets/img/messengers/briar.svg){ align=right } -O **Briar** é uma aplicação de mensagens instantâneas encriptada que [connects](https://briarproject.org/how-it-works/) a outros clientes, usando a rede Tor. O Briar pode ligar-se através de Wi-Fi ou Bluetooth. O modo de rede local do Briar pode ser útil, quando não estiver garantida a disponibilidade da Internet. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. O Briar pode ligar-se através de Wi-Fi ou Bluetooth. O modo de rede local do Briar pode ser útil, quando não estiver garantida a disponibilidade da Internet. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ O **Briar** é uma aplicação de mensagens instantâneas encriptada que [connec Para adicionar um contacto no Briar, é necessário que você e o contacto se adicionem mutuamente. Pode trocar links `briar://` ou digitalizar o código QR de um contacto, se este estiver próximo. -O software cliente foi [auditado de forma independente](https://briarproject.org/news/2017-beta-released-security-audit/), e o protocolo de encaminhamento anónimo utiliza a rede Tor, que também foi auditada. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. O Briar publicou na íntegra a sua [especificação](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. As mensagens e os ficheiros partilhados em salas privadas (que requerem um convite) são, por defeito, E2EE, tal como as chamadas de voz e de vídeo, de um para um. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ As mensagens e os ficheiros partilhados em salas privadas (que requerem um convi Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ As chamadas de voz e vídeo em grupo [não são](https://github.com/vector-im/el The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -O protocolo foi objeto de uma [auditoria independente](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) em 2016. A especificação do protocolo Matrix pode ser encontrada na sua [documentação](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +O protocolo foi objeto de uma [auditoria independente](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) em 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ O protocolo foi objeto de uma [auditoria independente](https://matrix.org/blog/2 **Session** é uma aplicação descentralizada de mensagens instantâneas com foco em comunicações privadas, seguras e anónimas. A sessão oferece suporte para mensagens diretas, conversas de grupo e chamadas de voz. -O Session utiliza a rede descentralizada [Oxen Service Node Network] (https://oxen.io/) para armazenar e encaminhar mensagens. Cada mensagem encriptada é encaminhada através de três nós na Oxen Service Node Network, tornando virtualmente impossível que os nós compilem informação significativa sobre aqueles que utilizam a rede. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Cada mensagem encriptada é encaminhada através de três nós na Oxen Service Node Network, tornando virtualmente impossível que os nós compilem informação significativa sobre aqueles que utilizam a rede. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/pt/router.md b/i18n/pt/router.md index 04067444..fd5b32ea 100644 --- a/i18n/pt/router.md +++ b/i18n/pt/router.md @@ -35,10 +35,10 @@ Pode consultar a [tabela de hardware](https://openwrt.org/toh/start) do OpenWrt **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. O OPNsense é normalmente implementado como firewall de perímetro, router, ponto de acesso sem fio, servidor DHCP, servidor DNS e ponto terminal de VPN. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentação} -[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Código-fonte" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribuir } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/pt/search-engines.md b/i18n/pt/search-engines.md index 1ec97e07..016be3f0 100644 --- a/i18n/pt/search-engines.md +++ b/i18n/pt/search-engines.md @@ -10,7 +10,7 @@ Utilize um motor de busca que não crie um perfil de marketing com base nas suas As recomendações aqui apresentadas baseiam-se nos méritos da política de privacidade de cada serviço. Não existe **qualquer garantia** de que estas políticas de privacidade sejam respeitadas. -Considere a utilização de uma [VPN](vpn.md) ou o [Tor](https://www.torproject.org/), se o seu modelo de ameaça exigir a ocultação do seu endereço IP do motor de busca. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,10 +24,10 @@ O Brave Search inclui funcionalidades exclusivas, como as Discussões, que desta Recomendamos que desative a opção [Métricas de utilização anónimas] (https://search.brave.com/help/usage-metrics), nas definições, uma vez que está ativada por defeito. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } -[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Serviço Onion" } -[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Política de Privacidade" } -[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentação} +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ O Brave Search está sediado nos Estados Unidos. A sua [ política de privacidad ![Logótipo DuckDuckGo](assets/img/search-engines/duckduckgo.svg){ align=right } -O **DuckDuckGo** é um dos motores de pesquisa mais comuns, no que toca à privacidade. De entre as suas notáveis funcionalidades de pesquisa, destque para os [bangs](https://duckduckgo.com/bang) e muitas [respostas instantâneas] (https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). Para fornecer os resultado, o motor de busca baseia-se numa API comercial do Bing, embora utilize diversas [outras fontes] (https://help.duckduckgo.com/results/sources/) para respostas instantâneas e outros resultados não primários. +O **DuckDuckGo** é um dos motores de pesquisa mais comuns, no que toca à privacidade. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. O DuckDuckGo é o motor de busca predefinido do browser Tor e é uma das poucas opções disponíveis no browser Safari da Apple. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } -[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Serviço Onion" } -[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Política de Privacidade" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentação} +[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation} @@ -56,7 +56,7 @@ O DuckDuckGo é o motor de busca predefinido do browser Tor e é uma das poucas O DuckDuckGo está sediado nos Estados Unidos. A sua [política de privacidade](https://duckduckgo.com/privacy) faz saber que **são feitos** registos das suas pesquisas para fins de melhoria do produto, mas não o seu endereço IP ou qualquer outra informação de identificação pessoal. -O DuckDuckGo oferece duas [outras versões](https://help.duckduckgo.com/features/non-javascript/) do seu motor de pesquisa, e ambas não requerem JavaScript. No entanto, estas versões carecem de funcionalidades. Estas versões também podem ser utilizadas em conjunto com o seu endereço [onion no Tor](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/), acrescentando [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) ou [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) para a respectiva versão. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. No entanto, estas versões carecem de funcionalidades. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,8 +67,8 @@ O DuckDuckGo oferece duas [outras versões](https://help.duckduckgo.com/features **SearXNG** é um motor de meta-pesquisa de código aberto, auto-hospedado, que agrega os resultados de outros motores de busca, sem armazenar qualquer informação. É um fork de [SearX](https://github.com/searx/searx) com atualizações regulares. [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Instâncias públicas"} -[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Código-fonte" } +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} +[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" } @@ -87,11 +87,11 @@ Quando estiver a utilizar uma instância do SearXNG, certifique-se de que lê a ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. Uma das características únicas do Startpage é a [Visualização anónima] (https://www.startpage.com/en/anonymous-view/), tentando normalizar a atividade do utilizador para que a sua identificação exclusiva seja dificultada. A funcionalidade pode ser útil para ocultar [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) propriedades da rede e do browser. Ao contrário do que o nome sugere, esta funcionalidade não deve ser utilizada para garantir o anonimato. Se procura anonimato, utilize o [Browser Tor] (tor.md#tor-browser). +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Ao contrário do que o nome sugere, esta funcionalidade não deve ser utilizada para garantir o anonimato. Se procura anonimato, utilize o [Browser Tor] (tor.md#tor-browser). -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Política de Privacidade" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentação} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} @@ -104,9 +104,9 @@ O Startpage limita regularmente o acesso a determinados endereços IP, tais como -O Startpage está sediado nos Países Baixos. De acordo com a sua [política de privacidade](https://www.startpage.com/en/privacy-policy/), são registados detalhes como: sistema operativo, tipo de browser e idioma. Não registam o seu endereço IP, pesquisas ou outras informações de identificação pessoal. +O Startpage está sediado nos Países Baixos. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. Não registam o seu endereço IP, pesquisas ou outras informações de identificação pessoal. -O acionista maioritário do Startpage é a System1, uma empresa marketing tecnológico. Não acreditamos que isso constitua um problema, uma vez que têm uma [ política de privacidade](https://system1.com/terms/privacy-policy) separada. A equipa do Privacy Guides contactou o Startpage [em 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) para esclarecer preocupações suscitadas pelo investimento considerável da System1 no serviço. Ficámos satisfeitos com as respostas que recebemos. +O acionista maioritário do Startpage é a System1, uma empresa marketing tecnológico. Não acreditamos que isso constitua um problema, uma vez que têm uma [ política de privacidade](https://system1.com/terms/privacy-policy) separada. The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. Ficámos satisfeitos com as respostas que recebemos. ## Critérios diff --git a/i18n/pt/tools.md b/i18n/pt/tools.md index b28a48b0..5e711a60 100644 --- a/i18n/pt/tools.md +++ b/i18n/pt/tools.md @@ -9,7 +9,7 @@ description: O Privacy Guides é o site mais transparente e fiável para encontr Se estiver à procura de uma solução específica para algo, estas são as ferramentas de hardware e software que recomendamos, numa variedade de categorias. As nossas ferramentas de privacidade recomendadas são escolhidas principalmente com base em características de segurança, com ênfase adicional em ferramentas descentralizadas e de código aberto. São aplicáveis a uma variedade de modelos de ameaças, desde a proteção contra programas globais de vigilância em massa efetuada por grandes empresas tecnológicas até à atenuação de ataques, mas só o utilizador poderá determinar o que melhor se adequa às suas necessidades. -Se necessitar de ajuda para descobrir as melhores ferramentas de privacidade e programas alternativos para as suas necessidades, inicie uma discussão no nosso [fórum](https://discuss.privacyguides.net/) ou na nossa comunidade [Matrix](https://matrix.to/#/#privacyguides:matrix.org)! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! Para obter mais detalhes sobre cada projeto, o motivo pelo qual foi escolhido e dicas ou truques adicionais que recomendamos, clique na ligação "Saiba mais" em cada secção, ou clique na própria recomendação para consultar essa secção específica da página. @@ -89,7 +89,7 @@ Para obter mais detalhes sobre cada projeto, o motivo pelo qual foi escolhido e #### Fornecedores de DNS -Com base em vários critérios, [recomendamos](dns.md#recommended-providers) uma série de servidores DNS encriptados, como o [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) e o [Quad9](https://quad9.net/), entre outros. Recomendamos que leia as nossas páginas sobre DNS antes de escolher um fornecedor. Em muitos casos, a utilização de um fornecedor de DNS alternativo não é recomendada. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. Recomendamos que leia as nossas páginas sobre DNS antes de escolher um fornecedor. Em muitos casos, a utilização de um fornecedor de DNS alternativo não é recomendada. [Saiba mais :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/pt/tor.md b/i18n/pt/tor.md index ada40cd9..a73fbd6b 100644 --- a/i18n/pt/tor.md +++ b/i18n/pt/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Navegador Tor image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://pt.wikipedia.org/wiki/Tor_(rede_de_anonimato) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: A rede **Tor** é um grupo de servidores operados por voluntários que pode utilizar gratuitamente para melhorar a sua privacidade e segurança na Internet. Os indivíduos e as organizações também podem partilhar informações através da rede Tor com os serviços ocultos ".onion", sem comprometer a sua privacidade. O facto do tráfego do Tor ser difícil de bloquear e rastrear, faz dele uma ferramenta eficaz para contornar a censura. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } O Tor encaminha o seu tráfego de Internet através destes servidores operados por voluntários, em vez de estabelecer uma ligação direta ao site que está a tentar visitar. A origem do tráfego fica assim ofuscada e nenhum servidor ao longo do caminho da ligação pode saber o caminho completo, o que significa que mesmo os servidores que utiliza para se ligar não conseguem quebrar o seu anonimato. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b O **Browser Tor** é a escolha certa se precisar de anonimato, uma vez que lhe dá acesso à rede Tor e às sua bridges, e inclui definições por defeito e extensões que são automaticamente configuradas com níveis de segurança predefinidos: *Standard*, *Seguro* e *Máxima Segurança*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ O **Browser Tor** é a escolha certa se precisar de anonimato, uma vez que lhe d -O Tor foi concebido para evitar a recolha de impressões digitais, ou a sua identificação com base na configuração. Por esse motivo, é imperativo que **não** modifique o browser para além dos níveis de segurança predefinidos [](https://tb-manual.torproject.org/security-settings/). +O Tor foi concebido para evitar a recolha de impressões digitais, ou a sua identificação com base na configuração. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** é uma VPN Tor gratuita para dispositivos móveis que encaminha o tráfego de qualquer aplicação no seu dispositivo através da rede Tor. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) @@ -140,7 +140,7 @@ O Orbot está frequentemente desatualizado no [repositório F-Droid](https://gua ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -170,10 +170,10 @@ O Orbot está frequentemente desatualizado no [repositório F-Droid](https://gua As pessoas censuradas podem utilizar proxies Snowflake para se ligarem à rede Tor. Snowflake é uma ótima maneira de contribuir para a rede, mesmo que não tenha o conhecimento técnico para executar um retransmissor ou ponte Tor. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -187,4 +187,4 @@ O Snowflake não aumenta a sua privacidade de forma alguma, nem é utilizado par Executar um proxy Snowflake é de baixo risco, ainda mais do que executar um Relay Tor ou uma ponte, que já não são empreendimentos particularmente arriscados. No entanto, continua a fazer proxy do tráfego através da sua rede, o que pode ter algum impacto, especialmente se a sua rede tiver uma largura de banda limitada. Certifique-se de que compreende [como funciona o Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) antes de decidir se pretende executar um proxy. -[^1]: A definição `IsolateDestAddr` é discutida na [lista de e-mails do Tor](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) e [Documentação do Stream Isolation de Whonix](https://www.whonix.org/wiki/Stream_Isolation), onde ambos os projetos sugerem que normalmente não é uma boa abordagem para a maioria das pessoas. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/pt/vpn.md b/i18n/pt/vpn.md index 0e097263..0c17e9a0 100644 --- a/i18n/pt/vpn.md +++ b/i18n/pt/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. Se procura mais **segurança**, deve sempre garantir que se liga a sites que utilizem ligações HTTPS. Uma VPN não substitui as boas práticas de segurança. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Os nossos fornecedores recomendados usam encriptação, aceitam Monero, suportam O **Proton VPN** é um forte concorrente no espaço VPN, e está em funcionamento desde 2016. A Proton AG está sediada na Suíça e oferece uma opção gratuita com limitações, bem como uma opção premium com mais funcionalidades. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ Também achamos que é melhor para a segurança das chaves privadas do fornecedo #### :material-check:{ .pg-green } Auditado de forma independente -Em janeiro de 2020, o Proton VPN foi submetido a uma auditoria independente realizada pela SEC Consult. A SEC Consult encontrou algumas vulnerabilidades de risco médio e baixo nas aplicações Windows, Android e iOS do Proton VPN, todas elas "devidamente corrigidas" pelo Proton VPN antes da publicação dos relatórios. Nenhum dos problemas identificados permitia a um atacante aceder remotamente ao seu dispositivo ou tráfego. Pode consultar os relatórios individuais por plataforma em [protonvpn.com](https://protonvpn.com/blog/open-source/). Em abril de 2022, o Proton VPN foi submetido a [outra auditoria](https://protonvpn.com/blog/no-logs-audit/), sendo o relatório [produzido pela Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). Uma declaração de conformidade [](https://proton.me/blog/security-audit-all-proton-apps) foi emitida para as aplicações Proton VPN, em 9 de novembro de 2021, pela [Securitum](https://research.securitum.com). +Em janeiro de 2020, o Proton VPN foi submetido a uma auditoria independente realizada pela SEC Consult. A SEC Consult encontrou algumas vulnerabilidades de risco médio e baixo nas aplicações Windows, Android e iOS do Proton VPN, todas elas "devidamente corrigidas" pelo Proton VPN antes da publicação dos relatórios. Nenhum dos problemas identificados permitia a um atacante aceder remotamente ao seu dispositivo ou tráfego. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). Uma declaração de conformidade [](https://proton.me/blog/security-audit-all-proton-apps) foi emitida para as aplicações Proton VPN, em 9 de novembro de 2021, pela [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Clientes de código aberto @@ -84,31 +84,31 @@ O Proton VPN, além de aceitar cartões de crédito/débito, PayPal, e [Bitcoin] #### :material-check:{ .pg-green } Suporte WireGuard -O Proton VPN suporta maioritariamente o protocolo WireGuard®. [O WireGuard](https://www.wireguard.com) é um protocolo mais recente que utiliza [encriptação de ponta](https://www.wireguard.com/protocol/). Além disso, o WireGuard aposta na simplicidade e no desempenho. +O Proton VPN suporta maioritariamente o protocolo WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Além disso, o WireGuard aposta na simplicidade e no desempenho. -O Proton VPN [recomenda](https://protonvpn.com/blog/wireguard/) a utilização do WireGuard com o seu serviço. Nas aplicações Windows, macOS, iOS, Android, ChromeOS e Android TV do Proton VPN, o WireGuard é o protocolo predefinido; no entanto, o [suporte](https://protonvpn.com/support/how-to-change-vpn-protocols/) para o protocolo não está presente na sua aplicação Linux. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Encaminhamento de porta remota -Atualmente, o Proton VPN apenas suporta o reencaminhamento efémero de porta remota [](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, com tempos de reserva (lease) de 60 segundos. A aplicação para Windows oferece uma opção de acesso fácil, enquanto noutros sistemas operativos terá de executar o seu próprio cliente [NAT-PMP](https://protonvpn.com/support/port-forwarding-manual-setup/). As aplicações torrent suportam frequentemente NAT-PMP de forma nativa. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). As aplicações torrent suportam frequentemente NAT-PMP de forma nativa. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Clientes para dispositivos móveis -Para além de fornecer ficheiros de configuração OpenVPN padrão, o Proton VPN tem clientes para dispositivos móveis na [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US) e [GitHub](https://github.com/ProtonVPN/android-app/releases), permitindo ligações fáceis aos seus servidores. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Funcionalidade adicional -Os clientes Proton VPN suportam a autenticação de dois fatores em todas as plataformas, exceto no Linux, de momento. O Proton VPN tem os seus próprios servidores e centros de dados na Suíça, Islândia e Suécia. They offer content blocking and known-malware blocking with their DNS service. Adicionalmente, o Proton VPN também oferece servidores "Tor" que lhe permitem ligar-se facilmente a sites onion. Contudo, para esse feito, recomendamos vivamente a utilização do [, browser Tor oficial](https://www.torproject.org/). +Os clientes Proton VPN suportam a autenticação de dois fatores em todas as plataformas, exceto no Linux, de momento. O Proton VPN tem os seus próprios servidores e centros de dados na Suíça, Islândia e Suécia. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } A funcionalidade Killswitch não funciona nos Macs baseados em Intel -Falhas do sistema [podem ocorrer](https://protonvpn.com/support/macos-t2-chip-kill-switch/) em Macs baseados em Intel quando se utiliza o VPN killswitch. Se precisar desta funcionalidade e estiver a utilizar um Mac com chipset Intel, deve considerar a utilização de outro serviço VPN. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. Se precisar desta funcionalidade e estiver a utilizar um Mac com chipset Intel, deve considerar a utilização de outro serviço VPN. ### IVPN @@ -118,9 +118,9 @@ Falhas do sistema [podem ocorrer](https://protonvpn.com/support/macos-t2-chip-ki O **IVPN** é outro fornecedor de VPN premium, e está em funcionamento desde 2009. A IVPN tem sede em Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ O **IVPN** é outro fornecedor de VPN premium, e está em funcionamento desde 20 - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ O **IVPN** é outro fornecedor de VPN premium, e está em funcionamento desde 20 #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Isto deve-se ao facto do percurso até ao destino ser mais curto (menos saltos). +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Isto deve-se ao facto do percurso até ao destino ser mais curto (menos saltos). { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ Também achamos que é melhor para a segurança das chaves privadas do fornecedo #### :material-check:{ .pg-green } Auditado de forma independente -O IVPN foi submetido a uma auditoria de não-registo [da Cure53](https://cure53.de/audit-report_ivpn.pdf), que concluiu da veracidade da alegação dessa política feita pelo IVPN. O IVPN também foi submetido a um teste abrangente de penetração, realizado pela [Cure53](https://cure53.de/summary-report_ivpn_2019.pdf), em janeiro de 2020. O IVPN também afirmou que planeia disponibilizar relatórios anuais [](https://www.ivpn.net/blog/independent-security-audit-concluded) no futuro. Foi realizada uma nova análise, [em abril de 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/), produzida pela Cure53, [que está disponível no seu site](https://cure53.de/pentest-report_IVPN_2022.pdf). +O IVPN foi submetido a uma auditoria de não-registo [da Cure53](https://cure53.de/audit-report_ivpn.pdf), que concluiu da veracidade da alegação dessa política feita pelo IVPN. O IVPN também foi submetido a um teste abrangente de penetração, realizado pela [Cure53](https://cure53.de/summary-report_ivpn_2019.pdf), em janeiro de 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Clientes de código aberto -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). O código-fonte pode ser obtido na sua página do [GitHub](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). O código-fonte pode ser obtido na sua página do [GitHub](https://github.com/ivpn). #### :material-check:{ .pg-green } Aceita dinheiro e Monero @@ -160,25 +160,25 @@ Além de aceitar cartões de crédito/débito e PayPal, o IVPN aceita Bitcoin, * #### :material-check:{ .pg-green } Suporte WireGuard -O IVPN suporta o protocolo WireGuard®. [O WireGuard](https://www.wireguard.com) é um protocolo mais recente que utiliza [encriptação de ponta](https://www.wireguard.com/protocol/). Além disso, o WireGuard aposta na simplicidade e no desempenho. +O IVPN suporta o protocolo WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Além disso, o WireGuard aposta na simplicidade e no desempenho. -O IVPN [recomenda](https://www.ivpn.net/wireguard/) a utilização do WireGuard com o seu serviço, motivo pelo qual é protocolo padrão em todas as suas aplicações. O IVPN também oferece um gerador de configuração do WireGuard para utilização com as aplicações oficiais do WireGuard [](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Encaminhamento de porta remota -A IVPN suportava anteriormente o reencaminhamento de portas, mas removeu a opção em [junho de 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). A falta desta funcionalidade pode ter um impacto negativo em certas aplicações, especialmente nas aplicações ponto-a-ponto, como os clientes de torrent. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). A falta desta funcionalidade pode ter um impacto negativo em certas aplicações, especialmente nas aplicações ponto-a-ponto, como os clientes de torrent. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Clientes para dispositivos móveis -Para além de fornecer ficheiros de configuração OpenVPN padrão, o IVPN tem clientes para dispositivos móveis na [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) e [GitHub](https://github.com/ivpn/android-app/releases), permitindo ligações fáceis aos seus servidores. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Funcionalidade adicional -Os clientes IVPN suportam autenticação de dois fatores (os clientes da Mullvad não suportam). O IVPN também fornece a funcionalidade "[AntiTracker](https://www.ivpn.net/antitracker)", que bloqueia redes de publicidade e rastreadores ao nível da rede. +Os clientes IVPN suportam autenticação de dois fatores (os clientes da Mullvad não suportam). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ O **Mullvad** é uma VPN rápida e económica, com grande foco na transparência [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ O **Mullvad** é uma VPN rápida e económica, com grande foco na transparência #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Isto deve-se ao facto do percurso até ao destino ser mais curto (menos saltos). +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Isto deve-se ao facto do percurso até ao destino ser mais curto (menos saltos). { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Os clientes VPN do Mullvad foram auditados pela Cure53 e pela Assured AB, com os > A Cure53 e a Assured AB estão satisfeitas com os resultados da auditoria e referem que o software deixa uma impressão globalmente positiva. Com uma equipa interna dedicada à segurança a trabalhar nas instalações do Mullvad, os auditores não têm dúvidas de que o projeto está no bom caminho, do ponto de vista da segurança. -Em 2020, foi anunciada uma segunda auditoria,[](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) cujo relatório final foi disponibilizado [no site da Cure53](https://cure53.de/pentest-report_mullvad_2020_v2.pdf): +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > Os resultados desta auditoria realizada em maio-junho de 2020, que visou as instalações do Mullvad, são bastante positivos. [...] O ecossistema global de aplicações utilizado pelo Mullvad deixa uma impressão sólida e estruturada. A estrutura geral da aplicação facilita a implementação de patches e correções de uma forma estruturada. Acima de tudo, o que foi detetado pela Cure53 mostra a importância de auditar e reavaliar constantemente os atuais vectores de fuga de informação, de modo a garantir sempre a privacidade dos utilizadores finais. Dito isto, o Mullvad faz um excelente trabalho ao proteger o utilizador final das fugas comuns de informações pessoais e dos riscos relacionados com a privacidade. -Em 2021, foi anunciada uma auditoria às infraestruturas [](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/), sendo relatório final da auditoria disponibilizado [no site da Cure53](https://cure53.de/pentest-report_mullvad_2021_v1.pdf). Foi encomendado outro relatório [em junho de 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/), que está disponível no site da [Assured](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Clientes de código aberto @@ -239,17 +239,17 @@ O Mullvad, para além de aceitar cartões de crédito/débito e PayPal, aceita B #### :material-check:{ .pg-green } Suporte WireGuard -O Mullvad suporta o protocolo WireGuard®. [O WireGuard](https://www.wireguard.com) é um protocolo mais recente que utiliza [encriptação de ponta](https://www.wireguard.com/protocol/). Além disso, o WireGuard aposta na simplicidade e no desempenho. +O Mullvad suporta o protocolo WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Além disso, o WireGuard aposta na simplicidade e no desempenho. -O Mullvad [recomenda](https://mullvad.net/en/help/why-wireguard/) a utilização do WireGuard com o seu serviço. É o protocolo predefinido ou único nas aplicações do Mullvad para Android, iOS, macOS e Linux. No caso do Windows, deve ser feita [uma ativação manual](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) do WireGuard. O Mullvad também oferece um gerador de configuração do WireGuard para utilização com as [aplicações oficiais do WireGuard](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } Suporte IPv6 -O Mullvad permite-lhe [aceder a serviços alojados em IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), ao contrário de outros fornecedores que bloqueiam as ligações IPv6. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Encaminhamento de porta remota -O Mullvad suportava anteriormente o reencaminhamento de portas, mas removeu a opção em [maio de 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). A falta desta funcionalidade pode ter um impacto negativo em certas aplicações, especialmente nas aplicações ponto-a-ponto, como os clientes de torrent. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). A falta desta funcionalidade pode ter um impacto negativo em certas aplicações, especialmente nas aplicações ponto-a-ponto, como os clientes de torrent. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Clientes para dispositivos móveis -O Mullvad disponibilizou [clientes na App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) e [clientes no Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn), ambos suportando uma interface de fácil utilização, que não necessita de uma configuração manual da conexão WireGuard. O cliente Android também está disponível na página do [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. O cliente Android também está disponível na página do [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Funcionalidade adicional -O Mullvad é muito transparente relativamente aos nós de rede que [possui ou aluga](https://mullvad.net/en/servers/). Utiliza [ShadowSocks](https://shadowsocks.org/) na sua configuração ShadowSocks + OpenVPN, tornando-os mais resistentes a firewalls com [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) que tentam bloquear VPNs. Supostamente, a [China tem de utilizar um método diferente para bloquear os servidores ShadowSocks](https://github.com/net4people/bbs/issues/22). O site do Mullvad também está acessível através do Tor em [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supostamente, a [China tem de utilizar um método diferente para bloquear os servidores ShadowSocks](https://github.com/net4people/bbs/issues/22). O site do Mullvad também está acessível através do Tor em [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Critérios diff --git a/i18n/ru/CODE_OF_CONDUCT.md b/i18n/ru/CODE_OF_CONDUCT.md index e68d40f6..5250c8f3 100644 --- a/i18n/ru/CODE_OF_CONDUCT.md +++ b/i18n/ru/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Ведите себя позитивно и конструктивно** diff --git a/i18n/ru/about/index.md b/i18n/ru/about/index.md index 5b49b3ee..6e88db82 100644 --- a/i18n/ru/about/index.md +++ b/i18n/ru/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** - это социально мотивированный сайт, предоставляющий [информацию](/kb) по защите безопасности и конфиденциальности ваших данных. Наша миссия - информировать общественность о ценности цифровой конфиденциальности и о глобальных правительственных инициативах, направленных на мониторинг вашей активности в интернете. Мы являемся некоммерческим коллективом, который полностью управляется [волонтёрами](https://discuss.privacyguides.net/g/team) и помогающими нам людьми. Наш сайт не содержит рекламы и не связан ни с одним из перечисленных провайдеров. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Домашняя страница } -[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Исходный код" } -[:octicons-heart-16:](donate.md){ .card-link title=Поддержать } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } +[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } +[:octicons-heart-16:](donate.md){ .card-link title=Contribute } > Чтобы найти [ориентированные на конфиденциальность альтернативы], посетите такие сайты, как Good Reports и **Privacy Guides**. На этих сайтах в различных категориях перечислены ориентированные на конфиденциальность приложения, в частности, включая провайдеров электронной почты (обычно платных), которые не принадлежат крупным технологическим компаниям. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) [Переведено с английского] +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > Если вы ищете новый VPN, вы можете найти скидочный код практически в любом подкасте. Если вы ищете **хороший** VPN, вам нужна помощь профессионалов. То же самое касается почтовых клиентов, браузеров, операционных систем и менеджеров паролей. Как узнать, какой из этих вариантов является лучшим, наиболее благоприятным для конфиденциальности? Для этого существует **Privacy Guides**, платформа, на которой несколько добровольцев изо дня в день ищут лучшие инструменты для обеспечения конфиденциальности в интернете. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Переведено с голландского] -Нас также упоминали: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt) и [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## История @@ -41,7 +41,7 @@ Privacy Guides был запущен в сентябре 2021 года как п В 2022 году мы завершили переход нашей основной структуры сайта с Jekyll на MkDocs, используя программное обеспечение для работы с документацией `mkdocs-material`. Это изменение значительно облегчило сторонним пользователям внесение вклада в наш сайт, поскольку вместо того, чтобы знать сложный синтаксис для эффективного написания постов, теперь вносить вклад стало так же просто, как писать стандартный документ в формате Markdown. -Кроме того, мы запустили новый форум для обсуждений на сайте [discuss.privacyguides.net](https://discuss.privacyguides.net/) в качестве платформы сообщества, где можно делиться идеями и задавать вопросы о нашей миссии. Это дополнит наше существующее сообщество на Matrix и заменит нашу предыдущую платформу GitHub Discussions, снизив нашу зависимость от проприетарных дискуссионных платформ. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. Это дополнит наше существующее сообщество на Matrix и заменит нашу предыдущую платформу GitHub Discussions, снизив нашу зависимость от проприетарных дискуссионных платформ. К настоящему времени в 2023 году мы запустили международные переводы нашего сайта на [французском](/fr/), [иврите](/he/) и [голландском](/nl/) языках, и еще больше языков на подходе, что стало возможным благодаря нашей замечательной команде переводчиков на [Crowdin](https://crowdin.com/project/privacyguides). Мы планируем продолжать выполнять нашу миссию по информированию и просвещению, а также искать пути более четкого освещения опасностей, связанных с недостаточной осведомленностью о конфиденциальности в современную цифровую эпоху, а также распространенности и вреда от нарушений безопасности в технологической отрасли. diff --git a/i18n/ru/about/notices.md b/i18n/ru/about/notices.md index 18617164..1a3c85c5 100644 --- a/i18n/ru/about/notices.md +++ b/i18n/ru/about/notices.md @@ -29,7 +29,7 @@ Privacy Guides is an open-source project contributed to under licenses that incl Это означает, что вы можете использовать контент из этого репозитория в личных целях на условиях, изложенных в тексте Creative Commons Attribution-NoDerivatives 4.0 International Public License. Вы можете делать это любым способом в рамках разумного, но не говорить, что Privacy Guides одобряет ваш проект или ваше использование материалов. Однако вы **не можете** использовать бренд PrivacyGuides в своем проекте без нашего специального разрешения. Торговые марки бренда PrivacyGuides включают в себя название "Privacy Guides" и логотип в виде щита. -Мы считаем, что логотипы и другие изображения в `assets`, полученные от сторонних лиц, являются либо публичным достоянием, либо находятся в **добросовестном использовании**. В двух словах, правовая доктрина [добросовестного использования](https://ru.wikipedia.org/wiki/Добросовестное_использование) разрешает использование изображений, защищенных авторским правом, для идентификации предмета в целях общественного обсуждения. Тем не менее, эти логотипы и другие изображения могут подпадать под действие законов о товарных знаках в тех или иных юрисдикциях. Перед использованием этого контента, пожалуйста, убедитесь, что он используется для идентификации юридического лица или организации, которой принадлежит товарный знак, и что у вас есть право использовать его в соответствии с законами, которые применяются в обстоятельствах вашего предполагаемого использования. *При копировании материалов с этого сайта вы несете полную ответственность за то, что не нарушаете авторские права.* +Мы считаем, что логотипы и другие изображения в `assets`, полученные от сторонних лиц, являются либо публичным достоянием, либо находятся в **добросовестном использовании**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. Тем не менее, эти логотипы и другие изображения могут подпадать под действие законов о товарных знаках в тех или иных юрисдикциях. Перед использованием этого контента, пожалуйста, убедитесь, что он используется для идентификации юридического лица или организации, которой принадлежит товарный знак, и что у вас есть право использовать его в соответствии с законами, которые применяются в обстоятельствах вашего предполагаемого использования. *При копировании материалов с этого сайта вы несете полную ответственность за то, что не нарушаете авторские права.* Когда вы вносите свой вклад на наш сайт, вы делаете это на основании вышеуказанных лицензий, и вы предоставляете Privacy Guides бессрочную, всемирную, неисключительную, передаваемую, безвозмездную, безотзывную лицензию с правом сублицензирования таких прав через несколько уровней сублицензиатов, на воспроизведение, изменение, отображение, исполнение и распространение вашего вклада в рамках нашего проекта. @@ -47,4 +47,4 @@ Privacy Guides is an open-source project contributed to under licenses that incl --- -*Часть этого описания была взята из [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) на GitHub. Этот ресурс и сама веб-страница выпущены под [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Часть этого описания была взята из [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) на GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/ru/about/privacytools.md b/i18n/ru/about/privacytools.md index 224741fe..d819fcc8 100644 --- a/i18n/ru/about/privacytools.md +++ b/i18n/ru/about/privacytools.md @@ -14,13 +14,13 @@ title: "FAQ по PrivacyTools" PrivacyTools был создан в 2015 году "BurungHantu", который хотел сделать информационный ресурс о конфиденциальности - полезные инструменты после разоблачений Сноудена. Сайт превратился в процветающий проект с открытым исходным кодом, [в котором участвовало множество участников](https://github.com/privacytools/privacytools.io/graphs/contributors), некоторые из которых в конечном итоге получили различные организационные обязанности, такие как управление такими онлайн-сервисами, как Matrix и Mastodon, управление и проверка изменений на сайте GitHub, поиск спонсоров для проекта, написание статей в блоге и управление платформами для работы с социальными сетями, такими как Twitter, и т.д. -Начиная с 2019 года, BurungHantu все больше и больше отдалялся от активного развития сайта и сообществ, и начал задерживать платежи, связанные с серверами, которыми мы управляли. Чтобы не заставлять нашего системного администратора оплачивать расходы на сервер из своего кармана, мы изменили способы пожертвований, указанные на сайте, с личных PayPal и криптовалютных счетов BurungHantu на новую страницу OpenCollective на сайте [31 октября 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). Это дало дополнительные преимущества: наши финансы стали полностью прозрачными, во что мы очень верим, и их можно было вычесть из налогов в США, поскольку они хранились в фонде Open Collective Foundation 501(c)3. Это изменение было единогласно одобрено командой и не оспаривалось. +Начиная с 2019 года, BurungHantu все больше и больше отдалялся от активного развития сайта и сообществ, и начал задерживать платежи, связанные с серверами, которыми мы управляли. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). Это дало дополнительные преимущества: наши финансы стали полностью прозрачными, во что мы очень верим, и их можно было вычесть из налогов в США, поскольку они хранились в фонде Open Collective Foundation 501(c)3. Это изменение было единогласно одобрено командой и не оспаривалось. ## Почему мы переехали В 2020 году отсутствие BurungHantu стало гораздо более заметным. В какой-то момент мы потребовали изменить серверы имен домена на серверы имен, контролируемые нашим системным администратором, чтобы избежать будущих сбоев, и это изменение не было завершено более чем за месяц после первоначального запроса. Он пропадал из чатов на Matrix несколько месяцев подряд, изредка появляясь, чтобы дать небольшой отзыв или пообещать быть более активным, а затем снова исчезал. -В октябре 2020 года системный администратор PrivacyTools (Jonah) [покинул](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) проект из-за этих трудностей, передав управление другому давнему участнику. Jonah работал почти со всеми сервисами PrivacyTools и выступал в качестве *де-факто* руководителя проекта в отсутствие BurungHantu, поэтому его уход стал значительным изменением в организации. В то время, в связи с этими значительными организационными изменениями, BurungHantu пообещал оставшейся команде вернуться и взять на себя управление проектом в дальнейшем. ==Команда PrivacyTools пыталась связаться и ним несколькими способами связи в течение последующих месяцев, но не получила никакого ответа.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah работал почти со всеми сервисами PrivacyTools и выступал в качестве *де-факто* руководителя проекта в отсутствие BurungHantu, поэтому его уход стал значительным изменением в организации. В то время, в связи с этими значительными организационными изменениями, BurungHantu пообещал оставшейся команде вернуться и взять на себя управление проектом в дальнейшем. ==Команда PrivacyTools пыталась связаться и ним несколькими способами связи в течение последующих месяцев, но не получила никакого ответа.== ## Надежность доменных имен @@ -34,25 +34,25 @@ PrivacyTools был создан в 2015 году "BurungHantu", который ## Призыв сообщества к действию -В конце июля 2021 года мы [сообщили](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) сообществу PrivacyTools о нашем намерении выбрать новое имя и продолжить проект на новом домене, который будет [выбран](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) 2 августа 2022 года. В итоге был выбран "Privacy Guides", при этом домен `privacyguides.org` уже принадлежал Jonah для сайд-проекта 2020 года, который так и остался неразработанным. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. В итоге был выбран "Privacy Guides", при этом домен `privacyguides.org` уже принадлежал Jonah для сайд-проекта 2020 года, который так и остался неразработанным. ## Контроль над r/privacytoolsIO -Одновременно с текущими проблемами с сайтом privacytools.io команда модераторов r/privacytoolsIO столкнулась с трудностями в управлении сабреддитом. Сабреддит всегда управлялся в основном независимо от развития сайта, но BurungHantu был основным модератором сабреддита, и он был единственным модератором, получившим привилегии "Полный контроль". u/trai_dep был единственным активным модератором в то время, и [разместил](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) запрос администраторам Reddit 28 июня 2021 года с просьбой предоставить ему должность основного модератора и полные привилегии контроля, чтобы внести необходимые изменения в сабреддит. +Одновременно с текущими проблемами с сайтом privacytools.io команда модераторов r/privacytoolsIO столкнулась с трудностями в управлении сабреддитом. Сабреддит всегда управлялся в основном независимо от развития сайта, но BurungHantu был основным модератором сабреддита, и он был единственным модератором, получившим привилегии "Полный контроль". u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit требует, чтобы у сабреддитов были активные модераторы. Если основной модератор неактивен в течение длительного периода времени (например, года), должность основного модератора может быть переназначена следующему по очереди модератору. Для того чтобы эта просьба была удовлетворена, BurungHantu должен был полностью отсутствовать на Reddit в течение длительного периода времени, что соответствовало его поведению на других платформах. > Если вы были удалены из роли модератора на сабреддите через запрос на Reddit, это произошло потому, что ваша недостаточная активность и отсутствие ответов на сообщения привели к тому, что сабреддит был переведен под управление r/redditrequest. > -> r/redditrequest - это способ Reddit убедиться, что сообщества имеют активных модераторов, и является частью [Кодекса поведения модераторов](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Начало перехода -14 сентября 2021 года мы [объявили](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) о начале перехода на новый домен: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] мы сочли необходимым сделать этот переход как можно раньше, чтобы люди поскорее узнали о нем. Это даст нам достаточно времени для перехода на доменное имя, которое в настоящее время перенаправляется на www.privacyguides.org, и, надеюсь, даст всем достаточно времени, чтобы заметить изменения, обновить закладки и веб-сайты и т.д. -Это изменение [повлекло за собой:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Перенаправление www.privacytools.io на [www.privacyguides.org](https://www.privacyguides.org). - Архивирование исходного кода на GitHub для сохранения нашей прошлой работы и трекера проблем, который мы продолжали использовать в течение нескольких месяцев будущего развития этого сайта. @@ -63,11 +63,11 @@ Reddit требует, чтобы у сабреддитов были актив ## Следующие события -Примерно через неделю после перехода BurungHantu вернулся в сеть впервые почти за год, однако никто из нашей команды не захотел возвращаться в PrivacyTools из-за его ненадежности. Вместо того чтобы извиниться за свое длительное отсутствие, он сразу перешел в наступление и позиционировал переход на Privacy Guides как нападение на него и его проект. Впоследствии он [удалил](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) многие из этих сообщений, когда сообщество указало на его отсутствие и отказ от проекта. +Примерно через неделю после перехода BurungHantu вернулся в сеть впервые почти за год, однако никто из нашей команды не захотел возвращаться в PrivacyTools из-за его ненадежности. Вместо того чтобы извиниться за свое длительное отсутствие, он сразу перешел в наступление и позиционировал переход на Privacy Guides как нападение на него и его проект. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. В этот момент BurungHantu заявил, что хочет продолжить работу над privacytools.io самостоятельно, и попросил убрать перенаправление с www.privacytools.io на [www.privacyguides.org](https://www.privacyguides.org). Мы согласились и попросили его оставить поддомены для Matrix, Mastodon и PeerTube активными, чтобы мы могли использовать их в качестве общественной службы для нашего сообщества, по крайней мере, в течение нескольких месяцев, чтобы пользователи этих платформ могли легко перейти на другие аккаунты. Из-за федеративного характера услуг, которые мы предоставляли, они были привязаны к определенным доменным именам, что делало миграцию очень сложной (а в некоторых случаях и невозможной). -К сожалению, поскольку контроль над сабреддитом r/privacytoolsIO не был возвращен BurungHantu по его требованию (дополнительная информация ниже), эти поддомены были [отключены](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) в начале октября, что положило конец любым возможностям миграции для пользователей, все еще использующих эти сервисы. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. После этого BurungHantu выдвинул ложные обвинения в том, что Jonah крадет пожертвования из проекта. С момента предполагаемого инцидента в BurungHantu прошло более года, но он так и не поставил никого в известность о нем до тех пор, пока не произошла миграция на Privacy Guides. Команда [и сообщество](https://twitter.com/TommyTran732/status/1526153536962281474)неоднократно просили BurungHantu предоставить доказательства и прокомментировать причину его молчания, но он этого так и не сделал. @@ -77,11 +77,11 @@ BurungHantu также опубликовал сообщение в [своём По состоянию на 25 сентября 2022 года мы видим, как планы BurungHantu воплощаются в жизнь на сайте privacytools.io, и именно по этой причине мы решили создать сегодня эту пояснительную страницу. Сайт, которым он управляет, похоже, является сильно SEO-оптимизированной версией сайта, который рекомендует инструменты в обмен на финансовую компенсацию. Совсем недавно из PrivacyTools были удалены IVPN и Mullvad, два VPN-провайдера, почти повсеместно [рекомендованные](../vpn.md) сообществом по защите конфиденциальности и известные своей позицией против партнерских программ. Ну а что взамен? NordVPN, Surfshark, ExpressVPN и hide.me; гигантские VPN-корпорации с ненадежными платформами и деловой практикой, печально известные своим агрессивным маркетингом и партнерскими программами. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Те из нас, кто действительно борется за конфиденциальность, не борются друг против друга и не получают советы от тех, кто больше заплатит. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Те из нас, кто действительно борется за конфиденциальность, не борются друг против друга и не получают советы от тех, кто больше заплатит. ## r/privacytoolsIO Сейчас -После запуска [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), для u/trai_dep было нецелесообразно продолжать модерировать оба сабреддита, и после того, как сообщество согласилось с переходом, r/privacytoolsIO стал [ограничен](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) от 1 ноября 2021 года: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] Рост этого сабреддита - результат огромных усилий команды PrivacyGuides.org на протяжении нескольких лет. А также усилий каждого из вас. > @@ -89,7 +89,7 @@ BurungHantu также опубликовал сообщение в [своём Сабреддиты не принадлежат никому, и, в особенности, владельцам брендов. Они принадлежат своим сообществам, и сообщество и его модераторы приняли решение поддержать переход на r/PrivacyGuides. -В последующие месяцы BurungHantu угрожал и умолял вернуть управление сабреддитом на его аккаунт в [нарушение](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) правил Reddit: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Ответные действия со стороны любого модератора в отношении запросов на удаление запрещены. @@ -107,12 +107,12 @@ BurungHantu также опубликовал сообщение в [своём Эта тема активно обсуждалась в наших сообществах в разных местах, и, вероятно, большинство людей, читающих эту страницу, уже знакомы с событиями, приведшими к переходу на Privacy Guides. Некоторые из наших предыдущих сообщений по этому вопросу могут содержать дополнительные подробности, которые мы опустили здесь для краткости. Для полноты картины они приведены ниже. -- [28 июня 2021 года запрос на контроль над r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [27 июля 2021 года объявление о наших намерениях переехать в блоге PrivacyTools, написанное командой](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [13 сентября 2021 года объявление о начале нашего перехода на Privacy Guides на r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [28 июня 2021 года запрос на контроль над r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [27 июля 2021 года объявление о наших намерениях переехать в блоге PrivacyTools, написанное командой](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [13 сентября 2021 года объявление о начале нашего перехода на Privacy Guides на r/privacytoolsIO](https://reddit.com/pnql46) - [17 сентября 2021 года объявление на OpenCollective от Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [30 сентября 2021 года в Твиттере подробно описано большинство событий, описанных на этой странице](https://twitter.com/privacy_guides/status/1443633412800225280) -- [1 октября 2021 года сообщение от u/dng99 о сбое поддомена](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [2 апреля 2022 года ответ u/dng99 на обвинения в блоге PrivacyTools](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [1 октября 2021 года сообщение от u/dng99 о сбое поддомена](https://reddit.com/comments/pymthv/comment/hexwrps) +- [2 апреля 2022 года ответ u/dng99 на обвинения в блоге PrivacyTools](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [16 мая 2022 года ответ от @TommyTran732 в Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [3 сентября 2022 года пост на форуме Techlore от @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/ru/advanced/communication-network-types.md b/i18n/ru/advanced/communication-network-types.md index 1a695a16..caa51184 100644 --- a/i18n/ru/advanced/communication-network-types.md +++ b/i18n/ru/advanced/communication-network-types.md @@ -28,7 +28,7 @@ description: Обзор нескольких сетевых архитектур - Может включать [ограниченный контроль или доступ](https://drewdevault.com/2018/08/08/Signal.html). Это может включать в себя такие вещи, как: - [Запрет на подключение сторонних клиентов](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) к централизованной сети, которые могли бы обеспечить большую персонализацию или лучший опыт. Это часто написано в условиях использования. - Плохая документация для сторонних разработчиков или ее полное отсутствие. -- [Руководство](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), политика конфиденциальности и операции сервиса могут легко измениться, если его контролирует одна организация, что впоследствии может поставить сервис под угрозу. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Самостоятельный хостинг требует усилий и знаний о том, как настроить сервис. ## Федеративные сети @@ -60,7 +60,7 @@ description: Обзор нескольких сетевых архитектур Мессенджеры P2P подключаются к [распределенной сети](https://en.wikipedia.org/wiki/Distributed_networking) узлов, чтобы передать сообщение получателю без стороннего сервера. -Клиенты (peers) обычно находят друг друга с помощью сети [распределенных вычислений](https://en.wikipedia.org/wiki/Distributed_computing). Примером могут служить [распределенные хэш-таблицы](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), используемые, например, в [торрентах](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) и [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System). Другой подход - сети, основанные на отдалении пользователей, где соединение устанавливается по WiFi или Bluetooth (например, Briar или протокол социальной сети [Scuttlebutt](https://www.scuttlebutt.nz)). +Клиенты (peers) обычно находят друг друга с помощью сети [распределенных вычислений](https://en.wikipedia.org/wiki/Distributed_computing). Примером могут служить [распределенные хэш-таблицы](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), используемые, например, в [торрентах](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) и [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System). Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Если клиент нашел маршрут к своему контакту с помощью любого из этих методов, между ними устанавливается прямое соединение. Хотя сообщения обычно шифруются, наблюдатель все равно может определить местоположение и личность отправителя и получателя. diff --git a/i18n/ru/advanced/dns-overview.md b/i18n/ru/advanced/dns-overview.md index 38cf6fc5..2f8155e9 100644 --- a/i18n/ru/advanced/dns-overview.md +++ b/i18n/ru/advanced/dns-overview.md @@ -18,7 +18,7 @@ DNS существует с [первых дней](https://en.wikipedia.org/wik ### Незашифрованный DNS -1. Используя [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (часть проекта [Wireshark](https://en.wikipedia.org/wiki/Wireshark)), мы можем отслеживать и записывать поток интернет-пакетов. Эта команда записывает пакеты, которые соответствуют заданным правилам: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. Эта команда записывает пакеты, которые соответствуют заданным правилам: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ DNS существует с [первых дней](https://en.wikipedia.org/wik nslookup privacyguides.org 8.8.8.8 ``` -3. Далее мы хотим [проанализировать](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) результаты: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ DNS существует с [первых дней](https://en.wikipedia.org/wik ### DNS через TLS (DoT) -[**DNS через TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) - это еще один метод шифрования DNS-коммуникаций, который определен в [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Впервые поддержка была реализована в Android 9, iOS 14 и в Linux в [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) в версии 237. В последние годы предпочтение в этой отрасли отошло от DoT к DoH, поскольку DoT является [комплексным протоколом](https://dnscrypt.info/faq/) и имеет различное соответствие RFC между существующими реализациями. DoT также работает на выделенном порту 853, который может быть легко заблокирован брандмауэрами. +[**DNS через TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) - это еще один метод шифрования DNS-коммуникаций, который определен в [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT также работает на выделенном порту 853, который может быть легко заблокирован брандмауэрами. ### DNS через HTTPS (DoH) @@ -106,7 +106,7 @@ DNS существует с [первых дней](https://en.wikipedia.org/wik wireshark -r /tmp/dns_doh.pcap ``` -Мы видим [установление соединения](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) и [TLS-рукопожатие](https://www.cloudflare.com/ru-ru/learning/ssl/what-happens-in-a-tls-handshake/), которое происходит при любом зашифрованном соединении. При просмотре последующих пакетов "данных приложения" ни один из них не содержит запрашиваемого нами домена или возвращаемого IP-адреса. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. При просмотре последующих пакетов "данных приложения" ни один из них не содержит запрашиваемого нами домена или возвращаемого IP-адреса. ## Почему мне **не следует** использовать зашифрованный DNS? @@ -158,9 +158,9 @@ DNS существует с [первых дней](https://en.wikipedia.org/wik tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -Это означает, что даже если мы используем серверы "зашифрованных DNS", домен, скорее всего, будет раскрыт через SNI. Протокол [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) предлагает функцию [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), которая предотвращает подобную утечку. +Это означает, что даже если мы используем серверы "зашифрованных DNS", домен, скорее всего, будет раскрыт через SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Правительства, в частности [Китая](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) и [России](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), либо уже [начали блокировать](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) его, либо выразили желание сделать это. Недавно Россия [начала блокировать иностранные сайты](https://github.com/net4people/bbs/issues/108), использующие стандарт [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3). Это связано с тем, что протокол [QUIC](https://en.wikipedia.org/wiki/QUIC), который является частью HTTP/3, требует, чтобы `ClientHello` также был зашифрован. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Недавно Россия [начала блокировать иностранные сайты](https://github.com/net4people/bbs/issues/108), использующие стандарт [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3). Это связано с тем, что протокол [QUIC](https://en.wikipedia.org/wiki/QUIC), который является частью HTTP/3, требует, чтобы `ClientHello` также был зашифрован. ### Протокол состояния сетевого сертификата (OCSP) @@ -289,7 +289,7 @@ graph TB DNSSEC реализует иерархическую политику цифровой подписи на всех уровнях DNS. Например, в случае поиска `privacyguides.org` корневой DNS-сервер подпишет ключ для сервера имен `.org`, а сервер имен `.org` затем подпишет ключ для авторитетного сервера имен от `privacyguides.org`. -Адаптировано из [Обзор расширений безопасности DNS (DNSSEC)](https://cloud.google.com/dns/docs/dnssec) от Google и [DNSSEC: введение](https://blog.cloudflare.com/dnssec-an-introduction/) от Cloudflare, оба лицензированы под [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## Что такое минимизация QNAME? diff --git a/i18n/ru/advanced/payments.md b/i18n/ru/advanced/payments.md index 3cff932f..8d593b18 100644 --- a/i18n/ru/advanced/payments.md +++ b/i18n/ru/advanced/payments.md @@ -9,7 +9,7 @@ icon: material/hand-coin На протяжении веков **наличные** функционировали как основная форма приватных платежей. Наличные деньги обладают превосходными свойствами конфиденциальности в большинстве случаев, широко принимаются в большинстве стран и являются **заменяемыми**, то есть они не уникальны и полностью взаимозаменяемы. -Законы об оплате наличными варьируются в зависимости от страны. В США требуется специальное раскрытие информации о денежных платежах свыше 10 000 долларов США в налоговую службу по [форме 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). Получающее предприятие обязано проверить имя, адрес, род занятий, дату рождения и номер социального страхования или другой ИНН получателя (за некоторыми исключениями). Более низкие лимиты без удостоверения личности, такие как $3 000 или меньше, существуют для обмена и передачи денег. Наличные деньги также содержат серийные номера. Они почти никогда не отслеживаются продавцами, но могут быть использованы правоохранительными органами в расследованиях. +Законы об оплате наличными варьируются в зависимости от страны. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). Получающее предприятие обязано проверить имя, адрес, род занятий, дату рождения и номер социального страхования или другой ИНН получателя (за некоторыми исключениями). Более низкие лимиты без удостоверения личности, такие как $3 000 или меньше, существуют для обмена и передачи денег. Наличные деньги также содержат серийные номера. Они почти никогда не отслеживаются продавцами, но могут быть использованы правоохранительными органами в расследованиях. Несмотря на это, как правило, это лучший вариант. @@ -60,7 +60,7 @@ icon: material/hand-coin - [Рекомендуемые криптовалюты :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Конфиденциальные монеты становятся объектом всё более пристального внимания со стороны государственных органов. В 2020 году [IRS опубликовала награду на сумму $625 000](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) за инструменты, которые могут нарушить конфиденциальность транзакций Bitcoin Lightning Network и/или Monero. В итоге они [заплатили двум компаниям](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis и Integra Fec) в общей сложности 1,25 миллиона долларов за инструменты, которые якобы позволяют это сделать (неизвестно, на какую криптовалютную сеть нацелены эти инструменты). Из-за секретности, окружающей подобные инструменты, ==ни один из этих методов отслеживания криптовалют не был независимо подтвержден.== Тем не менее, вполне вероятно, что инструменты, помогающие целенаправленным расследованиям транзакций с конфиденциальными монетами, существуют, и что частные монеты только преуспевают в предотвращении массовой слежки. +Конфиденциальные монеты становятся объектом всё более пристального внимания со стороны государственных органов. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. В итоге они [заплатили двум компаниям](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis и Integra Fec) в общей сложности 1,25 миллиона долларов за инструменты, которые якобы позволяют это сделать (неизвестно, на какую криптовалютную сеть нацелены эти инструменты). Из-за секретности, окружающей подобные инструменты, ==ни один из этих методов отслеживания криптовалют не был независимо подтвержден.== Тем не менее, вполне вероятно, что инструменты, помогающие целенаправленным расследованиям транзакций с конфиденциальными монетами, существуют, и что частные монеты только преуспевают в предотвращении массовой слежки. ### Другие монеты (Bitcoin, Ethereum и т.д.) @@ -76,7 +76,7 @@ icon: material/hand-coin ### Приобретение -Конфиденциальное приобретение [криптовалюты](../cryptocurrency.md), такой как Monero, может быть затруднительным. P2P-маркетплейсы, например [LocalMonero](https://localmonero.co/), платформа, облегчающая торговлю между людьми - один из вариантов, который можно использовать. Если использование биржи, требующей KYC, является для вас приемлемым риском при условии, что последующие транзакции не могут быть отслежены, гораздо проще приобрести Monero на такой бирже, как [Kraken](https://www.kraken.com/ru-ru/), или купить Bitcoin/Litecoin на бирже KYC, которые затем можно обменять на Monero. Затем вы можете вывести приобретенные Monero на свой собственный некастодиальный кошелек, чтобы с этого момента использовать их приватно. +Конфиденциальное приобретение [криптовалюты](../cryptocurrency.md), такой как Monero, может быть затруднительным. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Затем вы можете вывести приобретенные Monero на свой собственный некастодиальный кошелек, чтобы с этого момента использовать их приватно. Если вы пойдете по этому пути, убедитесь, что количество Monero и время покупки должны отличаться на платформе покупки и платформе, где вы собираетесь их тратить. Если вы купите $5000 Monero на бирже и сделаете покупку на $5000 Monero часом позже, эти действия могут быть соотнесены сторонним наблюдателем. Лучше купить большие суммы Monero по частям, а затем потратить их так же. Это поможет избежать отслеживания. diff --git a/i18n/ru/advanced/tor-overview.md b/i18n/ru/advanced/tor-overview.md index 1267ca75..62997614 100644 --- a/i18n/ru/advanced/tor-overview.md +++ b/i18n/ru/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: Первый ретранслятор в вашей цепи называется "входным" или "охранным". Это быстрый и стабильный ретранслятор, который остается первым в вашей цепи в течение 2-3 месяцев для защиты от известной атаки, нарушающей анонимность. Остальная часть цепи меняется с каждым новым посещаемым сайтом, и все вместе эти реле обеспечивают полную защиту конфиденциальности Tor. Более подробную информацию о том, как работают охранные ретрансляторы, можно найти в этом [посте в блоге](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) и [документе](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) о входных узлах. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: Первый ретранслятор в вашей цепи называется "входным" или "охранным". Это быстрый и стабильный ретранслятор, который остается первым в вашей цепи в течение 2-3 месяцев для защиты от известной атаки, нарушающей анонимность. Остальная часть цепи меняется с каждым новым посещаемым сайтом, и все вместе эти реле обеспечивают полную защиту конфиденциальности Tor. Более подробную информацию о том, как работают охранные ретрансляторы, можно найти в этом [посте в блоге](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) и [документе](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) о входных узлах. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Флаг ретраслятора: специальная (дис)квалификация реле для позиций цепи (например, "Guard", "Exit", "BadExit"), свойств цепи (например, "Fast", "Stable") или ролей (например, "Authority", "HSDir"), назначаемых владельцами директории и далее определенных в спецификации протокола директории. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/ru/android.md b/i18n/ru/android.md index 64476d09..33ed1cdd 100644 --- a/i18n/ru/android.md +++ b/i18n/ru/android.md @@ -83,9 +83,9 @@ schema: **Проект с открытым исходным кодом Android** - это мобильная операционная система с открытым исходным кодом под руководством Google, на которой работает большинство мобильных устройств в мире. Большинство телефонов, продаваемых с ОС Android, модифицированы для включения инвазивных интеграций и приложений, таких как Google Play Services, поэтому вы можете значительно улучшить свою конфиденциальность на мобильном устройстве, заменив стандартную ОС телефона на версию Android без этих инвазивных функций. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Домашняя страница} -[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Документация} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Исходный код" } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } +[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } Это операционные системы, устройства и приложения для Android, которые мы рекомендуем для обеспечения максимальной безопасности и конфиденциальности вашего мобильного устройства. Чтобы узнать больше об Android: @@ -113,27 +113,27 @@ schema: GrapheneOS обеспечивает дополнительное [улучшение безопасности](https://en.wikipedia.org/wiki/Hardening_(computing)) и улучшение конфиденциальности. Она имеет [улучшенный memory allocator] (https://github.com/GrapheneOS/hardened_malloc), сетевые и сенсорные разрешения и другие различные [функции безопасности] (https://grapheneos.org/features). GrapheneOS также поставляется с полными обновлениями прошивки и подписанными сборками, поэтому проверенная загрузка полностью поддерживается. -[:octicons-home-16: Домашняя страница](https://grapheneos.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Политика Конфиденциальности" } -[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Документация} -[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Исходный код" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } -GrapheneOS поддерживает [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), который запускает [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) полностью в песочнице, как любое другое обычное приложение. Это означает, что вы можете использовать преимущества большинства служб Google Play, таких как [push-уведомления](https://firebase.google.com/docs/cloud-messaging/), полностью контролируя их разрешения и доступ, а также ограничивая их определенным [рабочим профилем](os/android-overview.md#work-profile) или [профилем пользователя](os/android-overview.md#user-profiles) по вашему выбору. +GrapheneOS поддерживает [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), который запускает [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) полностью в песочнице, как любое другое обычное приложение. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Телефоны Google Pixel - единственные устройства, которые в настоящее время отвечают [требованиям аппаратной безопасности](https://grapheneos.org/faq#device-support) GrapheneOS. -[Почему мы рекомендуем GrapheneOS, а не CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Почему мы рекомендуем GrapheneOS, а не CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS
-![Логотип DivestOS](assets/img/android/divestos.svg){ align=right } +![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** - это лёгкий форк [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. Он имеет подписанные сборки, что делает возможным [verified boot](https://source.android.com/security/verifiedboot) на некоторых не-Pixel устройствах. [:octicons-home-16: Домашняя страница](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d
-DivestOS имеет автоматизированное ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [исправление](https://gitlab.com/divested-mobile/cve_checker) уязвимостей ядра, меньше проприетарных зависимостей и кастомный [hosts](https://divested.dev/index.php?page=dnsbl) файл. Его улучшенный WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), обеспечивает [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) для всех архитектур и [разделение состояния сети](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), а также получает out-of-bands обновления. DivestOS также включает патчи ядра от GrapheneOS и включает все доступные функции безопасности ядра с помощью [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). Все ядра новее версии 3.4 включают полную [очистку](https://lwn.net/Articles/334747/) страницы и все ~22 Clang-компилированных ядра активируют [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471). +DivestOS имеет автоматизированное ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [исправление](https://gitlab.com/divested-mobile/cve_checker) уязвимостей ядра, меньше проприетарных зависимостей и кастомный [hosts](https://divested.dev/index.php?page=dnsbl) файл. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS также включает патчи ядра от GrapheneOS и включает все доступные функции безопасности ядра с помощью [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -В DivestOS реализованы некоторые патчи для защиты системы, изначально разработанные для GrapheneOS. В DivestOS 16.0 и выше реализованы переключатели из GrapheneOS для [`интернета`](https://developer.android.com/training/basics/network-ops/connecting) и сенсоров, [улучшенный memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), и частичные патчи [bionic](https://en.wikipedia.org/wiki/Bionic_(software)). В версии 17.1 и выше GrapheneOS поддерживает полную [рандомизацию MAC-адресов](https://en.wikipedia.org/wiki/MAC_address#Randomization) для каждой сети, управление [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) и [таймеры](https://grapheneos.org/features) для автоматического выключения Wi-Fi/Bluetooth или перезагрузки телефона. +В DivestOS реализованы некоторые патчи для защиты системы, изначально разработанные для GrapheneOS. В DivestOS 16.0 и выше реализованы переключатели из GrapheneOS для [`интернета`](https://developer.android.com/training/basics/network-ops/connecting) и сенсоров, [улучшенный memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), и частичные патчи [bionic](https://en.wikipedia.org/wiki/Bionic_(software)). 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS использует F-Droid в качестве магазина приложений по умолчанию. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. Для других приложений по-прежнему действуют рекомендованные нами способы их получения. +DivestOS использует F-Droid в качестве магазина приложений по умолчанию. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. Для других приложений по-прежнему действуют рекомендованные нами способы их получения.

Предупреждение

@@ -166,13 +166,13 @@ DivestOS использует F-Droid в качестве магазина пр Избегайте покупки телефонов у операторов мобильной связи. У них часто **заблокирован загрузчик** и они не поддерживают [OEM разблокировку](https://source.android.com/devices/bootloader/locking_unlocking). Эти варианты телефонов не позволят вам установить какой-либо альтернативный дистрибутив Android. -Будьте **очень осторожны** при покупке подержанных телефонов в интернет-магазинах. Всегда проверяйте репутацию продавца. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). Также существует риск связывания вас с действиями предыдущего владельца устройства. +Будьте **очень осторожны** при покупке подержанных телефонов в интернет-магазинах. Всегда проверяйте репутацию продавца. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). Также существует риск связывания вас с действиями предыдущего владельца устройства. Еще несколько советов относительно устройств Android и совместимости с операционной системой: - Не покупайте устройства, срок службы которых истек или близок к концу, дополнительные обновления прошивки должны быть предоставлены производителем. - Не покупайте телефоны с предустановленной LineageOS или /e/ OS или любые телефоны Android без надлежащей поддержки [проверенной загрузки (Verified Boot)](https://source.android.com/security/verifiedboot?hl=ru) и обновлений прошивки. Вы также не сможете проверить, взломаны ли эти устройства. -- Короче, если устройство или дистрибутив Android не указаны в этом списке, вероятно, на это есть веская причина. Загляните на наш [форум](https://discuss.privacyguides.net/), чтобы узнать подробности! +- Короче, если устройство или дистрибутив Android не указаны в этом списке, вероятно, на это есть веская причина. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Beginning with the **Pixel 8** and **8 Pro**, Pixel devices receive a minimum of Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -Установить GrapheneOS на телефон Pixel легко с помощью [веб-установщика](https://grapheneos.org/install/web). Если вам неудобно делать это самостоятельно и вы готовы потратить немного больше денег, обратите внимание на [NitroPhone](https://shop.nitrokey.com/shop), поскольку они поставляются с предустановленной GrapheneOS от авторитетной компании [Nitrokey](https://www.nitrokey.com/about). +Установить GrapheneOS на телефон Pixel легко с помощью [веб-установщика](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. Еще несколько советов по покупке Google Pixel: @@ -218,16 +218,16 @@ Google Pixel phones use a TEE OS called Trusty which is [open source](https://so Shelter поддерживает блокировку поиска контактов между профилями и обмен файлами между профилями через файловый менеджер по умолчанию ([DocumentsUI](https://source.android.com/devices/architecture/modular-system/documentsui)). -[:octicons-repo-16: Репозиторий](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } -[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Исходный код" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Поддержать } +[:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } +[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Предупреждение

-Shelter рекомендуется вместо [Insular](https://secure-system.gitlab.io/Insular/) и [Island](https://github.com/oasisfeng/island), так как поддерживает [блокировку поиска контактов](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). Используя Shelter, вы полностью доверяете его разработчику, поскольку Shelter действует как [администратор устройства](https://developer.android.com/guide/topics/admin/device-admin) для создания рабочего профиля и имеет широкий доступ к данным, хранящимся в рабочем профиле. @@ -322,11 +322,11 @@ Shelter рекомендуется вместо [Insular](https://secure-system.
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -Магазин приложений GrapheneOS доступен на [GitHub](https://github.com/GrapheneOS/Apps/releases). Он поддерживается на Android 12 и выше и способен самостоятельно обновляться. В магазине приложений есть отдельные приложения, созданные в рамках проекта GrapheneOS, такие, как [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), и [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). Если вы ищете эти приложения, мы настоятельно рекомендуем вам приобрести их в магазине приложений GrapheneOS, а не в Play Store, так как приложения в их магазине подписаны собственной подписью проекта GrapheneOS, к которой Google не имеет доступа. +Магазин приложений GrapheneOS доступен на [GitHub](https://github.com/GrapheneOS/Apps/releases). Он поддерживается на Android 12 и выше и способен самостоятельно обновляться. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). Если вы ищете эти приложения, мы настоятельно рекомендуем вам приобрести их в магазине приложений GrapheneOS, а не в Play Store, так как приложения в их магазине подписаны собственной подписью проекта GrapheneOS, к которой Google не имеет доступа. ### Aurora Store @@ -338,7 +338,7 @@ Obtainium allows you to download APK installer files from a wide variety of sour **Aurora Store** - это клиент Google Play Store, которому для загрузки приложений не требуется учетная запись Google, службы Google Play Services или microG. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ For apps that are released on platforms like GitHub and GitLab, you may be able Если вы загружаете APK-файлы для установки вручную, вы можете проверить их подпись с помощью утилиты [`apksigner`](https://developer.android.com/studio/command-line/apksigner), которая является частью Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Установите [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Скачайте [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ For apps that are released on platforms like GitHub and GitLab, you may be able ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. Затем полученные хэши можно сравнить с другим источником. Некоторые разработчики, такие как Signal, [показывают хэши](https://signal.org/android/apk/) на своем сайте. +5. Затем полученные хэши можно сравнить с другим источником. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ For apps that are released on platforms like GitHub and GitLab, you may be able ![Логотип F-Droid](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. Возможность добавлять сторонние репозитории и не ограничиваться рамками Google стала причиной его популярности. F-Droid дополнительно имеет [воспроизводимые сборки](https://f-droid.org/en/docs/Reproducible_Builds/) для некоторых приложений и является приверженцем свободного программного обеспечения с открытым исходным кодом. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. Возможность добавлять сторонние репозитории и не ограничиваться рамками Google стала причиной его популярности. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Из-за их процесса сборки приложений, приложения в официальном репозитории F-Droid часто не получают обновлений. Владельцы F-Droid повторно используют идентификаторы пакетов при подписании приложений собственными ключами, что не является идеальным, поскольку это дает команде F-Droid абсолютное доверие. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. Репозиторий IzzyOnDroid берет сборки непосредственно с GitHub и является аналогом собственных репозиториев разработчиков. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. Хотя в этом есть смысл (поскольку цель этого конкретного репозитория - размещение приложений до того, как они будут приняты в основной репозиторий F-Droid), это может оставить вас с установленными приложениями, которые больше не получают обновлений. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. Репозиторий IzzyOnDroid берет сборки непосредственно с GitHub и является аналогом собственных репозиториев разработчиков. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. Хотя в этом есть смысл (поскольку цель этого конкретного репозитория - размещение приложений до того, как они будут приняты в основной репозиторий F-Droid), это может оставить вас с установленными приложениями, которые больше не получают обновлений. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-В некоторых редких случаях разработчик приложения будет распространять его только через F-Droid ([Gadgetbridge](https://gadgetbridge.org/) - один из примеров этого). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/ru/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/ru/assets/img/how-tor-works/tor-encryption-dark.svg index 19a8e16c..0f1e0716 100644 --- a/i18n/ru/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/ru/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Ваше - - устройство - - - - Отправка данных на сайт - - - - - Получение данных от сайта - - - - - Ваше - - устройство - - - - Вход - - - - - Середина - - - - - Выход - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Вход - - - - - Середина - - - - - Выход - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/ru/assets/img/how-tor-works/tor-encryption.svg b/i18n/ru/assets/img/how-tor-works/tor-encryption.svg index 724d569e..f954fb0f 100644 --- a/i18n/ru/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/ru/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Ваше - - устройство - - - - Отправление данных на сайт - - - - - Получение данных от сайта - - - - - Ваше - - устройство - - - - Вход - - - - - Середина - - - - - Выход - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Вход - - - - - Середина - - - - - Выход - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/ru/assets/img/how-tor-works/tor-path-dark.svg b/i18n/ru/assets/img/how-tor-works/tor-path-dark.svg index eeb7a335..77d895f4 100644 --- a/i18n/ru/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/ru/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Ваше - устройство - - - - Вход - - - - - Середина - - - - - Выход - - - - - PrivacyGuides.org - - - - - - - - + + + + Ваше + устройство + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/ru/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/ru/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index 86eb2c19..ce51beee 100644 --- a/i18n/ru/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/ru/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Ваше - - - Устройство - - - - - - Охранник - - - Ретранслятор - - - Ретранслятор - - - - - скрытый...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Встреча - - - Ретранслятор - - - - - Вход - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/ru/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/ru/assets/img/how-tor-works/tor-path-hidden-service.svg index 00f9f64a..8d008447 100644 --- a/i18n/ru/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/ru/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Ваше - - - Устройство - - - - - - Охранник - - - Ретранслятор - - - Ретранслятор - - - - - скрытый...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Встреча - - - Ретранслятор - - - - - Вход - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/ru/assets/img/how-tor-works/tor-path.svg b/i18n/ru/assets/img/how-tor-works/tor-path.svg index 9f241629..795c467a 100644 --- a/i18n/ru/assets/img/how-tor-works/tor-path.svg +++ b/i18n/ru/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + @@ -24,22 +24,22 @@ - Ваше - устройство + Ваше + устройство - Вход + Вход - Середина + Середина - Выход + Выход diff --git a/i18n/ru/basics/account-deletion.md b/i18n/ru/basics/account-deletion.md index 5b8f2ade..5cca6534 100644 --- a/i18n/ru/basics/account-deletion.md +++ b/i18n/ru/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: Очень легко накопить много аккаунтов в интернете, вот несколько советов о том, как уменьшить их количество. --- -Со временем можно легко накопить множество учетных записей в интернете, многие из которых вы можете уже не использовать. Удаление этих неиспользуемых учетных записей - важный шаг в восстановлении конфиденциальности, поскольку неиспользуемые учетные записи уязвимы для утечки данных. Утечка данных - это когда безопасность сервиса скомпрометирована, и защищенная информация просматривается, передается или похищается неавторизованными лицами. К сожалению, утечки данных - [слишком частое](https://haveibeenpwned.com/PwnedWebsites) явление в наши дни, поэтому соблюдение правил цифровой гигиены - лучший способ минимизировать их влияние на вашу жизнь. Цель данного руководства - помочь вам пройти через неприятный процесс удаления учетной записи (который часто усложняется [обманчивым дизайном](https://www.deceptive.design/)) для улучшения вашего присутствия в интернете. +Со временем можно легко накопить множество учетных записей в интернете, многие из которых вы можете уже не использовать. Удаление этих неиспользуемых учетных записей - важный шаг в восстановлении конфиденциальности, поскольку неиспользуемые учетные записи уязвимы для утечки данных. Утечка данных - это когда безопасность сервиса скомпрометирована, и защищенная информация просматривается, передается или похищается неавторизованными лицами. К сожалению, утечки данных - [слишком частое](https://haveibeenpwned.com/PwnedWebsites) явление в наши дни, поэтому соблюдение правил цифровой гигиены - лучший способ минимизировать их влияние на вашу жизнь. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Поиск старых аккаунтов ### Менеджер паролей -Если у вас есть менеджер паролей, которым вы пользовались на протяжении всей своей цифровой жизни, то эта часть будет очень простой. Часто они включают встроенные функции для обнаружения того, что ваши учетные данные были раскрыты в результате утечки данных - например, отчеты в Bitwarden о [скомпрометированных паролях](https://bitwarden.com/blog/have-you-been-pwned/). +Если у вас есть менеджер паролей, которым вы пользовались на протяжении всей своей цифровой жизни, то эта часть будет очень простой. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Функция поиска скомпрометированных паролей в Bitwarden](../assets/img/account-deletion/exposed_passwords.png)
-Даже если вы раньше не использовали отдельный менеджер паролей, есть вероятность, что вы пользовались им в браузере или на телефоне, даже не подозревая об этом. Например: [Firefox Password Manager](https://support.mozilla.org/ru/kb/sohranyonnye-paroli-zapominajte-udalyajte-redaktir), [Google Password Manager](https://passwords.google.com/intro) и [Edge Password Manager](https://support.microsoft.com/ru-ru/microsoft-edge/%D0%B7%D0%B0%D0%BF%D0%BE%D0%BC%D0%B8%D0%BD%D0%B0%D0%BD%D0%B8%D0%B5-%D0%B8-%D1%83%D0%B4%D0%B0%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5-%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B5%D0%B9-%D0%B2-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Даже если вы раньше не использовали отдельный менеджер паролей, есть вероятность, что вы пользовались им в браузере или на телефоне, даже не подозревая об этом. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Также на настольных платформах часто есть менеджер паролей, который может помочь вам восстановить забытые пароли: -- Windows: [Диспетчер учетных данных](https://support.microsoft.com/ru-ru/windows/%D0%B4%D0%BE%D1%81%D1%82%D1%83%D0%BF-%D0%BA-%D0%B4%D0%B8%D1%81%D0%BF%D0%B5%D1%82%D1%87%D0%B5%D1%80%D1%83-%D1%83%D1%87%D0%B5%D1%82%D0%BD%D1%8B%D1%85-%D0%B4%D0%B0%D0%BD%D0%BD%D1%8B%D1%85-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS: [Пароли](https://support.apple.com/ru-ru/HT211145) -- iOS: [Пароли](https://support.apple.com/ru-ru/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux: Gnome Keyring, доступ к которому можно получить с помощью [Seahorse](https://wiki.gnome.org/Apps/Seahorse) или [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Электронная почта @@ -39,7 +39,7 @@ description: Очень легко накопить много аккаунто ### GDPR (только для резидентов ЕЭЗ) -Жители ЕЭЗ имеют дополнительные права в отношении стирания данных, указанные в [статье 17](https://www.gdpr.org/regulation/article-17.html) GDPR. Если к вам это применимо, прочитайте политику конфиденциальности для конкретного сервиса, чтобы найти информацию о том, как воспользоваться своим правом на удаление данных. Чтение политики конфиденциальности может оказаться важным, поскольку некоторые сервисы имеют опцию "Удалить аккаунт", которая только отключает ваш аккаунт, а для реального удаления необходимо предпринять дополнительные действия. Иногда для фактического удаления может потребоваться заполнение анкет, отправка электронного письма сотруднику службы по защите данных или даже подтверждение вашего проживания в ЕЭЗ. Если вы планируете пойти этим путем, **не** перезаписывайте информацию в аккаунте - может потребоваться ваша личность как резидента ЕЭЗ. Обратите внимание, что местонахождение службы не имеет значения; GDPR применяется ко всем, кто обслуживает европейских пользователей. Если служба не соблюдает ваше право на удаление данных, вы можете обратиться в национальный [орган по защите данных](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en), и вам может быть предоставлено право на денежную компенсацию. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. Если к вам это применимо, прочитайте политику конфиденциальности для конкретного сервиса, чтобы найти информацию о том, как воспользоваться своим правом на удаление данных. Чтение политики конфиденциальности может оказаться важным, поскольку некоторые сервисы имеют опцию "Удалить аккаунт", которая только отключает ваш аккаунт, а для реального удаления необходимо предпринять дополнительные действия. Иногда для фактического удаления может потребоваться заполнение анкет, отправка электронного письма сотруднику службы по защите данных или даже подтверждение вашего проживания в ЕЭЗ. Если вы планируете пойти этим путем, **не** перезаписывайте информацию в аккаунте - может потребоваться ваша личность как резидента ЕЭЗ. Обратите внимание, что местонахождение службы не имеет значения; GDPR применяется ко всем, кто обслуживает европейских пользователей. Если служба не соблюдает ваше право на удаление данных, вы можете обратиться в национальный [орган по защите данных](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en), и вам может быть предоставлено право на денежную компенсацию. ### Перезапись информации в аккаунте @@ -59,4 +59,4 @@ description: Очень легко накопить много аккаунто ## Избегайте новых аккаунтов -Как гласит старая поговорка, "Болен — лечись, здоров — берегись." Всякий раз, когда вы хотите создать новый аккаунт, спросите себя: "Действительно ли мне это нужно? Могу ли я достичь того, что мне нужно, не имея аккаунта?" Зачастую удалить учетную запись гораздо сложнее, чем создать ее. И даже после удаления или изменения информации в вашем аккаунте может остаться кэшированная версия от стороннего разработчика - например, [Internet Archive](https://archive.org/). Избегайте создания аккаунтов, когда у вас есть возможность - ваше будущее будет вам благодарно! +Как гласит старая поговорка, "Болен — лечись, здоров — берегись." Всякий раз, когда вы хотите создать новый аккаунт, спросите себя: "Действительно ли мне это нужно? Могу ли я достичь того, что мне нужно, не имея аккаунта?" Зачастую удалить учетную запись гораздо сложнее, чем создать ее. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Избегайте создания аккаунтов, когда у вас есть возможность - ваше будущее будет вам благодарно! diff --git a/i18n/ru/basics/common-misconceptions.md b/i18n/ru/basics/common-misconceptions.md index c38829af..ff3f3581 100644 --- a/i18n/ru/basics/common-misconceptions.md +++ b/i18n/ru/basics/common-misconceptions.md @@ -88,7 +88,7 @@ We don't suggest using a VPN or Tor for any of these things, as your identity is 2. **Неизвестная личность** - неизвестная личность может быть устойчивым псевдонимом, который вы регулярно используете. Она не анонимна, потому что не меняется. Если вы являетесь частью онлайн-сообщества, вы можете захотеть сохранить личность, которую знают другие. Этот псевдоним не является анонимным, поскольку, если достаточно долго понаблюдать, можно заметить некоторые детали, которые раскроют дополнительную информацию, такую как манера письма, общие знания по интересующим темам и т.д. -Для этого вы можете использовать VPN, чтобы замаскировать свой IP-адрес. Финансовые операции сложнее замаскировать: вы можете рассмотреть возможность использования анонимных криптовалют, таких как [Monero](https://www.getmonero.org/). Использование альткоин-шифтинга также может помочь замаскировать место происхождения вашей валюты. Как правило, биржи требуют заполнения KYC (знай своего клиента), прежде чем они позволят вам обменять фиатную валюту на любую криптовалюту. Варианты местных встреч также могут быть решением проблемы; однако они часто более дорогие и иногда требуют KYC. +Для этого вы можете использовать VPN, чтобы замаскировать свой IP-адрес. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Использование альткоин-шифтинга также может помочь замаскировать место происхождения вашей валюты. Как правило, биржи требуют заполнения KYC (знай своего клиента), прежде чем они позволят вам обменять фиатную валюту на любую криптовалюту. Варианты местных встреч также могут быть решением проблемы; однако они часто более дорогие и иногда требуют KYC. 3. **Анонимная личность** - даже при наличии опыта анонимные личности трудно поддерживать в течение длительного времени. Это должны быть краткосрочные и недолговечные личности, которые регулярно меняются. diff --git a/i18n/ru/basics/common-threats.md b/i18n/ru/basics/common-threats.md index 60cdae9d..6e027519 100644 --- a/i18n/ru/basics/common-threats.md +++ b/i18n/ru/basics/common-threats.md @@ -55,7 +55,7 @@ description: Модель угрозы уникальна для каждого, -Если вы опасаетесь **физических атак**, вам следует использовать операционную систему с реализацией безопасной проверенной загрузки, например Android, iOS, macOS или [Windows (с TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). Также следует убедиться, что диск зашифрован и что операционная система использует TPM или [Secure Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) или [Secure Element](https://developers.google.com/android/security/android-ready-se) для ограничения количества попыток ввода парольной фразы шифрования. Вам следует избегать совместного использования компьютера с людьми, которым вы не доверяете, поскольку большинство настольных операционных систем не шифруют данные отдельно для каждого пользователя. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). Также следует убедиться, что диск зашифрован и что операционная система использует TPM или [Secure Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) или [Secure Element](https://developers.google.com/android/security/android-ready-se) для ограничения количества попыток ввода парольной фразы шифрования. Вам следует избегать совместного использования компьютера с людьми, которым вы не доверяете, поскольку большинство настольных операционных систем не шифруют данные отдельно для каждого пользователя. ## Конфиденциальность от поставщиков услуг @@ -89,16 +89,16 @@ description: Модель угрозы уникальна для каждого,

Atlas of Surveillance

-Если вы хотите узнать больше о методах наблюдения и о том, как они применяются в вашем городе, вы также можете взглянуть на [Атлас наблюдения](https://atlasofsurveillance.org/) от [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Правительства часто оправдывают программы массовой слежки как необходимые средства для борьбы с терроризмом и предотвращения преступлений. Однако, нарушая права человека, она чаще всего используется для непропорционального преследования меньшинств и политических диссидентов.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

Перед лицом [разоблачений Эдварда Сноудена о таких правительственных программах, как [PRISM](https://en.wikipedia.org/wiki/PRISM) и [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], представители разведки также признали, что АНБ в течение многих лет тайно собирало записи о телефонных звонках практически каждого американца - кто кому звонит, когда эти звонки совершаются и как долго они длятся. Подобная информация, накапливаемая АНБ день за днем, может раскрыть невероятно чувствительные детали о жизни и связях людей, например, звонили ли они пастору, специалисту по абортам, консультанту по наркомании или на горячую линию для самоубийц. @@ -144,7 +144,7 @@ In France you can take a look at the [Technopolice website](https://technopolice Цензура в Интернете может осуществляться (в разной степени) тоталитарными правительствами, администраторами сетей и поставщиками услуг. Эти попытки контролировать коммуникацию и ограничивать доступ к информации всегда будут несовместимы с правом человека на свободу слова и самовыражения.[^5] -Цензура на корпоративных платформах становится все более распространенным явлением, поскольку такие платформы, как Twitter и Facebook, поддаются общественному и рыночному давлению и давлению со стороны государственных органов. Давление со стороны правительства может быть скрытым, например, Белый дом [требует удалить](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) провокационное видео на YouTube, или открытым, например, правительство Китая требует от компаний придерживаться строгого режима цензуры. +Цензура на корпоративных платформах становится все более распространенным явлением, поскольку такие платформы, как Twitter и Facebook, поддаются общественному и рыночному давлению и давлению со стороны государственных органов. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. Люди, обеспокоенные угрозой цензуры, могут использовать такие технологии, как [Tor](../advanced/tor-overview.md), чтобы обойти ее, и поддерживать устойчивые к цензуре платформы для общения, такие как [Matrix](../real-time-communication.md#element), где нет централизованного органа, который может произвольно закрыть учетные записи. @@ -162,5 +162,5 @@ In France you can take a look at the [Technopolice website](https://technopolice [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: Совет по надзору за соблюдением конфиденциальности и гражданских свобод США: [*Отчет о программе записи телефонных разговоров, проводимой в соответствии с разделом 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Вы также должны использовать другие методы смягчения последствий. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Вы также должны использовать другие методы смягчения последствий. [^5]: Организация Объединенных Наций: [*Всеобщая декларация прав человека*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/ru/basics/email-security.md b/i18n/ru/basics/email-security.md index f073ca19..54cbf97c 100644 --- a/i18n/ru/basics/email-security.md +++ b/i18n/ru/basics/email-security.md @@ -13,7 +13,7 @@ description: Электронная почта по своей природе н Стандартным способом добавления E2EE в электронные письма между различными поставщиками услуг электронной почты является использование OpenPGP. Существуют различные реализации стандарта OpenPGP, наиболее распространенными из которых являются [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) и [OpenPGP.js](https://openpgpjs.org). -Существует еще один стандарт, популярный в бизнесе, который называется [S/MIME](https://en.wikipedia.org/wiki/S/MIME), однако для его использования требуется сертификат, выданный [центром сертификации](https://ru.wikipedia.org/wiki/%D0%A6%D0%B5%D0%BD%D1%82%D1%80_%D1%81%D0%B5%D1%80%D1%82%D0%B8%D1%84%D0%B8%D0%BA%D0%B0%D1%86%D0%B8%D0%B8) (не все из них выдают сертификаты S/MIME). Он имеет поддержку в [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) и [Outlook for Web или Exchange Server 2016, 2019](https://support.microsoft.com/ru-ru/office/%D1%88%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5-%D1%81%D0%BE%D0%BE%D0%B1%D1%89%D0%B5%D0%BD%D0%B8%D0%B9-%D1%81-%D0%BF%D0%BE%D0%BC%D0%BE%D1%89%D1%8C%D1%8E-%D0%BF%D1%80%D0%BE%D1%82%D0%BE%D0%BA%D0%BE%D0%BB%D0%B0-s-mime-%D0%B2-outlook-%D0%B2-%D0%B8%D0%BD%D1%82%D0%B5%D1%80%D0%BD%D0%B5%D1%82%D0%B5-878c79fc-7088-4b39-966f-14512658f480?ui=en-us&rs=en-us&ad=us). +Существует еще один стандарт, популярный в бизнесе, который называется [S/MIME](https://en.wikipedia.org/wiki/S/MIME), однако для его использования требуется сертификат, выданный [центром сертификации](https://ru.wikipedia.org/wiki/%D0%A6%D0%B5%D0%BD%D1%82%D1%80_%D1%81%D0%B5%D1%80%D1%82%D0%B8%D1%84%D0%B8%D0%BA%D0%B0%D1%86%D0%B8%D0%B8) (не все из них выдают сертификаты S/MIME). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Даже если вы используете OpenPGP, он не поддерживает [прямую секретность](https://ru.wikipedia.org/wiki/Perfect_forward_secrecy), что означает, что если ваш закрытый ключ или закрытый ключ получателя когда-либо будет украден, все предыдущие сообщения, зашифрованные с его помощью, могут быть расшифрованы. Именно поэтому мы рекомендуем использовать для общения между людьми [мессенджеры](../real-time-communication.md), которые обеспечивают прямую секретность, а не электронную почту. @@ -23,7 +23,7 @@ description: Электронная почта по своей природе н В дополнение к [рекомендованным почтовым клиентам](../email-clients.md), поддерживающим WKD, некоторые браузерные почтовые интерфейсы также поддерживают WKD. Будет ли *ваш личный* ключ опубликован в WKD для других пользователей, зависит от конфигурации вашего домена. Если вы пользуетесь [почтовым провайдером](../email.md#openpgp-compatible-services), поддерживающим WKD, таким как Proton Mail или Mailbox.org, они опубликуют ваш OpenPGP-ключ на своем домене. -Если же вы используете свой собственный домен, вам потребуется настроить WKD отдельно. Если вы контролируете доменное имя, вы можете настроить WKD независимо от почтового провайдера. Это можно легко сделать при помощи [сервиса WKD](https://keys.openpgp.org/about/usage#wkd-as-a-service), предоставляемого keys.openpgp.org, установив CNAME-запись для поддомена `openpgpkey`, направляющего на `wkd.keys.openpgp.org`, а затем загрузив свой ключ на [keys.openpgp.org](https://keys.openpgp.org/). Кроме того, можно [запустить WKD на собственном сервере](https://wiki.gnupg.org/WKDHosting). +Если же вы используете свой собственный домен, вам потребуется настроить WKD отдельно. Если вы контролируете доменное имя, вы можете настроить WKD независимо от почтового провайдера. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Кроме того, можно [запустить WKD на собственном сервере](https://wiki.gnupg.org/WKDHosting). Если вы используете общий домен от провайдера, не поддерживающего WKD, например @gmail.com, вы не сможете поделиться своим OpenPGP-ключом с другими при помощи данного метода. @@ -33,7 +33,7 @@ description: Электронная почта по своей природе н ### Как я могу защитить свои приватные ключи? -Смарт-карта (например, [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) или [Nitrokey](https://www.nitrokey.com)) работает путем получения зашифрованного сообщения электронной почты с устройства (телефона, планшета, компьютера и т.д.), на котором установлен почтовый клиент. Затем сообщение расшифровывается смарт-картой, и расшифрованное содержимое отправляется обратно на устройство. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Затем сообщение расшифровывается смарт-картой, и расшифрованное содержимое отправляется обратно на устройство. Расшифровку лучше производить на смарт-карте, чтобы избежать возможное раскрытие приватного ключа на скомпрометированном устройстве. diff --git a/i18n/ru/basics/multi-factor-authentication.md b/i18n/ru/basics/multi-factor-authentication.md index a7d5808b..98d0393f 100644 --- a/i18n/ru/basics/multi-factor-authentication.md +++ b/i18n/ru/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP - одна из наиболее распространенных форм Код, ограниченный по времени, вычисляется из общего секрета и текущего времени. Поскольку код действителен только в течение короткого времени, без доступа к общему секрету злоумышленник не может генерировать новые коды. -Если у вас есть аппаратный ключ безопасности с поддержкой TOTP (например, YubiKey с [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), мы рекомендуем хранить ваши "общие секреты" на этом аппаратном ключе. Такое оборудование, как YubiKey, было разработано с целью сделать "общий секрет" трудноизвлекаемым и копируемым. YubiKey также не подключен к интернету, в отличие от телефона с приложением TOTP. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Такое оборудование, как YubiKey, было разработано с целью сделать "общий секрет" трудноизвлекаемым и копируемым. YubiKey также не подключен к интернету, в отличие от телефона с приложением TOTP. В отличие от [WebAuthn](#fido-fast-identity-online), TOTP не обеспечивает защиту от [фишинга](https://ru.wikipedia.org/wiki/фишинг) или повторных атак. Если злоумышленник получает от вас действующий код, он может использовать его сколько угодно раз, пока не истечет срок его действия (обычно 60 секунд). @@ -122,13 +122,13 @@ FIDO2 и WebAuthn обладают превосходными свойствам ### Windows -Yubico имеет специальный [почтавщика учетных данных](https://learn.microsoft.com/ru-ru/windows/win32/secauthn/credential-providers-in-windows), который добавляет аутентификацию Challenge-Response для потока входа по имени пользователя и паролю для локальных учетных записей Windows. Если у вас есть YubiKey с поддержкой аутентификации Challenge-Response, загляните на сайт [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), который позволит вам настроить МФА на компьютере с Windows. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS В macOS есть [нативная поддержка](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) аутентификации с помощью смарт-карт (PIV). Если у вас есть смарт-карта или аппаратный ключ безопасности, поддерживающий интерфейс PIV (например YubiKey), мы рекомендуем вам следовать документации производителя смарт-карты/аппаратного ключа безопасности и настроить двухфакторную аутентификацию на компьютере с macOS. -У компании Yubico есть руководство [Использование YubiKey в качестве смарт-карты в macOS](https://support.yubico.com/hc/en-us/articles/360016649059), которое поможет вам настроить YubiKey в macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. После того как смарт-карта/ключ безопасности настроены, рекомендуется выполнить следующую команду в командной строке: @@ -147,22 +147,22 @@ sudo defaults write /Library/Preferences/com.apple.loginwindow DisableFDEAutoLog
-Модуль `pam_u2f` в Linux может обеспечить двухфакторную аутентификацию для входа в систему в большинстве популярных дистрибутивов Linux. Если у вас есть аппаратный ключ безопасности, поддерживающий U2F, вы можете настроить МФА для входа в систему. На сайте Yubico есть руководство [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F), которое должно работать в любом дистрибутиве. Команды менеджера пакетов - например, `apt-get`- и названия пакетов могут отличаться. Данное руководство **не** применимо к Qubes OS. +Модуль `pam_u2f` в Linux может обеспечить двухфакторную аутентификацию для входа в систему в большинстве популярных дистрибутивов Linux. Если у вас есть аппаратный ключ безопасности, поддерживающий U2F, вы можете настроить МФА для входа в систему. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. Команды менеджера пакетов - например, `apt-get`- и названия пакетов могут отличаться. Данное руководство **не** применимо к Qubes OS. ### Qubes OS -В Qubes OS есть поддержка аутентификации Challenge-Response с помощью ключей YubiKey. Если у вас есть YubiKey с поддержкой аутентификации Challenge-Response, посмотрите документацию по Qubes OS [YubiKey](https://www.qubes-os.org/doc/yubikey/), если вы хотите настроить МФА в Qubes OS. +В Qubes OS есть поддержка аутентификации Challenge-Response с помощью ключей YubiKey. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Аппаратные ключи безопасности -МФА с SSH может быть настроена с использованием нескольких различных методов аутентификации, которые популярны при использовании аппаратных ключей безопасности. Мы рекомендуем вам ознакомиться с [документацией](https://developers.yubico.com/SSH/) Yubico про то, как это настроить. +МФА с SSH может быть настроена с использованием нескольких различных методов аутентификации, которые популярны при использовании аппаратных ключей безопасности. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Одноразовый пароль основанный на времени (TOTP) -МФА с SSH также можно настроить с помощью TOTP. DigitalOcean предоставил учебник [Как настроить многофакторную аутентификацию для SSH на Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Большинство вещей должны быть одинаковыми независимо от дистрибутива, однако команды менеджера пакетов - например, `apt-get`- и названия пакетов могут отличаться. +МФА с SSH также можно настроить с помощью TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Большинство вещей должны быть одинаковыми независимо от дистрибутива, однако команды менеджера пакетов - например, `apt-get`- и названия пакетов могут отличаться. ### KeePass (и KeePassXC) -Базы данных KeePass и KeePassXC могут быть защищены с помощью Challenge-Response или HOTP в качестве второго фактора аутентификации. Компания Yubico предоставила документ для KeePass [Использование YubiKey с KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass), также есть документ на сайте [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa). +Базы данных KeePass и KeePassXC могут быть защищены с помощью Challenge-Response или HOTP в качестве второго фактора аутентификации. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/ru/basics/passwords-overview.md b/i18n/ru/basics/passwords-overview.md index 4dad8d52..a8551394 100644 --- a/i18n/ru/basics/passwords-overview.md +++ b/i18n/ru/basics/passwords-overview.md @@ -54,13 +54,13 @@ description: These are some tips and tricks on how to create the strongest passw

Note

-Эти инструкции предполагают, что вы используете [большой список слов EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) для генерации парольной фразы, что требует пяти бросков кубика на слово. Другие списки слов могут требовать больше или меньше бросков на слово, и могут потребоваться другое количество слов для достижения той же энтропии. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Другие списки слов могут требовать больше или меньше бросков на слово, и могут потребоваться другое количество слов для достижения той же энтропии.
1. Бросьте шестигранный кубик пять раз, записывая число после каждого броска. -2. В качестве примера, допустим, вы бросили `2-5-2-6-6`. Найдите в [Большом списке слов EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) слово, соответствующее `25266`. +2. В качестве примера, допустим, вы бросили `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. Вы найдете слово `encrypt`. Запишите это слово. @@ -75,20 +75,20 @@ description: These are some tips and tricks on how to create the strongest passw Если у вас нет доступа к настоящим игральным костям или вы предпочитаете не использовать их, вы можете воспользоваться встроенным в менеджере паролей генератором паролей, поскольку большинство из них имеют возможность генерировать парольные фразы в дополнение к обычным паролям. -Мы рекомендуем использовать [большой список слов EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) для генерации парольных фраз, поскольку он обеспечивает точно такую же безопасность, как и оригинальный список, но содержит слова, которые легче запомнить. Есть также [другие списки слов на разных языках](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), если вы не хотите, чтобы ваша парольная фраза была на английском языке. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. Есть также [другие списки слов на разных языках](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), если вы не хотите, чтобы ваша парольная фраза была на английском языке.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. Одним из показателей для определения силы парольной фразы является ее энтропия. Энтропия каждого слова в парольной фразе вычисляется как $\text{log}_2(\text{Слов-в-списке})$, а общая энтропия парольной фразы вычисляется как $\text{log}_2(\text{Слов-в-списке}^\text{Слов-в-фразе})$. Таким образом, каждое слово в вышеупомянутом списке дает ~12,9 бит энтропии ($\text{log}_2(7776)$), а парольная фраза из семи слов имеет ~90,47 бит энтропии ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. Чтобы вычислить количество возможных парольных фраз, достаточно $\text{Слов-в-списке}^\text{Слов-в-фразе}$, или, в нашем случае, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. Чтобы вычислить количество возможных парольных фраз, достаточно $\text{Слов-в-списке}^\text{Слов-в-фразе}$, или, в нашем случае, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. В среднем, чтобы угадать вашу фразу, нужно попробовать 50% всех возможных комбинаций. Учитывая это, даже если ваш противник способен на ~1 000 000 000 000 000 000 угадываний в секунду, ему все равно потребуется ~27 255 689 лет, чтобы угадать вашу кодовую фразу. Это так, даже если верны следующие вещи: diff --git a/i18n/ru/basics/vpn-overview.md b/i18n/ru/basics/vpn-overview.md index 6cc199ac..e1fe3c21 100644 --- a/i18n/ru/basics/vpn-overview.md +++ b/i18n/ru/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. Чтобы компенсировать это, провайдеры VPN обычно направляют все пакеты, не относящиеся к TCP, через свой VPN-сервер (первый путь вашего трафика). Это случай с [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Кроме того, при использовании функции Tor через VPN вы не сможете контролировать другие важные функции Tor, например [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (использование отдельной цепи Tor для каждого посещаемого вами домена). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. Чтобы компенсировать это, провайдеры VPN обычно направляют все пакеты, не относящиеся к TCP, через свой VPN-сервер (первый путь вашего трафика). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Связанная информация о VPN -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/ru/basics/why-privacy-matters.md b/i18n/ru/basics/why-privacy-matters.md index 2ef410f4..866491ce 100644 --- a/i18n/ru/basics/why-privacy-matters.md +++ b/i18n/ru/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ icon: 'material/shield-account' ## Источники -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/ru/calendar.md b/i18n/ru/calendar.md index 44dbdb6a..90d6e406 100644 --- a/i18n/ru/calendar.md +++ b/i18n/ru/calendar.md @@ -13,7 +13,7 @@ cover: calendar.webp ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Создание нескольких календарей и расширенный совместный доступ доступны только платным подписчикам. @@ -21,18 +21,18 @@ cover: calendar.webp [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ cover: calendar.webp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/ru/cloud.md b/i18n/ru/cloud.md index b4594831..8d0db495 100644 --- a/i18n/ru/cloud.md +++ b/i18n/ru/cloud.md @@ -56,15 +56,15 @@ Nextcloud is [still a recommended tool](productivity.md) for self-hosting a file **Tresorit** - швейцарско-венгерский провайдер зашифрованных облачных хранилищ, основанный в 2011 году. Tresorit принадлежит Swiss Post, национальной почтовой службе Швейцарии. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Nextcloud is [still a recommended tool](productivity.md) for self-hosting a file Компания Tresorit прошла ряд независимых аудитов безопасности: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] соответствие [сертификации](https://www.certipedia.com/quality_marks/9108644476) от TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Тестирование на проникновение от Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - В данном обзоре оценивалась безопасность веб-клиента Tresorit, приложения для Android, приложения для Windows и соответствующей инфраструктуры. - Computest обнаружил две уязвимости, которые были устранены. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Тестирование на проникновение от Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - В данном обзоре был проанализирован весь исходный код Tresorit и было подтверждено, что реализация соответствует концепциям, описанным в [техническом документе](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf) Tresorit. - Компания Ernst & Young дополнительно протестировала веб-приложение, мобильные и настольные клиенты: "Результаты тестирования не выявили никаких отклонений от заявлений Tresorit о конфиденциальности данных." -Они также получили Digital Trust Label, сертификацию от [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/), которая требует соответствия [35 критериям](https://digitaltrust-label.swiss/criteria/), связанных с безопасностью, конфиденциальностью и надежностью. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Критерии diff --git a/i18n/ru/cryptocurrency.md b/i18n/ru/cryptocurrency.md index a9f6c918..8e7344d1 100644 --- a/i18n/ru/cryptocurrency.md +++ b/i18n/ru/cryptocurrency.md @@ -24,10 +24,10 @@ cover: cryptocurrency.webp **Monero** использует блокчейн с технологиями повышения конфиденциальности, которые затрудняют отслеживание транзакций для достижения анонимности. Каждая транзакция в Monero скрывает сумму транзакции, адреса отправителя и получателя и источник средств, не требуя при этом дополнительных действий, что делает её идеальным выбором для новичков в области криптовалют. -[:octicons-home-16: Домашняя страница](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Документация} -[:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Исходный код" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Поддержать} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ cover: cryptocurrency.webp Для максимальной конфиденциальности убедитесь, что вы используете некастодиальный кошелек, где ключ просмотра остается на вашем устройстве, а не на удалённом сервере. Это означает то, что только вы будете иметь возможность расходовать свои средства и видеть входящие и исходящие транзакции. Если вы используете кастодиальный кошелек, провайдер может видеть **абсолютно всё**, что вы делаете; если вы используете "лёгкий" кошелек, где провайдер хранит ваш приватный ключ, он может видеть практически всё, что вы делаете. Некоторые некастодиальные кошельки включают в себя: - [Официальный клиент Monero](https://getmonero.org/ru/downloads/) (для ПК) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet поддерживает множество криптовалют. Версия Cake Wallet, предназначенная только для Monero, доступна на сайте [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (для ПК) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet поддерживает множество криптовалют. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) Для обеспечения максимальной конфиденциальности (даже при использовании некастодиального кошелька) вам следует запустить собственный узел Monero. Использование чьего-то узла раскрывает ему некоторую информацию, например: IP-адрес, с которого вы к нему подключаетесь, временные метки, по которым вы синхронизируете свой кошелек, и транзакции, которые вы отправляете из своего кошелька (хотя никакой другой информации об этих транзакциях нет). С другой стороны, вы можете подключиться к чужому узлу Monero через Tor или i2p. -В августе 2021 года компания CipherTrace [объявила о](https://ciphertrace.com/enhanced-monero-tracing/) расширенных возможностях отслеживания Monero для государственных учреждений. Публичные сообщения показывают, что сеть по борьбе с финансовыми преступлениями министерства финансов США [лицензировала](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) "модуль Monero" CipherTrace в конце 2022 года. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Публичные сообщения показывают, что сеть по борьбе с финансовыми преступлениями министерства финансов США [лицензировала](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) "модуль Monero" CipherTrace в конце 2022 года. -Конфиденциальность графа транзакций Monero ограничена его относительно небольшими кольцевыми подписями, особенно против персональных атак. Функции конфиденциальности Monero также были [поставлены под сомнение](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) некоторыми исследователями безопасности, и ряд серьезных уязвимостей был найден и исправлен в прошлом, поэтому заявления, сделанные такими организациями, как CipherTrace, не исключены. Хотя маловероятно, что существуют инструменты массового наблюдения за Monero, как это происходит с Bitcoin и другими криптовалютами, несомненно инструменты отслеживания помогают проводить персональные расследования. +Конфиденциальность графа транзакций Monero ограничена его относительно небольшими кольцевыми подписями, особенно против персональных атак. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. Хотя маловероятно, что существуют инструменты массового наблюдения за Monero, как это происходит с Bitcoin и другими криптовалютами, несомненно инструменты отслеживания помогают проводить персональные расследования. В конечном итоге Monero является самым сильным претендентом на звание криптовалюты, обеспечивающей конфиденциальность, но ее заявления о конфиденциальности **не** были окончательно доказаны тем или иным способом. Необходимо больше времени и исследований, чтобы оценить, достаточно ли устойчива Monero к атакам, чтобы всегда обеспечивать достаточную конфиденциальность. diff --git a/i18n/ru/data-redaction.md b/i18n/ru/data-redaction.md index a735f2e1..c9bfd065 100644 --- a/i18n/ru/data-redaction.md +++ b/i18n/ru/data-redaction.md @@ -88,12 +88,12 @@ cover: data-redaction.webp **Metapho** - это простая и чистая программа для просмотра метаданных фотографии, таких как дата, имя файла, размер, модель камеры, выдержка и местоположение. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ cover: data-redaction.webp **PrivacyBlur** - это бесплатное приложение, которое позволяет размыть чувствительные части фотографий перед тем, как поделиться ими в интернете. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ cover: data-redaction.webp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/ru/desktop-browsers.md b/i18n/ru/desktop-browsers.md index 6c24d16c..ad6b2a71 100644 --- a/i18n/ru/desktop-browsers.md +++ b/i18n/ru/desktop-browsers.md @@ -70,8 +70,8 @@ schema: **Mullvad Browser** - это версия [Tor Browser](tor.md#tor-browser) с удаленными интеграциями сети Tor, предназначенная для предоставления пользователям VPN браузерных технологий Tor Browser по борьбе с цифровыми отпечатками. Он разработан проектом Tor и распространяется [Mullvad](vpn.md#mullvad), и **не** требует использования VPN Mullvad. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ schema: -Как и [Tor Browser](tor.md), Mullvad Browser разработан для предотвращения цифровых отпечатков, делая цифровые отпечатки вашего браузера идентичными цифровым отпечаткам всех других пользователей Mullvad Browser. Также он содержит настройки и расширения по умолчанию, которые автоматически конфигурируются выбранным уровнем безопасности: *Standart*, *Safe* и *Safest*. Поэтому крайне важно, чтобы ты **не изменял** браузер, помимо установленных по умолчанию [уровней безопасности](https://tb-manual.torproject.org/ru/security-settings/). Другие модификации сделают твой цифровой отпечаток браузера уникальным, что лишает смысла использование этого браузера. Если ты хочешь более комплексно настроить браузер и цифровые отпечатки тебя не волнуют, то мы рекомендуем использовать [Firefox](#firefox). +Как и [Tor Browser](tor.md), Mullvad Browser разработан для предотвращения цифровых отпечатков, делая цифровые отпечатки вашего браузера идентичными цифровым отпечаткам всех других пользователей Mullvad Browser. Также он содержит настройки и расширения по умолчанию, которые автоматически конфигурируются выбранным уровнем безопасности: *Standart*, *Safe* и *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Другие модификации сделают твой цифровой отпечаток браузера уникальным, что лишает смысла использование этого браузера. Если ты хочешь более комплексно настроить браузер и цифровые отпечатки тебя не волнуют, то мы рекомендуем использовать [Firefox](#firefox). ### Система скрытия цифровых отпечатков @@ -116,17 +116,17 @@ Mullvad Browser поставляется с включенной по умолч **Firefox** предоставляет сильные настройки конфиденциальности, такие как [Улучшенная защита от отслеживания](https://support.mozilla.org/ru/kb/uluchshennaya-zashita-ot-otslezhivaniya-firefox-dlya-kompyutera), которые могут помочь блокировать различные [типы отслеживания](https://support.mozilla.org/ru/kb/uluchshennaya-zashita-ot-otslezhivaniya-firefox-dlya-kompyutera#w_chto-blokiruet-uluchshennaia-zashchita-ot-otslezhivaniia). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser поставляется с включенной по умолч

Предупреждение

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug ##### Предложения Firefox (Только США) -[Предложения Firefox](https://support.mozilla.org/en-US/kb/firefox-suggest) - это функция, аналогичная поисковым предложениям, которая доступна только в США. Мы рекомендуем отключить его по той же причине, по которой мы рекомендуем отключать поисковые предложения. Если ты не видишь этих опций в **адресной строке**, то у тебя нет этой функции и ты можешь игнорировать эти изменения. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. Мы рекомендуем отключить его по той же причине, по которой мы рекомендуем отключать поисковые предложения. Если ты не видишь этих опций в **адресной строке**, то у тебя нет этой функции и ты можешь игнорировать эти изменения. - [ ] Отключи **Suggestions from the web** - [ ] Отключи **Suggestions from sponsors** @@ -183,7 +183,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug > Firefox отправляет нам данные о версии и языке вашего Firefox; операционной системе устройства и конфигурации оборудования; памяти, основную информацию о сбоях и ошибках; результаты автоматизированных процессов, таких как обновления, безопасный просмотр и активация. Когда Firefox отправляет нам данные, ваш IP-адрес временно собирается как часть логов нашего сервера. -Кроме того, служба Firefox Accounts собирает [некоторые технические данные](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). Если ты используешь учетную запись Firefox, то ты можешь отключить сбор этих данных: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). Если ты используешь учетную запись Firefox, то ты можешь отключить сбор этих данных: 1. Открой [настройки профиля на сайте accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Отключи **Сбор и использование данных** > **Помогите улучшить ⁨аккаунты Firefox⁩** @@ -204,7 +204,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug #### Синхронизация -[Синхронизация Firefox](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) даёт тебе доступ к данным твоего браузера (история, закладки и т.д.) на всех твоих устройствах и защищает их с помощью E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (дополнительно) @@ -215,7 +215,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug -[Проект Arkenfox](https://github.com/arkenfox/user.js) предоставляет набор тщательно подобранных настроек для Firefox. Если ты [решишь](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) использовать Arkenfox, то [несколько опций](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) являются субъективно строгими и/или могут привести к неправильной работе некоторых сайтов. [Эти настройки ты можешь легко изменить](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) в соответствии с твоими потребностями. Мы **настоятельно рекомендуем** ознакомиться с их [вики](https://github.com/arkenfox/user.js/wiki). Arkenfox также включает поддержку [контейнеров](https://support.mozilla.org/ru/kb/kontejnery). +[Проект Arkenfox](https://github.com/arkenfox/user.js) предоставляет набор тщательно подобранных настроек для Firefox. Если ты [решишь](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) использовать Arkenfox, то [несколько опций](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) являются субъективно строгими и/или могут привести к неправильной работе некоторых сайтов. [Эти настройки ты можешь легко изменить](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) в соответствии с твоими потребностями. Мы **настоятельно рекомендуем** ознакомиться с их [вики](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox нацелен только на предотвращение основных или наивных сценариев отслеживания с помощью рандомизации холста и встроенных в Firefox настроек конфигурации сопротивления отпечатку браузера. Он не стремится к тому, чтобы ваш браузер сливался с большой толпой других пользователей Arkenfox так, как это делают Mullvad Browser или Tor Browser, что является единственным способом помешать продвинутым сценариям отслеживания отпечатков браузера. Помни, что ты всегда можешь использовать несколько браузеров, например: ты можешь использовать Firefox+Arkenfox для сайтов, на которых ты хочешь оставаться залогиненным или которые не работают должным образом в Mullvad Browser, и Mullvad Browser для регулярного браузинга. @@ -223,25 +223,25 @@ Arkenfox нацелен только на предотвращение осно
-![Логотип Brave](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** включает встроенный блокировщик контента и [инструменты конфиденциальности](https://brave.com/privacy-features/), многие из которых включены по умолчанию. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave основан на Chromium, поэтому он покажется тебе знакомым, а также у него не должно быть проблем совместимости с вебсайтами. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ Brave добавляет "[реферальный код](https://github. om/bra ##### Защита -Brave содержит несколько инструментов защиты от отслеживания в разделе [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Мы рекомендуем включить эти настройки [для всех сайтов](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-), которые ты посещаешь. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Опции щитов можно понижать по мере необходимости для каждого конкретного сайта, но по умолчанию мы рекомендуем установить следующие параметры: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave
-1. Эта опция обеспечивает функциональность, аналогичную расширенным [режимам блокировки](https://github.com/gorhill/uBlock/wiki/Blocking-mode) uBlock Origin или расширения [NoScript](https://noscript.net/). +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. Если вы хотите оставаться залогиненными на определенном сайте, который вы часто посещаете, вы можете установить исключения для каждого сайта, нажав на значок щита в адресной строке. ##### Конфиденциальность и безопасность
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave **не так устойчив** к цифровым отпечаткам, как Tor Browser, и гораздо меньше людей используют Brave вместе с Tor, поэтому ты будешь выделяться. Там, где тебе [нужна сильная анонимность](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) используй [Tor Browser](tor.md#tor-browser). +1. Brave **не так устойчив** к цифровым отпечаткам, как Tor Browser, и гораздо меньше людей используют Brave вместе с Tor, поэтому ты будешь выделяться. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ If you wish to stay logged in to a particular site you visit often, you can set #### Синхронизация -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) позволяет синхронизировать данные браузера (историю, закладки и т. д.) между несколькими устройствами без необходимости создавать аккаунт, а также защищает их при помощи E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Вознаграждение Brave и Кошелек @@ -371,7 +371,7 @@ If you wish to stay logged in to a particular site you visit often, you can set
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ If you wish to stay logged in to a particular site you visit often, you can set
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ uBlock Origin Lite получает обновления списка блоки - Доступен для Linux, macOS и Windows. - Любые изменения, необходимые для того, чтобы браузер больше соблюдал конфиденциальность, не должны негативно влиять на опыт использования. - По умолчанию блокирует сторонние файлы куки. -- Поддерживает [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) для уменьшения межсайтового отслеживания.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### В лучшем случае Эти критерии представляют собой то, что мы хотели бы видеть от идеального проекта в этой категории. Наши рекомендации могут не соответствовать всем или нескольким из этих критериев, но проекты, которые им соответствуют, расположены выше остальных. - Включает в себя встроенную функцию блокировки контента. -- Поддерживает разделение файлов куки (как [Multi-Account Контейнеры](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. Это может иметь преимущества перед установкой приложений на базе Electron, поскольку вы получаете преимущества от регулярных обновлений безопасности вашего браузера. - Не включает дополнительные функции (bloatware), которые не влияют на конфиденциальность пользователя. - По умолчанию не собирает телеметрию. @@ -462,4 +462,4 @@ uBlock Origin Lite получает обновления списка блоки - Должно непосредственно влиять на конфиденциальность пользователя, т.е. не просто предоставлять информацию. [^1]: uBlock Origin Lite *сам* не потребляет никаких ресурсов, поскольку использует новые API, благодаря которым браузер обрабатывает списки фильтров нативно, а не выполняет JavaScript-код внутри расширения для фильтрации. Однако это преимущество в ресурсах является лишь [теоретическим](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), поскольку возможно, что стандартный код фильтрации uBlock Origin более эффективен, чем собственный код фильтрации вашего браузера. Этот показатель еще не был протестирован. -[^2]: Реализация Brave подробно описана в [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/ru/desktop.md b/i18n/ru/desktop.md index f9b5e1e7..0cc9bbd3 100644 --- a/i18n/ru/desktop.md +++ b/i18n/ru/desktop.md @@ -17,17 +17,17 @@ cover: desktop.webp ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora обычно внедряет новые технологии раньше других дистрибутивов, например [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). Эти новые технологии часто улучшают безопасность, конфиденциальность и удобство использования в целом. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). Эти новые технологии часто улучшают безопасность, конфиденциальность и удобство использования в целом. -[:octicons-home-16: Домашняя страница](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Документация} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora имеет \[полу-плавающий\](https://ru.wikipedia.org/wiki/Rolling_release) цикл релиза. В то время как некоторые пакеты, такие как [GNOME](https://www.gnome.org), замораживаются до следующего выпуска Fedora, большинство пакетов (включая ядро) часто обновляются в течение всего срока жизни релиза. Каждый выпуск Fedora поддерживается в течение одного года, а новая версия выходит каждые 6 месяцев. +Fedora имеет \[полу-плавающий\](https://ru.wikipedia.org/wiki/Rolling_release) цикл релиза. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Каждый выпуск Fedora поддерживается в течение одного года, а новая версия выходит каждые 6 месяцев. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora имеет \[полу-плавающий\](https://ru.wikipedia.org/wiki/ **openSUSE Tumbleweed** - стабильный дистрибутив с [плавающей системой релизов](https://ru.wikipedia.org/wiki/Rolling_release). -openSUSE Tumbleweed имеет систему [транзакционного обновления](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/), которая использует [Btrfs](https://en.wikipedia.org/wiki/Btrfs) и [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) для обеспечения возможности отката моментальных снимков системы в случае возникновения проблем. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Домашняя страница](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Документация} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed следует модели плавающего релиза, ког **Arch Linux** - это легкий, "сделай сам" (DIY) дистрибутив, означающий, что вы получаете только то, что устанавливаете. Более подробную информацию можно найти на их сайте [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Домашняя страница](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Документация} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ Arch Linux имеет плавающий цикл релиза. Не сущес **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,9 +108,9 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS - это независимый дистрибутив, основанный на пакетном менеджере Nix с акцентом на воспроизводимость и надежность. -[:octicons-home-16: Домашняя страница](https://nixos.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Документация} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. Его цель - обеспечить конфиденциальность, безопасность и анонимность в интернете. Whonix лучше всего использовать в сочетании с [Qubes OS](#qubes-os). -[:octicons-home-16: Домашняя страница](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Сервис Onion" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Документация} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** - это операционная система, основанная на Debian и направляющая все коммуникации через Tor, которая может загружаться практически на любом компьютере с DVD или USB-накопителя или SD-карты. Она использует [Tor](tor.md) для сохранения конфиденциальности и анонимности, обходя цензуру и не оставляет следов на используемом компьютере после выключения. -[:octicons-home-16: Домашняя страница](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Документация} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Дистрибутивы для безопасности @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. Он охватывает множество рекомендаций по обеспечению конфиденциальности и усилению защиты, без необходимости дополнительной настройки. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/ru/device-integrity.md b/i18n/ru/device-integrity.md index 283a5675..4372ffeb 100644 --- a/i18n/ru/device-integrity.md +++ b/i18n/ru/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/ru/dns.md b/i18n/ru/dns.md index 4b0de34e..15ca041b 100644 --- a/i18n/ru/dns.md +++ b/i18n/ru/dns.md @@ -11,14 +11,14 @@ cover: dns.webp ## Рекомендованные провайдеры -| DNS-провайдер | Политика конфиденциальности | Протоколы | Логирование | ECS | Фильтрация | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ---------------- | ------------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Частичное[^1] | Yes | В зависимости от персональной конфигурации. Используемый список фильтрации можно найти здесь. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Без шифрования
DoH/3
DoT | Частичное[^2] | Нет | В зависимости от персональной конфигурации. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Без шифрования
DoH/3
DoT
DoQ | Опциональное[^3] | Нет | В зависимости от персональной конфигурации. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | Нет[^4] | Нет | В зависимости от персональной конфигурации. Используемый список фильтрации можно найти здесь. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Без шифрования
DoH/3
DoT
DoQ | Опциональное[^5] | Необязательное[^5] | В зависимости от персональной конфигурации. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Без шифрования
DoH
DoT
DNSCrypt | Частичное[^6] | Необязательное[^5] | В зависимости от персональной конфигурации, блокировка вредоносных программ по умолчанию. | +| DNS-провайдер | Политика конфиденциальности | Протоколы | Логирование | ECS | Фильтрация | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ---------------- | ------------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Частичное[^1] | Yes | В зависимости от персональной конфигурации. Используемый список фильтрации можно найти здесь. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Без шифрования
DoH/3
DoT | Частичное[^2] | Нет | В зависимости от персональной конфигурации. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Без шифрования
DoH/3
DoT
DoQ | Опциональное[^3] | Нет | В зависимости от персональной конфигурации. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | Нет[^4] | Нет | В зависимости от персональной конфигурации. Используемый список фильтрации можно найти здесь. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Без шифрования
DoH/3
DoT
DoQ | Опциональное[^5] | Необязательное[^5] | В зависимости от персональной конфигурации. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Без шифрования
DoH
DoT
DNSCrypt | Частичное[^6] | Необязательное[^5] | В зависимости от персональной конфигурации, блокировка вредоносных программ по умолчанию. | ### Критерии @@ -50,7 +50,7 @@ Android 9 и новее поддерживает DNS over TLS. Его можно #### Подписанные профили -Apple не предоставляет нативного интерфейса для создания профилей зашифрованного DNS. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) — это неофициальный инструмент создания собственных профилей зашифрованного DNS, однако они не будут подписаны. Предпочтительнее использовать подписанные профили, так как подпись подтверждает надёжность источника профиля и помогает обеспечить его целостность. Зеленая метка «Проверено» присваивается подписанным профилям конфигурации. Чтобы получить больше информации о подписанном коде, смотрите статью [«О подписывании кода»](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Подписанные профили** предлагают [AdGuard](https://adguard.com/ru/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io) и [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple не предоставляет нативного интерфейса для создания профилей зашифрованного DNS. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) — это неофициальный инструмент создания собственных профилей зашифрованного DNS, однако они не будут подписаны. Предпочтительнее использовать подписанные профили, так как подпись подтверждает надёжность источника профиля и помогает обеспечить его целостность. Зеленая метка «Проверено» присваивается подписанным профилям конфигурации. Чтобы получить больше информации о подписанном коде, смотрите статью [«О подписывании кода»](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Инфо.

@@ -74,7 +74,7 @@ Apple не предоставляет нативного интерфейса д [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -123,9 +123,9 @@ DNS с самостоятельным хостингом полезно для
-![Логотип AdGuard Home](assets/img/dns/adguard-home.svg){ align=right } +![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** — это открытая [DNS-воронка](https://wikipedia.org/wiki/DNS_sinkhole), которая использует [фильтрацию DNS](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/), чтобы блокировать такой нежелательный контент, как реклама. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home предлагает продуманный интерфейс для просмотра развёрнутых отчетов и управления блокировкой контента. @@ -142,25 +142,25 @@ AdGuard Home предлагает продуманный интерфейс дл
-![Логотип Pi-hole](assets/img/dns/pi-hole.svg){ align=right } +![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** — это открытая [DNS-воронка](https://wikipedia.org/wiki/DNS_sinkhole), которая использует [фильтрацию DNS](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/), чтобы блокировать такой нежелательный контент, как реклама. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole создана для развертывания на Raspberry Pi, но она не требует именно такого специфичного оборудования. Решение предлагает дружелюбный веб-интерфейс для просмотра подробных отчетов и управления блокировкой контента. -[:octicons-home-16: Домашняя страница](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Политика конфиденциальности" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Документация} -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Исходный код" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
[^1]: AdGuard хранит показатели производительности их DNS серверов, содержащие в себе количество выполненных запросов к определенному серверу, количество заблокированных запросов и скорость обработки. Они также ведут и хранят базу данных доменов, запрошенных в течение последних 24 часов. "Нам нужна эта информация, чтобы выявлять и блокировать новые трекеры и угрозы." "Также мы храним информацию о том, сколько раз тот или иной трекер был заблокирован. Нам нужна эта информация, чтобы удалять устаревшие правила из наших фильтров." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare собирает и хранит только DNS-запросы, направленные на 1.1.1.1. Сервис не хранит персональные данные; большая часть неперсональных данных хранится только в течение 25 часов. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare собирает и хранит только DNS-запросы, направленные на 1.1.1.1. Сервис не хранит персональные данные; большая часть неперсональных данных хранится только в течение 25 часов. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D ведет логи только на Premium-серверах с пользовательскими DNS-профилями. Бесплатные сервера не ведут логов. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: DNS-сервера Mullvad доступны и для пользователей Mullvad VPN, и для остальных пользователей Интернета. Их политика конфиденциальности утверждает, что они ни в каком виде не сохраняют DNS-запросы. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: DNS-сервера Mullvad доступны и для пользователей Mullvad VPN, и для остальных пользователей Интернета. Их политика конфиденциальности утверждает, что они ни в каком виде не сохраняют DNS-запросы. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. Вы можете самостоятельно выбрать время и место хранения ваши логов. Если же специально это не настраивать, никакие данные сохраняться не будут. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 собирает некоторые данные в целях обнаружения угроз и реагирования на них. Эти данные могут быть изменены и переданы, например, в целях исследования безопасности. Quad9 не собирает и не хранит IP-адреса и другую информацию, которую они считают идентифицирующей пользователя. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 собирает некоторые данные в целях обнаружения угроз и реагирования на них. Эти данные могут быть изменены и переданы, например, в целях исследования безопасности. Quad9 не собирает и не хранит IP-адреса и другую информацию, которую они считают идентифицирующей пользователя. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/ru/email-clients.md b/i18n/ru/email-clients.md index 8e852ea2..fe0059bd 100644 --- a/i18n/ru/email-clients.md +++ b/i18n/ru/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -74,9 +74,9 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Почта Apple** входит в состав macOS и может быть расширен поддержкой OpenPGP с помощью [GPG Suite](encryption.md#gpg-suite), что добавляет возможность отправлять зашифрованную PGP электронную почту. -[:octicons-home-16: Домашняя страница](https://support.apple.com/ru-ru/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/ru/legal/privacy/ru/){ .card-link title="Политика конфиденциальности" } -[:octicons-info-16:](https://support.apple.com/ru-ru/mail){ .card-link title=Документация} +[:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail имеет закрытый исходный код. Мы реком [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail имеет закрытый исходный код. Мы реком ![Логотип Evolution](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** — это приложение для управления персональной информацией, которое обеспечивает интегрированную почту, календарь и функциональность адресной книги. Evolution имеет подробную [документацию](https://help.gnome.org/users/evolution/stable/), чтобы помочь вам начать работу. +**Evolution** — это приложение для управления персональной информацией, которое обеспечивает интегрированную почту, календарь и функциональность адресной книги. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ Canary Mail имеет закрытый исходный код. Мы реком [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ Canary Mail имеет закрытый исходный код. Мы реком [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ Canary Mail имеет закрытый исходный код. Мы реком **Mailvelope** - это расширение для браузера, позволяющее обмениваться зашифрованными электронными письмами в соответствии со стандартом шифрования OpenPGP. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ Canary Mail имеет закрытый исходный код. Мы реком Neomut - это текстовый клиент, которым сложно научиться пользоваться. Тем не менее он очень кастомизируемый. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/ru/email.md b/i18n/ru/email.md index 084e7511..d3465eb8 100644 --- a/i18n/ru/email.md +++ b/i18n/ru/email.md @@ -55,7 +55,7 @@ OpenPGP также не поддерживает прямую секретнос Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ OpenPGP также не поддерживает прямую секретнос #### :material-check:{ .pg-green } Пользовательские домены и псевдонимы -Платные подписчики Proton Mail могут использовать свой собственный домен или [универсальный адрес](https://proton.me/support/catch-all). Proton Mail также поддерживает [субадресацию](https://proton.me/support/creating-aliases), что полезно для тех, кто не хочет покупать домен. +Платные подписчики Proton Mail могут использовать свой собственный домен или [универсальный адрес](https://proton.me/support/catch-all). Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Конфиденциальные способы оплаты @@ -129,7 +129,7 @@ Proton Mail не предлагает функцию цифрового насл #### :material-check:{ .pg-green } Пользовательские домены и псевдонимы -Mailbox.org позволяет тебе использовать собственный домен, и поддерживает [универсальные](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) адреса. Mailbox.org также поддерживает [субадресацию](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), что полезно для тех, кто не хочет покупать домен. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Конфиденциальные способы оплаты @@ -137,17 +137,17 @@ Mailbox.org не принимает криптовалюты в связи с т #### :material-check:{ .pg-green } Безопасность аккаунта -Mailbox.org поддерживает [двухфакторную аутентификацию](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) только для своей веб-почты. Ты можешь использовать либо TOTP, либо [YubiKey](https://en.wikipedia.org/wiki/YubiKey) с помощью [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Веб-стандарты, такие, как [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn), пока не поддерживаются. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Веб-стандарты, такие, как [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn), пока не поддерживаются. #### :material-information-outline:{ .pg-blue } Безопасность данных -Mailbox.org позволяет шифровать входящую почту с помощью своего [зашифрованного почтового ящика](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). Новые сообщения, которые ты получаешь, будут немедленно зашифрованы твоим открытым ключом. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). Новые сообщения, которые ты получаешь, будут немедленно зашифрованы твоим открытым ключом. -Однако [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), программная платформа, используемая Mailbox.org, [не поддерживает](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) шифрование твоей адресной книги и календаря. [Отдельное решение](calendar.md) может больше подойти для этой информации. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. [Отдельное решение](calendar.md) может больше подойти для этой информации. #### :material-check:{ .pg-green } Шифрование электронной почты -Mailbox.org использует [встроенное шифрование](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) в свою веб-почту, что упрощает отправку сообщений людям с открытыми ключами OpenPGP. Они также позволяют [пользователям без Mailbox.org расшифровывать электронные письма](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) на серверах Mailbox.org. Эта функция полезна, когда получатель не имеет OpenPGP и не может расшифровать копию письма в собственном почтовом ящике. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. Эта функция полезна, когда получатель не имеет OpenPGP и не может расшифровать копию письма в собственном почтовом ящике. Mailbox.org также поддерживает обнаружение открытых ключей через HTTP с их [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). Это позволяет людям, не использующим Mailbox.org, легко находить OpenPGP-ключи учетных записей Mailbox.org для кросс-провайдерского E2EE. Это относится только к адресам электронной почты, заканчивающимся на один из собственных доменов "Mailbox.org", например @mailbox.org. При использовании кастомного домена необходимо [настроить WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) отдельно. @@ -157,9 +157,9 @@ Mailbox.org также поддерживает обнаружение откр #### :material-information-outline:{ .pg-blue } Дополнительная функциональность -Ты можешь получить доступ к своему аккаунту Mailbox.org через IMAP/SMTP, используя их сервис [.onion](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). Однако доступ к интерфейсу веб-почты через службу .onion невозможен, и ты можешь столкнуться с ошибками сертификата TLS. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). Однако доступ к интерфейсу веб-почты через службу .onion невозможен, и ты можешь столкнуться с ошибками сертификата TLS. -Все учетные записи имеют ограниченное облачное хранилище, которое [может быть зашифровано](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org также предлагает псевдоним [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), который требует шифрование TLS от соединения между почтовыми серверами, в противном случае сообщение вообще не будет отправлено. Mailbox.org также поддерживает [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) в дополнение к стандартным протоколам доступа, таким как IMAP и POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org также поддерживает [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) в дополнение к стандартным протоколам доступа, таким как IMAP и POP3. Mailbox.org имеет функцию цифрового наследия для всех тарифных планов. Ты можешь выбрать, хочешь ли ты, чтобы какие-либо из твоих данных были переданы твоим наследникам, при условии, что они подадут заявление и предоставят твоё завещание. Кроме того, ты можешь назначить наследника по имени и адресу. @@ -185,18 +185,18 @@ Mailbox.org имеет функцию цифрового наследия для [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Пользовательские домены и псевдонимы -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Конфиденциальные способы оплаты @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). Это гарантирует, что контакт клиента с бизнесом использует E2EE. Стоимость функции составляет €240/год. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). Это гарантирует, что контакт клиента с бизнесом использует E2EE. Стоимость функции составляет €240/год. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Tuta doesn't offer a digital legacy feature. - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-Количество общих псевдонимов (заканчивающихся на общий домен, например @addy.io), которые вы можете создать, ограничено 10 на бесплатном плане addy.io, 50 на плане стоимостью 1 доллар в месяц и неограниченно на плане стоимостью 4 доллара в месяц (счет выставляется на 3 доллара в течение года). Ты можешь создавать неограниченное количество стандартных псевдонимов (которые заканчиваются на домен типа @[username].addy.io или пользовательский домен в платных тарифных планах), однако, как уже говорилось ранее, это может нанести ущерб конфиденциальности, поскольку люди могут банально связать ваши стандартные псевдонимы вместе на основе общего доменного имени. Они полезны в тех случаях, когда общий домен может быть заблокирован какой-либо службой. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +Количество общих псевдонимов (заканчивающихся на общий домен, например @addy.io), которые вы можете создать, ограничено 10 на бесплатном плане addy.io, 50 на плане стоимостью 1 доллар в месяц и неограниченно на плане стоимостью 4 доллара в месяц (счет выставляется на 3 доллара в течение года). Ты можешь создавать неограниченное количество стандартных псевдонимов (которые заканчиваются на домен типа @[username].addy.io или пользовательский домен в платных тарифных планах), однако, как уже говорилось ранее, это может нанести ущерб конфиденциальности, поскольку люди могут банально связать ваши стандартные псевдонимы вместе на основе общего доменного имени. Они полезны в тех случаях, когда общий домен может быть заблокирован какой-либо службой. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Примечательные бесплатные функции: @@ -310,8 +310,8 @@ Tuta doesn't offer a digital legacy feature. **SimpleLogin** - это бесплатный сервис, который предоставляет псевдонимы электронной почты на различных общих доменных именах, и опционально платные возможности, такие как неограниченное количество псевдонимов и пользовательские домены. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Tuta doesn't offer a digital legacy feature. - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin был [приобретен компанией Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) по состоянию на 8 апреля 2022 года. Если ты используешь Proton Mail в качестве основного почтового ящика, SimpleLogin - отличный выбор. Поскольку оба продукта теперь принадлежат одной компании, тебе нужно доверять только одной организации. Мы также ожидаем, что в будущем SimpleLogin будет более тесно интегрирован с приложениями Proton. SimpleLogin по-прежнему поддерживает пересылку на любого поставщика услуг электронной почты по твоему выбору. Securitum [провела аудит](https://simplelogin.io/blog/security-audit/) SimpleLogin в начале 2022 года, и все проблемы [были устранены](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin был [приобретен компанией Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) по состоянию на 8 апреля 2022 года. Если ты используешь Proton Mail в качестве основного почтового ящика, SimpleLogin - отличный выбор. Поскольку оба продукта теперь принадлежат одной компании, тебе нужно доверять только одной организации. Мы также ожидаем, что в будущем SimpleLogin будет более тесно интегрирован с приложениями Proton. SimpleLogin по-прежнему поддерживает пересылку на любого поставщика услуг электронной почты по твоему выбору. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). В настройках SompleLogin ты можешь связать свою учетную запись SimpleLogin с учетной записью Proton. Если у тебя есть план Proton Unlimited, Business или Visionary, то ты также получаешь SimpleLogin Premium бесплатно. @@ -351,10 +351,10 @@ SimpleLogin был [приобретен компанией Proton AG](https://p **Mailcow** - это более продвинутый почтовый сервер, идеально подходящий для тех, у кого есть опыт работы с Linux. В его контейнере Docker есть всё, что тебе нужно: почтовый сервер с поддержкой DKIM, антивирус и мониторинг спама, веб-почта и ActiveSync с SOGo, а также веб-администрирование с поддержкой 2FA. -[:octicons-home-16: Домашняя страница](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Документация} -[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Исходный код" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ SimpleLogin был [приобретен компанией Proton AG](https://p Для ручной настройки мы выбрали эти две статьи: -- [Настройка почтового сервера с OpenSMTPD, Dovecot и Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [Как запустить собственный почтовый сервер](https://www.c0ffee.net/blog/mail-server-guide/) (август 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Критерии @@ -386,7 +386,7 @@ SimpleLogin был [приобретен компанией Proton AG](https://p **Минимальные требования:** - Шифрует данные аккаунта электронной почты в состоянии покоя с помощью шифрования с нулевым доступом. -- Возможность экспорта в виде [Mbox](https://en.wikipedia.org/wiki/Mbox) или отдельных .eml со стандартом [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) . +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Разрешает пользователям использовать собственное [доменное имя](https://en.wikipedia.org/wiki/Domain_name). Пользовательские доменные имена важны для пользователей, поскольку позволяют им сохранить свое агентство от сервиса, если он окажется плохим или будет приобретен другой компанией, которая не уделяет приоритетного внимания конфиденциальности. - Работает на собственной инфраструктуре, т.е. не опирается на сторонних провайдеров электронной почты. @@ -397,7 +397,7 @@ SimpleLogin был [приобретен компанией Proton AG](https://p - Поддерживает [WKD](https://wiki.gnupg.org/WKD) для улучшения обнаружения открытых ключей OpenPGP через HTTP. Пользователи GnuPG могут получить ключ, набрав: `gpg --locate-key example_user@example.com` - Поддержка временного почтового ящика для внешних пользователей. Это полезно, когда вы хотите отправить зашифрованное сообщение электронной почты, не отправляя фактическую копию получателю. Такие письма обычно имеют ограниченный срок действия, а затем автоматически удаляются. Они также не требуют от получателя настройки какой-либо криптографии, как OpenPGP. - Доступность услуг провайдера электронной почты через [службу .onion](https://en.wikipedia.org/wiki/.onion). -- [Поддержка субадресации](https://en.wikipedia.org/wiki/Email_address#Subaddressing). +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Функциональность поймать-все или псевдонимов для тех, кто владеет собственными доменами. - Использование стандартных протоколов доступа к электронной почте, таких как IMAP, SMTP или [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Стандартные протоколы доступа обеспечивают клиентам возможность легко скачать всю свою электронную почту, если они захотят перейти к другому провайдеру. @@ -425,13 +425,13 @@ SimpleLogin был [приобретен компанией Proton AG](https://p - Защита веб-почты с помощью 2FA, например, TOTP. - Шифрование с нулевым доступом, основанное на шифровании в состоянии покоя. Провайдер не имеет ключей расшифровки для хранящихся у него данных. Это предотвращает утечку данных, к которым имеет доступ недобросовестный сотрудник. Или утечку данных, которые злоумышленник украл, получив несанкционированный доступ к серверу. - Поддержка [DNSSEC](https://ru.wikipedia.org/wiki/DNSSEC). -- Отсутствие ошибок или уязвимостей TLS при профилировании такими инструментами, как [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), или [Qualys SSL Labs](https://www.ssllabs.com/ssltest); сюда входят ошибки, связанные с сертификатами, и слабые параметры DH, например, те, которые привели к [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - Настройки сервера (опционально для TLSv1.3) для сильных наборов шифров, которые поддерживают прямую секретность и аутентифицированное шифрование. - Действующая политика [MTA-STS](https://tools.ietf.org/html/rfc8461) и [TLS-RPT](https://tools.ietf.org/html/rfc8460). - Действительные записи [DANE](https://ru.wikipedia.org/wiki/DANE). - Действительные записи [SPF](https://ru.wikipedia.org/wiki/Sender_Policy_Framework) и [DKIM](https://ru.wikipedia.org/wiki/DomainKeys_Identified_Mail). - Имеет надлежащую политику и запись [DMARC](https://ru.wikipedia.org/wiki/DMARC) или использует [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) для аутентификации. Если используется DMARC-аутентификация, политика должна быть установлена на `reject` или `quarantine`. -- Предпочтение серверного пакета TLS 1.2 или более поздней версии и план [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) отправка, при условии использования SMTP. - Стандарты безопасности веб-сайта, такие как: - [Строгая транспортная безопасность HTTP](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ SimpleLogin был [приобретен компанией Proton AG](https://p - Программы "bug-bounty" и/или скоординированный процесс раскрытия информации об уязвимостях. - Стандарты безопасности веб-сайта, такие как: - [Политика безопасности контента (CSP, Content-Security-Policy)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Доверие diff --git a/i18n/ru/encryption.md b/i18n/ru/encryption.md index eebeeed3..08f0bd0e 100644 --- a/i18n/ru/encryption.md +++ b/i18n/ru/encryption.md @@ -22,15 +22,15 @@ cover: encryption.webp [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator использует шифрование AES-256 для шифро Cure53 провёл [аудит](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) некоторых криптографических библиотек Cryptomator. Эти библиотеки включают в себя [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) и [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). Аудит не проходила [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), которая сейчас используется в iOS. -В документации Cryptomator подробно описаны его предполагаемые [цели безопасности](https://docs.cryptomator.org/en/latest/security/security-target/), [архитектура безопасности](https://docs.cryptomator.org/en/latest/security/architecture/), и [лучшие практики](https://docs.cryptomator.org/en/latest/security/best-practices/) для использования. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (Файлы) @@ -81,15 +81,15 @@ Cure53 провёл [аудит](https://community.cryptomator.org/t/has-there-b [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![Логотип BitLocker](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** - решение для полного шифрования диска в Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** - решение для полного шифрования диска в Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Документация} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker [поддерживается только](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) в Pro, Enterprise и Education версиях Windows. Эту функцию можно включить и в Home версии при соответствии условиям. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. Эту функцию можно включить и в Home версии при соответствии условиям.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Откройте [дополнительные параметры запуска](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). Необходимо перезагрузиться, нажав клавишу F8 до запуска Windows, и перейти в *командную строку* в разделе **Устранение неполадок** → **Дополнительные параметры** → **Командная строка**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). Необходимо перезагрузиться, нажав клавишу F8 до запуска Windows, и перейти в *командную строку* в разделе **Устранение неполадок** → **Дополнительные параметры** → **Командная строка**. 4. Войдите под учетной записью администратора и введите следующее для запуска шифрования: ```powershell manage-bde -on c: -used @@ -183,9 +183,9 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form **LUKS** - это стандартный метод FDE для Linux. Его можно использовать для шифрования полных томов, разделов или создания зашифрованных контейнеров. -[:octicons-home-16: Домашняя страница](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } -[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Документация} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Исходный код" } +[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im ![Логотип Kryptor](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** - это бесплатный инструмент для шифрования и подписи файлов с открытым исходным кодом, использующий современные и безопасные криптографические алгоритмы. Его цель - стать улучшенной версией [age](https://github.com/FiloSottile/age) и [Minisign](https://jedisct1.github.io/minisign/), чтобы обеспечить простую, удобную для пользователя альтернативу GPG. +**Kryptor** - это бесплатный инструмент для шифрования и подписи файлов с открытым исходным кодом, использующий современные и безопасные криптографические алгоритмы. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im **Tomb** - это оболочка командной строки для LUKS. Он поддерживает стеганографию с помощью [сторонних инструментов](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Домашняя страница](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Документация} -[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Исходный код" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Поддержать} +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im OpenPGP иногда необходим для решения специфических задач, таких как цифровая подпись и шифрование электронной почты. PGP имеет множество функций и является [комплексным](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html), поскольку существует уже долгое время. Для таких задач, как подписание или шифрование файлов, мы предлагаем использовать вышеуказанные варианты. -При шифровании с помощью PGP у вас есть возможность настроить различные параметры в файле `gpg.conf`. Мы рекомендуем придерживаться стандартных опций, указанных в [FAQ пользователя GnuPG](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +При шифровании с помощью PGP у вас есть возможность настроить различные параметры в файле `gpg.conf`. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![Логотип GNU Privacy Guard](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** - это GPL-альтернатива криптографическому пакету PGP. GnuPG совместим с [RFC 4880](https://tools.ietf.org/html/rfc4880), который является текущей спецификацией IETF для OpenPGP. Проект GnuPG работает над [обновленным проектом](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) в попытке улучшить OpenPGP. GnuPG является частью фонда свободного программного обеспечения GNU и получил крупное [финансирование](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) от правительства Германии. +**GnuPG** - это GPL-альтернатива криптографическому пакету PGP. GnuPG совместим с [RFC 4880](https://tools.ietf.org/html/rfc4880), который является текущей спецификацией IETF для OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG является частью фонда свободного программного обеспечения GNU и получил крупное [финансирование](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) от правительства Германии. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ gpg --quick-gen-key alice@example.com future-default ![Логотип OpenKeychain](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** - это Android-реализация GnuPG. Он обычно требуется почтовым клиентам, таким как [K-9 Mail](email-clients.md#k-9-mail) и [FairEmail](email-clients.md#fairemail), а также другим приложениям для Android для обеспечения поддержки шифрования. Компания Cure53 завершила [аудит безопасности](https://www.openkeychain.org/openkeychain-3-6) OpenKeychain 3.6 в октябре 2015 года. Технические подробности об аудите и решениях OpenKeychain можно найти на сайте [здесь](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** - это Android-реализация GnuPG. Он обычно требуется почтовым клиентам, таким как [K-9 Mail](email-clients.md#k-9-mail) и [FairEmail](email-clients.md#fairemail), а также другим приложениям для Android для обеспечения поддержки шифрования. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Технические подробности об аудите и решениях OpenKeychain можно найти на сайте [здесь](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/ru/file-sharing.md b/i18n/ru/file-sharing.md index 6ceef202..aeb3e6a6 100644 --- a/i18n/ru/file-sharing.md +++ b/i18n/ru/file-sharing.md @@ -15,7 +15,7 @@ cover: file-sharing.webp ![Логотип Send](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** - это форк прекратившего свое существование сервиса Firefox Send от Mozilla, который позволяет отправлять файлы другим людям с помощью ссылки. Файлы шифруются на вашем устройстве, чтобы их не мог прочитать сервер, и по желанию могут быть защищены паролем. Разработчик Send держит [публичный экземпляр сайта](https://send.vis.ee/). Вы можете использовать другие публичные экземпляры или развернуть Send самостоятельно. +**Send** - это форк прекратившего свое существование сервиса Firefox Send от Mozilla, который позволяет отправлять файлы другим людям с помощью ссылки. Файлы шифруются на вашем устройстве, чтобы их не мог прочитать сервер, и по желанию могут быть защищены паролем. The maintainer of Send hosts a [public instance](https://send.vis.ee). Вы можете использовать другие публичные экземпляры или развернуть Send самостоятельно. [:octicons-home-16: Домашняя страница](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Публичные экземпляры"} @@ -80,10 +80,10 @@ ffsend upload --host https://send.vis.ee/ FILE **FreedomBox** - это операционная система, разработанная для запуска на [одноплатном компьютере](https://ru.wikipedia.org/wiki/%D0%9E%D0%B4%D0%BD%D0%BE%D0%BF%D0%BB%D0%B0%D1%82%D0%BD%D1%8B%D0%B9_%D0%BA%D0%BE%D0%BC%D0%BF%D1%8C%D1%8E%D1%82%D0%B5%D1%80). Цель FreedomBox заключается в том, чтобы максимально облегчить настройку серверных приложений для самостоятельного хостинга. -[:octicons-home-16: Домашняя страница](https://freedombox.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Документация} -[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Исходный код" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} +[:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ ffsend upload --host https://send.vis.ee/ FILE [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ ffsend upload --host https://send.vis.ee/ FILE [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/ru/financial-services.md b/i18n/ru/financial-services.md index d099c105..a9ad5905 100644 --- a/i18n/ru/financial-services.md +++ b/i18n/ru/financial-services.md @@ -28,9 +28,9 @@ cover: financial-services.webp Бесплатный тарифный план **Privacy.com** позволяет создавать до 12 виртуальных карт в месяц, устанавливать лимиты расходов по этим картам и мгновенно отключать карты. Платный тарифный план позволяет создавать до 36 карт в месяц, получать 1% кэшбэка за покупки и скрывать информацию о транзакциях от вашего банка. -[:octicons-home-16: Домашняя страница](https://privacy.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Политика конфиденциальности" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Документация} +[:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com по умолчанию передает информацию о п **MySudo** предоставляет до 9 виртуальных карт в зависимости от приобретенного вами тарифного плана. Их платные тарифные планы дополнительно включают функциональность, которая может быть полезна для совершения покупок в приватном порядке, например, виртуальные номера телефонов и адреса электронной почты, хотя для широкого использования псевдонимов электронной почты мы обычно рекомендуем других [провайдеров псевдонимов электронной почты](email.md). -[:octicons-home-16: Домашняя страница](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Политика конфиденциальности" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Документация} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ MySudo's virtual cards are currently only available via their iOS app. **CoinCards** (доступна в США и Канаде) позволяет приобретать подарочные карты для большого количества продавцов. -[:octicons-home-16: Домашняя страница](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Политика конфиденциальности" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Документация} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/ru/frontends.md b/i18n/ru/frontends.md index d613fabf..2dc68b8b 100644 --- a/i18n/ru/frontends.md +++ b/i18n/ru/frontends.md @@ -19,7 +19,7 @@ cover: frontends.webp ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T

Предупреждение

-При использовании FreeTube ваш IP-адрес все равно может быть известен YouTube, [Invidious](https://instances.invidious.io) или [SponsorBlock](https://sponsor.ajay.app/) в зависимости от вашей конфигурации. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T **Yattee** - это бесплатный, ориентированный на конфиденциальность видеоплеер с открытым исходным кодом для iOS, tvOS и macOS для [YouTube](https://youtube.com). При использовании Yattee список подписок сохраняется локально на вашем устройстве. -Вам придется сделать несколько [дополнительных шагов](https://gonzoknows.com/posts/Yattee/), прежде чем вы сможете использовать Yattee для просмотра YouTube, из-за ограничений App Store. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T

Предупреждение

-При использовании Yattee ваш IP-адрес все еще может быть известен YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) или [SponsorBlock](https://sponsor.ajay.app/) в зависимости от вашей конфигурации. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube позволяет хранить список подписок и п

Предупреждение

-При использовании LibreTube ваш IP-адрес будет виден выбранному вами экземпляру [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) и/или [SponsorBlock](https://sponsor.ajay.app/) в зависимости от вашей конфигурации. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -149,17 +149,17 @@ LibreTube позволяет хранить список подписок и п
-![Логотип Newpipe](assets/img/frontends/newpipe.svg){ align=right } +![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** - это бесплатное приложение для Android с открытым исходным кодом для [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com) и [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Список подписок и плейлисты сохраняются локально на вашем устройстве Android. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ LibreTube позволяет хранить список подписок и п
-1. По умолчанию используется экземпляр [FramaTube](https://framatube.org/), однако другие экземпляры можно добавить через **Настройки** → **Контент** → **Серверы PeerTube** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Предупреждение

@@ -190,11 +190,11 @@ LibreTube позволяет хранить список подписок и п There are a number of public instances, with some instances having [Tor](tor.md) onion services support. -[:octicons-home-16: Домашняя страница](https://invidious.io){ .md-button .md-button--primary } -[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Публичный экземпляр"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Документация} -[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Исходный код" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } +[:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -224,11 +224,11 @@ Invidious is useful if you want to disable JavaScript in your browser, such as [ Для работы Piped требуется JavaScript, и существует множество публичных экземпляров. -[:octicons-repo-16: Репозиторий](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } -[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Публичный экземпляр"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Документация} -[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Исходный код" } -[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Поддержать } +[:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } +[:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } +[:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/ru/index.md b/i18n/ru/index.md index 5234c28b..0d1d1480 100644 --- a/i18n/ru/index.md +++ b/i18n/ru/index.md @@ -62,12 +62,12 @@ schema: ## Вы нужны нам! Вот как можно помочь нам: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Посетите наш форум" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Подпишитесь на нас в Mastodon" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Помогите с разработкой" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Помогите перевести сайт" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Напишите нам в Matrix" } -[:material-information-outline:](about/index.md){ title="Узнайте о нас больше" } -[:material-hand-coin-outline:](about/donate.md){ title="Помогите проекту материально" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } Такому сайту, как Privacy Guides, важно содержать наиболее актуальную информацию. Нам нужно, чтобы читатели следили за обновлениями программного обеспечения, перечисленного на сайте, и были в курсе новостей о сервисах, которые мы рекомендуем. Сложно угнаться за быстрым темпом развития интернета, но мы стараемся изо всех сил. Если вы встретите ошибку, посчитаете сервис недостойным упоминания на нашем сайте, заметите отсутствие хорошего сервиса, найдёте лучшую альтернативу браузерному расширению или обнаружите любую другую проблему, дайте нам знать. diff --git a/i18n/ru/kb-archive.md b/i18n/ru/kb-archive.md index c2b6d16b..52d9586d 100644 --- a/i18n/ru/kb-archive.md +++ b/i18n/ru/kb-archive.md @@ -8,10 +8,10 @@ description: Некоторые страницы, которые раньше н Некоторые страницы, которые раньше находились в базе знаний, теперь можно найти в нашем блоге: -- [GrapheneOS против CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Улучшение настроек Signal](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - укрепление системы](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - работа с песочницей](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Безопасное удаление данных](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Интеграция удаления метаданных](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [Руководство по настройке iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS против CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Улучшение настроек Signal](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - укрепление системы](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - работа с песочницей](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Безопасное удаление данных](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Интеграция удаления метаданных](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [Руководство по настройке iOS](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/ru/meta/admonitions.md b/i18n/ru/meta/admonitions.md index e139fe74..c3eeaa51 100644 --- a/i18n/ru/meta/admonitions.md +++ b/i18n/ru/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/ru/meta/translations.md b/i18n/ru/meta/translations.md index a47ae8c6..64f58b9b 100644 --- a/i18n/ru/meta/translations.md +++ b/i18n/ru/meta/translations.md @@ -2,9 +2,9 @@ title: Локализация --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/ru/meta/uploading-images.md b/i18n/ru/meta/uploading-images.md index 9e1c1b7a..2b8267b4 100644 --- a/i18n/ru/meta/uploading-images.md +++ b/i18n/ru/meta/uploading-images.md @@ -17,7 +17,7 @@ title: Загрузка изображений ### PNG -Используйте [OptiPNG](https://sourceforge.net/projects/optipng/) для оптимизации PNG-изображения: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/ru/meta/writing-style.md b/i18n/ru/meta/writing-style.md index c0183a0b..aad32917 100644 --- a/i18n/ru/meta/writing-style.md +++ b/i18n/ru/meta/writing-style.md @@ -4,11 +4,11 @@ title: Стиль написания Privacy Guides написан на американском английском, и в случае сомнений вам следует обратиться к [руководству по стилю APA](https://apastyle.apa.org/style-grammar-guidelines/grammar). -В целом [Федеральное руководство США по написанию текстов](https://www.plainlanguage.gov/guidelines/) дает хорошее представление о том, как писать ясно и лаконично. Ниже мы приводим несколько важных замечаний из этих рекомендаций. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. Ниже мы приводим несколько важных замечаний из этих рекомендаций. ## Пишите для нашей аудитории -Предполагаемая [аудитория](https://www.plainlanguage.gov/guidelines/audience/) "Privacy Guides" - это в основном взрослые люди, пользующиеся техникой. Не упрощайте содержание, как будто вы обращаетесь к классу средней школы, но и не злоупотребляйте сложной терминологией в отношении понятий, с которыми не знакомы обычные пользователи компьютеров. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Не упрощайте содержание, как будто вы обращаетесь к классу средней школы, но и не злоупотребляйте сложной терминологией в отношении понятий, с которыми не знакомы обычные пользователи компьютеров. ### Обращайтесь только к тому, что люди хотят знать @@ -24,7 +24,7 @@ Privacy Guides написан на американском английском > > Когда вы обращаетесь к пользователям на "Вы", они с большей вероятностью поймут, в чем заключается их ответственность. -Источник: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Избегайте слова "пользователи" @@ -37,7 +37,7 @@ Privacy Guides написан на американском английском - Ограничьте документ примерно пятью-шестью разделами. Длинные документы, вероятно, следует разделить на отдельные страницы. - Отметьте важные идеи **жирным** или *курсивом *. -Источник: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Начните с вывода @@ -45,7 +45,7 @@ Privacy Guides написан на американском английском > > Мы часто пишем так, как думаем: сначала ставим предпосылки, а затем вывод. Возможно, это естественный способ развития мысли, но в итоге мы получаем вывод в конце абзаца. Переместите его вперед и дайте пользователям понять, куда вы направляетесь. Не заставляйте читателей держать в голове много информации, прежде чем перейти к сути. -Источник: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Тщательно подбирайте слова @@ -65,7 +65,7 @@ Privacy Guides написан на американском английском > Лишние слова тратят время вашей аудитории. Искусство написания текстов - это как разговор. Пропустите информацию, которую аудитории не нужно знать. Это может быть непросто, если вы являетесь экспертом в данной области, поэтому важно, чтобы кто-то посмотрел на информацию с точки зрения аудитории. -Источник: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Сохраняйте разговорный характер текста @@ -77,7 +77,7 @@ Privacy Guides написан на американском английском > Активный голос уточняет, кто что должен сделать. Это устраняет двусмысленность в отношении обязанностей. Не "Это должно быть сделано", а "Ты должен это сделать." -Источник: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Используйте слово "должен" для требований diff --git a/i18n/ru/mobile-browsers.md b/i18n/ru/mobile-browsers.md index b774913d..00834239 100644 --- a/i18n/ru/mobile-browsers.md +++ b/i18n/ru/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,22 +41,22 @@ schema: ## Android -На Android браузер Firefox менее безопасен, чем основанные на Chromium альтернативы: движок Mozilla, [GeckoView](https://mozilla.github.io/geckoview/), ещё не поддерживает [изоляцию сайтов](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) и не включает [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave
-![Логотип Brave](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** включает встроенный блокировщик контента и [инструменты конфиденциальности](https://brave.com/privacy-features/), многие из которых включены по умолчанию. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave основан на Chromium, поэтому он покажется тебе знакомым, а также у него не должно быть проблем совместимости с сайтами. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ Tor Browser — это единственный способ действите ##### Щиты -Brave включает несколько инструментов защиты от отслеживания в разделе [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Мы рекомендуем включить эти настройки [для всех сайтов](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-), которые ты посещаешь. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Общие настройки по умолчанию системы Brave Schields @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Эта опция обеспечивает функциональность, аналогичную расширенным [режимам блокировки](https://github.com/gorhill/uBlock/wiki/Blocking-mode) uBlock Origin или расширения [NoScript](https://noscript.net/). +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Очистить историю @@ -115,13 +115,13 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Выберите **Отключить непроксируемый протокол UDP** в [Политика обработки IP WebRTC](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) -- [ ] Отключите **Разрешить сайтам проверять наличие сохраненных способов оплаты** -- [ ] Отключите **Шлюз IPFS** (1) -- [x] Включите **Удалять файлы cookie и данные сайтов при закрытии всех окон** -- [ ] Отключите **Разрешить выполнение аналитики продукта, не нарушающей конфеденциальности** -- [ ] Отключите **Автоматически отправлять данные диагностики** -- [ ] Отключите **Автоматически отправлять ежедневные данные PING в Brave** +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Allow sites to check if you have payment methods saved** +- [ ] Uncheck **IPFS Gateway** (1) +- [x] Select **Close tabs on exit** +- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** +- [ ] Uncheck **Automatically send diagnostic reports** +- [ ] Uncheck **Automatically send daily usage ping to Brave**
@@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Синхронизация -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) позволяет синхронизировать данные браузера (историю, закладки и т. д.) между несколькими устройствами без необходимости создавать аккаунт, а также защищает их при помощи E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,11 +141,11 @@ Brave allows you to select additional content filters within the internal `brave ![Логотип Safari](assets/img/browsers/safari.svg){ align=right } -**Safari** — браузер по умолчанию на iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** — браузер по умолчанию на iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Домашняя страница](https://www.apple.com/ru/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/ru/legal/privacy/data/ru/safari/){ .card-link title="Политика конфиденциальности" } -[:octicons-info-16:](https://support.apple.com/ru-ru/guide/safari/welcome/mac){ .card-link title=Документация} +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ The **Advanced Tracking and Fingerprinting Protection** setting will randomize c - [ ] Отключи **Конфиденциальные рекламные отчеты** -Для измерения количества рекламных кликов традиционно используется технология отслеживания, нарушающая конфиденциальность пользователей. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) - это функция WebKit и предлагаемый веб-стандарт, позволяющий рекламодателям измерять эффективность веб-кампаний без ущерба для конфиденциальности пользователей. +Для измерения количества рекламных кликов традиционно используется технология отслеживания, нарушающая конфиденциальность пользователей. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. Сама по себе эта функция не вызывает особых опасений в плане конфиденциальности, и хотя вы можете оставить ее включенной, мы рекомендуем её отключить, так как она автоматически отключается в Private Browsing. @@ -201,9 +201,9 @@ The **Advanced Tracking and Fingerprinting Protection** setting will randomize c ##### Синхронизация iCloud -Синхронизация истории Safari, групп вкладок, вкладок iCloud и сохраненных паролей осуществляется с E2EE. Однако по умолчанию закладки [не используют E2EE](https://support.apple.com/ru-ru/HT202303). Apple может расшифровать их и получить к ним доступ в соответствии со своей [политикой конфиденциальности](https://www.apple.com/legal/privacy/en-ww/). +Синхронизация истории Safari, групп вкладок, вкладок iCloud и сохраненных паролей осуществляется с E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -Вы можете включить E2EE для ваших закладок и загрузок Safari, включив [расширенную защиту данных](https://support.apple.com/ru-ru/HT212520). Перейди к настройке **Apple ID → iCloud → Расширенная защита данных**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Перейди к настройке **Apple ID → iCloud → Расширенная защита данных**. - [x] Включи **Расширенная защита данных** @@ -227,7 +227,7 @@ AdGuard для iOS имеет несколько премиум-функций,
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/ru/multi-factor-authentication.md b/i18n/ru/multi-factor-authentication.md index 9cc74d6f..c84adcc7 100644 --- a/i18n/ru/multi-factor-authentication.md +++ b/i18n/ru/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -Ключи **YubiKeys** являются одними из самых популярных ключей безопасности. Некоторые модели YubiKey обладают широким набором функций, таких как: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 и WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP и HOTP](https://developers.yubico.com/OATH) аутентификация. +Ключи **YubiKeys** являются одними из самых популярных ключей безопасности. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -Одним из преимуществ YubiKey является то, что всего лишь один ключ может делать практически всё (YubiKey 5), что можно ожидать от аппаратного ключа безопасности. Перед покупкой мы рекомендуем вам пройти [тест](https://www.yubico.com/quiz/), чтобы убедиться в правильности вашего выбора. +Одним из преимуществ YubiKey является то, что всего лишь один ключ может делать практически всё (YubiKey 5), что можно ожидать от аппаратного ключа безопасности. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Домашняя страница](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Политика конфиденциальности" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Документация} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-[Сравнительная таблица](https://www.yubico.com/store/compare/) показывает особенности и сравнение ключей YubiKey. Мы настоятельно рекомендуем вам выбрать ключи из серии YubiKey 5. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. Мы настоятельно рекомендуем вам выбрать ключи из серии YubiKey 5. -YubiKeys можно запрограммировать с помощью [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) или [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). Для управления TOTP-кодами вы можете использовать [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. Для моделей, поддерживающих HOTP и TOTP, в интерфейсе OTP есть 2 слота, которые можно использовать для HOTP, и 32 слота для хранения секретов TOTP. Эти секреты хранятся в зашифрованном виде на ключе и никогда не раскрывают их для устройств, к которым они подключены. После того как Yubico Authenticator получит семя (общий секрет), он будет выдавать только шестизначные коды. Секрет никогда выдаваться не будет. Эта модель безопасности помогает ограничить возможности злоумышленника, если он скомпрометирует одно из устройств, на которых работает Yubico Authenticator, и делает YubiKey устойчивым к физическому воздействию злоумышленника. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. Если вам У **Nitrokey** есть ключ безопасности, поддерживающий [FIDO2 и WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) и называемый **Nitrokey FIDO2**. Для использования PGP необходимо приобрести один из других ключей, таких как **Nitrokey Start**, **Nitrokey Pro 2** или **Nitrokey Storage 2**. -[:octicons-home-16: Домашняя страница](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Политика конфиденциальности" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Документация} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation} -[Сравнительная таблица](https://www.nitrokey.com/#comparison) показывает особенности и сравнение ключей Nitrokey. Перечисленные ключи **Nitrokey 3** будут обладать комбинированным набором функций. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. Перечисленные ключи **Nitrokey 3** будут обладать комбинированным набором функций. -Модели Nitrokey можно настроить с помощью [приложения Nitrokey](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). Для моделей, поддерживающих HOTP и TOTP, есть 3 слота для HOTP и 15 для TOTP. Некоторые Nitrokeys могут работать в качестве менеджера паролей. Они могут хранить 16 различных учетных данных и шифровать их с помощью того же пароля, что и интерфейс OpenPGP. @@ -74,7 +74,7 @@ The firmware of YubiKey is not open source and is not updatable. Если вам -Nitrokey Pro 2, Nitrokey Storage 2 и предстоящий Nitrokey 3 поддерживают проверку целостности системы для ноутбуков с прошивкой [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/). +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. Прошивка современных моделей NitroKey (кроме **NitroKey Pro 2**) является обновляемой. @@ -127,7 +127,7 @@ Nitrokey's firmware is open source, unlike the YubiKey. Прошивка сов Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ Nitrokey's firmware is open source, unlike the YubiKey. Прошивка сов [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/ru/news-aggregators.md b/i18n/ru/news-aggregators.md index d14c0025..5555a452 100644 --- a/i18n/ru/news-aggregators.md +++ b/i18n/ru/news-aggregators.md @@ -21,7 +21,7 @@ cover: news-aggregators.webp [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ cover: news-aggregators.webp [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ cover: news-aggregators.webp **NetNewsWire** - бесплатная программа для чтения лент новостей с открытым исходным кодом для macOS и iOS с упором на нативный дизайн и набор функций. Он поддерживает типичные форматы лент, а также встроенную поддержку лент Reddit. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit позволяет подписываться на сабреддиты Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ https://www.reddit.com/r/[SUBREDDIT]/new/.rss Чтобы подписаться на YouTube-канал с помощью RSS-клиента, сначала найдите [идентификатор канала](https://support.google.com/youtube/answer/6180214?hl=ru). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/ru/notebooks.md b/i18n/ru/notebooks.md index ca317bd1..64a02a8a 100644 --- a/i18n/ru/notebooks.md +++ b/i18n/ru/notebooks.md @@ -34,7 +34,7 @@ cover: notebooks.webp - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ cover: notebooks.webp ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. В нем реализовано сквозное шифрование на всех платформах и мощная синхронизация, позволяющая делать заметки на ходу. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. В нем реализовано сквозное шифрование на всех платформах и мощная синхронизация, позволяющая делать заметки на ходу. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ cover: notebooks.webp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** - это бесплатное, открытое приложение с богатой функциональностью для ведения заметок и списков задач, которое может обрабатывать большое количество заметок в формате Markdown, упорядоченных по тегам и записным книжкам. Приложение предлагает E2EE и может синхронизироваться через Nextcloud, Dropbox и др. Приложение также предлагает легкий перенос данных из Evernote и простых текстовых заметок. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -135,9 +135,9 @@ Cryptee предлагает 100 МБ хранилища бесплатно, а
-![Логотип Org-mode](assets/img/notebooks/org-mode.svg){ align=right } +![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** - это [основной режим](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) для GNU Emacs. Org-mode предназначен для ведения заметок, to-do листов, планирования проектов и создания документов с помощью быстрой и эффективной системы работы с обычным текстом. Синхронизация возможна с помощью программ для [синхронизации файлов](file-sharing.md#синхронизация-файлов). +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode предназначен для ведения заметок, to-do листов, планирования проектов и создания документов с помощью быстрой и эффективной системы работы с обычным текстом. Синхронизация возможна с помощью программ для [синхронизации файлов](file-sharing.md#синхронизация-файлов). [:octicons-home-16: Домашняя страница](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Документация} diff --git a/i18n/ru/os/android-overview.md b/i18n/ru/os/android-overview.md index 59ffb51b..e5f0ca31 100644 --- a/i18n/ru/os/android-overview.md +++ b/i18n/ru/os/android-overview.md @@ -60,7 +60,7 @@ Android 10 и выше перешел от шифрования всего ди Обновления прошивки имеют критическое значение для поддержания безопасности. Без них ваше устройство не может быть безопасным. OEM-производители имеют соглашения о поддержке со своими партнерами для предоставления компонентов с закрытым исходным кодом на ограниченный период поддержки. Они подробно описаны в ежемесячных [бюллетенях по безопасности Android](https://source.android.com/docs/security/bulletin?hl=ru). -Поскольку компоненты телефона, такие как процессор и радиотехнологии, полагаются на компоненты с закрытым исходным кодом, обновления должны предоставляться соответствующими производителями. Поэтому важно, чтобы вы приобрели устройство в рамках активного цикла поддержки. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) и [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) поддерживают свои устройства в течение 4 лет, в то время как более дешевые продукты часто имеют более короткие циклы поддержки. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +Поскольку компоненты телефона, такие как процессор и радиотехнологии, полагаются на компоненты с закрытым исходным кодом, обновления должны предоставляться соответствующими производителями. Поэтому важно, чтобы вы приобрели устройство в рамках активного цикла поддержки. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. Устройства EOL, которые больше не поддерживаются производителем SoC, не могут получать обновления прошивки от OEM-производителей или дистрибьюторов Android. Это означает, что проблемы безопасности этих устройств останутся неисправленными. @@ -97,19 +97,19 @@ Android 13: Приложение может запрашивать разрешения для имеющихся функций. Например, приложение, которое может сканировать QR-коды, запросит разрешение на использование камеры. Некоторые приложения могут запрашивать больше разрешений, чем им нужно. -[Exodus](https://exodus-privacy.eu.org/) может быть полезен при сравнении приложений с похожими функциями. Если приложение запрашивает много разрешений и имеет много рекламы и аналитики, это вероятно плохой знак. Мы рекомендуем обращать внимание на конкретные трекеры и читать их описание, вместо того, чтобы просто **посчитать их общее количество** и предположить, что они все одинаковые. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. Если приложение запрашивает много разрешений и имеет много рекламы и аналитики, это вероятно плохой знак. Мы рекомендуем обращать внимание на конкретные трекеры и читать их описание, вместо того, чтобы просто **посчитать их общее количество** и предположить, что они все одинаковые.

Предупреждение

-Если приложение в основном представляет собой веб-сервис, отслеживание может происходить на стороне сервера. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) показывает 0 трекеров, но, безусловно, отслеживает интересы и поведение пользователей на сайте. Приложения могут избежать обнаружения, не используя стандартные библиотеки кода, созданные рекламной индустрией, хотя это маловероятно. +Если приложение в основном представляет собой веб-сервис, отслеживание может происходить на стороне сервера. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Приложения могут избежать обнаружения, не используя стандартные библиотеки кода, созданные рекламной индустрией, хотя это маловероятно.

Note

-Приложения, уважающие вашу конфиденциальность, например [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/), могут показывать некоторые трекеры, например [Google Firebase Analytics] (https://reports.exodus-privacy.eu.org/en/trackers/49/). Эта библиотека включает [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging), которая нужна для поддержки [push-уведомлений](https://en.wikipedia.org/wiki/Push_technology) в приложениях. Именно [это относится](https://fosstodon.org/@bitwarden/109636825700482007) к Bitwarden. Это не означает, что Bitwarden использует все возможности аналитики, которые предоставляет Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). Эта библиотека включает [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging), которая нужна для поддержки [push-уведомлений](https://en.wikipedia.org/wiki/Push_technology) в приложениях. Именно [это относится](https://fosstodon.org/@bitwarden/109636825700482007) к Bitwarden. Это не означает, что Bitwarden использует все возможности аналитики, которые предоставляет Google Firebase Analytics.
@@ -145,20 +145,20 @@ Android 7 and above supports a VPN kill switch, and it is available without the ### Дополнительная защита -Если у вас есть учетная запись Google, мы рекомендуем вам зарегистрироваться в [программе дополнительной защиты](https://landing.google.com/intl/ru/advancedprotection/). Она доступен бесплатно для всех, у кого есть минимум два аппаратных ключа безопасности с поддержкой [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online). +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). Она доступен бесплатно для всех, у кого есть минимум два аппаратных ключа безопасности с поддержкой [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online). Программа дополнительной защиты обеспечивает усиленный мониторинг угроз и активирует: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Только Google и проверенные сторонние приложения могут получить доступ к данным аккаунта - Сканирование входящих писем на аккаунтах Gmail на наличие [фишинга](https://en.wikipedia.org/wiki/Phishing#Email_phishing) -- Более строгое [сканирование безопасного просмотра](https://www.google.com/chrome/privacy/whitepaper.html#malware) в Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Более строгий процесс восстановления учетных записей с утраченными учетными данными - Если вы пользуетесь службами Google Play без "песочницы" (часто встречающимися в стоковых операционных системах), программа дополнительной защиты также включает [дополнительные преимущества](https://support.google.com/accounts/answer/9764949?hl=en), например: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Обязательное автоматическое сканирование устройств с помощью [Play Защиты](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Предупреждение о непроверенных приложениях ### Обновление Google Play @@ -169,7 +169,7 @@ Android 7 and above supports a VPN kill switch, and it is available without the ### Рекламный идентификатор -Все устройства с установленными Службами Google Play автоматически генерируют [рекламный идентификатор](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en), используемый для таргетированной рекламы. Отключите эту функцию, чтобы ограничить объем собираемых о вас данных. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Отключите эту функцию, чтобы ограничить объем собираемых о вас данных. В дистрибутивах андроид с [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), откройте :gear: **Настройки** → **Приложения** → **Sandboxed Google Play** → **Google Settings** → **Реклама**, и выберите *Удалить рекламный идентификатор*. diff --git a/i18n/ru/os/ios-overview.md b/i18n/ru/os/ios-overview.md index d303d97a..2ea5c45b 100644 --- a/i18n/ru/os/ios-overview.md +++ b/i18n/ru/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/ru/os/linux-overview.md b/i18n/ru/os/linux-overview.md index a07e80b3..3afea1e7 100644 --- a/i18n/ru/os/linux-overview.md +++ b/i18n/ru/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Избежать телеметрии, которая часто поставляется с проприетарными операционными системами -- Поддержать [свободу программного обеспечения](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Выбор дистрибутива @@ -42,9 +42,9 @@ Additionally, Linux falls behind in implementing [exploit mitigations](https://m Мы настоятельно рекомендуем вам выбирать дистрибутивы, которые близки к стабильным релизам программного обеспечения, часто называемые дистрибутивами с плавающим релизом. Это связано с тем, что дистрибутивы с замороженным циклом выпуска часто не обновляют версии пакетов и не получают обновлений безопасности. -В замороженных дистрибутивах, таких как [Debian](https://www.debian.org/security/faq#handling), ожидается, что сопровождающие пакетов будут вносить исправления из новых релизов для устранения уязвимостей, а не переводить программное обеспечение на новый релиз, выпущенный вышестоящим разработчиком. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. В результате незначительные исправления безопасности иногда задерживаются до следующего крупного релиза. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. В результате незначительные исправления безопасности иногда задерживаются до следующего крупного релиза. -Мы не считаем, что задержка пакетов и применение промежуточных исправлений является хорошей идеей, так как это расходится с тем, как разработчик мог задумать работу программного обеспечения. [Ричард Браун](https://rootco.de/aboutme/) подготовил презентацию об этом: +Мы не считаем, что задержка пакетов и применение промежуточных исправлений является хорошей идеей, так как это расходится с тем, как разработчик мог задумать работу программного обеспечения. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re Для поддержания безопасности системы от вас ожидается, что вы обладаете достаточными знаниями Linux, чтобы правильно настроить безопасность своей системы, например, принять систему [обязательного контроля доступа](https://en.wikipedia.org/wiki/Mandatory_access_control), настроить черные списки [модулей ядра](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security), усилить параметры загрузки, манипулировать параметрами [sysctl](https://en.wikipedia.org/wiki/Sysctl) и знать, какие компоненты им необходимы, например, [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. Пакеты AUR - это контент, созданный сообществом, он никак не проверяется и поэтому уязвим для атак на цепочки поставок программного обеспечения, что, собственно, и произошло [в прошлом](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Аналогичные предупреждения относятся к использованию сторонних персональных архивов пакетов (PPA) в дистрибутивах на базе Debian или проектов сообщества (COPR) в Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: Этот дистрибутив задерживает пакеты на 2 недели, чтобы убедиться, что их собственные изменения не сломаются, а не для того, чтобы убедиться в стабильности upstream. Когда используются пакеты AUR, они часто собираются на основе последних [библиотек](https://en.wikipedia.org/wiki/Library_(computing)) из репозиториев Arch. -- **Garuda**: Они используют [Chaotic-AUR](https://aur.chaotic.cx/), который автоматически и вслепую компилирует пакеты из AUR. Не существует процесса проверки, чтобы убедиться, что пакеты AUR не страдают от атак в цепи поставок. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. Не существует процесса проверки, чтобы убедиться, что пакеты AUR не страдают от атак в цепи поставок. ### Ядро Linux-libre и дистрибутивы "Libre" -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## Общие рекомендации @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Большинство дистрибутивов Linux имеют опцию в программе установки для включения [LUKS](../encryption.md#linux-unified-key-setup) FDE. Если этот параметр небыл выбран во время установки, вам придется создать резервную копию данных и выполнить повторную установку, поскольку шифрование применяется после [разметки диска](https://ru.wikipedia.org/wiki/%D0%A0%D0%B0%D0%B7%D0%B4%D0%B5%D0%BB_%D0%B4%D0%B8%D1%81%D0%BA%D0%B0), но до [форматирования файловых систем](https://ru.wikipedia.org/wiki/%D0%A4%D0%B0%D0%B9%D0%BB%D0%BE%D0%B2%D0%B0%D1%8F_%D1%81%D0%B8%D1%81%D1%82%D0%B5%D0%BC%D0%B0). Мы также рекомендуем безопасно удалять файлы на вашем накопителе: -- [Безопасное удаление данных :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Безопасное удаление данных :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -К счастью, [wayland-композиторы](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors), например входящие в состав [GNOME](https://www.gnome.org) и [KDE Plasma](https://kde.org), теперь имеют хорошую поддержку Wayland, а также некоторые другие композиторы, использующие [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (например, [Sway](https://swaywm.org)). Некоторые дистрибутивы, такие как Fedora и Tumbleweed, по умолчанию его используют, а некоторые другие могут начать использовать его в будущем, поскольку X11 находится в [режиме сложного обслуживания](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). Если вы используете одну из этих сред, можно просто выбрать сессию "Wayland" в менеджере отображения рабочего стола ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). Если вы используете одну из этих сред, можно просто выбрать сессию "Wayland" в менеджере отображения рабочего стола ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). Мы рекомендуем **не использовать** окружения рабочего стола или оконные менеджеры, которые не имеют поддержки Wayland, например Cinnamon (по умолчанию в Linux Mint), Pantheon (стандартный в Elementary OS), MATE, Xfce и i3. ### Проприетарная прошивка (обновления микрокода) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Некоторыми яркими примерами таких уязвимостей являются [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), и других [аппаратные уязвимости](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. В Fedora и openSUSE обновления микрокода применяются по умолчанию. @@ -131,11 +131,11 @@ Some distributions (particularly those aimed at advanced users) are more bare bo Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -Можно [рандомизировать](https://fedoramagazine.org/randomize-mac-address-nm/) [MAC-адрес](https://ru.wikipedia.org/wiki/MAC-%D0%B0%D0%B4%D1%80%D0%B5%D1%81) при использовании NetworkManager. Это обеспечивает большую конфиденциальность в сетях Wi-Fi, так как затрудняет отслеживание конкретных устройств в сети, к которой вы подключены. Это [**не**](https://papers.mathyvanhoef.com/wisec2016.pdf) делает вас анонимным. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. Это обеспечивает большую конфиденциальность в сетях Wi-Fi, так как затрудняет отслеживание конкретных устройств в сети, к которой вы подключены. Это [**не**](https://papers.mathyvanhoef.com/wisec2016.pdf) делает вас анонимным. -Мы рекомендуем изменить настройки на **random** вместо **stable**, как предлагается в [статье](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -Если вы используете [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), вам необходимо установить [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=), что позволит включить [RFC 7844 (профили анонимности для клиентов DHCP)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Рандомизация MAC-адресов Wi-Fi зависит от поддержки встроенного программного обеспечения Wi-Fi. @@ -151,6 +151,6 @@ MAC address randomization is primarily beneficial for Wi-Fi connections. For Eth Проект Fedora [подсчитывает](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting), сколько уникальных систем обращаются к его зеркалам, используя переменную [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) вместо уникального ID. Fedora делает это для определения нагрузки и предоставления лучших серверов для обновлений, где это необходимо. -Эта [опция](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) в настоящее время по умолчанию выключена. Мы рекомендуем добавить `countme=false` в `/etc/dnf/dnf.conf` на случай, если она будет включена в будущем. В системах, использующих `rpm-ostree`, например Silverblue, опция countme отключается путем маскировки таймера [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/). +Эта [опция](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) в настоящее время по умолчанию выключена. Мы рекомендуем добавить `countme=false` в `/etc/dnf/dnf.conf` на случай, если она будет включена в будущем. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE также использует [уникальный идентификатор](https://en.opensuse.org/openSUSE:Statistics) для подсчета систем, который можно отключить, удалив файл `/var/lib/zypp/AnonymousUniqueId`. diff --git a/i18n/ru/os/macos-overview.md b/i18n/ru/os/macos-overview.md index 3e741537..37d1e535 100644 --- a/i18n/ru/os/macos-overview.md +++ b/i18n/ru/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Рекомендованные настройки Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/ru/os/qubes-overview.md b/i18n/ru/os/qubes-overview.md index c9279254..8c05e466 100644 --- a/i18n/ru/os/qubes-overview.md +++ b/i18n/ru/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## Как работает Qubes OS? -Qubes использует [компартментализацию(разделение)](https://www.qubes-os.org/intro/) для обеспечения безопасности системы. Qubes создаются на основе шаблонов, по умолчанию Fedora, Debian и [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes создаются на основе шаблонов, по умолчанию Fedora, Debian и [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Архитектура Qubes](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. Например, вы можете использовать определенный цвет для банковского браузера, а другой цвет - для общего ненадежного браузера. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. Например, вы можете использовать определенный цвет для банковского браузера, а другой цвет - для общего ненадежного браузера. ![Цветная рамка](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Копирование и вставка текста -Вы можете [копировать и вставлять текст](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/), используя `qvm-copy-to-vm` или приведенные ниже инструкции: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. При этом изменения вносятся не сразу и могут быть легко отменены в случае аварии. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. При этом изменения вносятся не сразу и могут быть легко отменены в случае аварии. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Взаимодействие между ВМ -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. Он построен на базе библиотеки Xen *vchan*, которая обеспечивает изоляцию [с помощью политик](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Дополнительные советы -Для получения дополнительной информации мы рекомендуем вам обратиться к обширной документации Qubes OS, расположенной на сайте [Qubes OS Website](https://www.qubes-os.org/doc/). Офлайн копии можно загрузить из [репозитория документации](https://github.com/QubesOS/qubes-doc) Qubes OS. +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Офлайн копии можно загрузить из [репозитория документации](https://github.com/QubesOS/qubes-doc) Qubes OS. -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/ru/passwords.md b/i18n/ru/passwords.md index 3901562b..3cd2747d 100644 --- a/i18n/ru/passwords.md +++ b/i18n/ru/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Менеджер паролей operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Менеджер паролей operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Менеджер паролей operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Менеджер паролей operatingSystem: - Windows @@ -127,7 +127,7 @@ schema: Встроенные менеджеры паролей, например в браузерах и операционных системах, иногда не так хороши, как специализированные программы для управления паролями. Преимуществом встроенных менеджеров паролей является хорошая интеграция с программным обеспечением, но зачастую они могут быть очень простыми и не иметь функций конфиденциальности и безопасности, которыми обладают отдельные программы. -Например, менеджер паролей в Microsoft Edge вообще не поддерживает E2EE. Менеджер паролей Google имеет [опциональную](https://support.google.com/accounts/answer/11350823?hl=ru) поддержку E2EE, а менеджер паролей от Apple [предлагает](https://support.apple.com/ru-ru/HT202303) E2EE по умолчанию. +Например, менеджер паролей в Microsoft Edge вообще не поддерживает E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ schema: [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ schema:
-Bitwarden также имеет функцию [Bitwarden Send](https://bitwarden.com/products/send/), которая позволяет безопасно обмениваться текстом и файлами с использованием [сквозного шифрования](https://bitwarden.com/help/send-encryption). Отправленные через Bitwarden Send данные можно защитить [паролем](https://bitwarden.com/help/send-privacy/#send-passwords). Bitwarden Send также имеет функцию [автоматического удаления данных](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). Отправленные через Bitwarden Send данные можно защитить [паролем](https://bitwarden.com/help/send-privacy/#send-passwords). Bitwarden Send также имеет функцию [автоматического удаления данных](https://bitwarden.com/help/send-lifespan). Чтобы иметь возможность обмениваться файлами, вам необходима [Премиум-подписка](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans). Бесплатный план позволяет обмениваться только текстом. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![Логотип 1Password](assets/img/password-management/1password.svg){ align=right } -**1Password** — это менеджер паролей с акцентом на безопасность и простоту использования, который позволяет хранить пароли, кредитные карты, лицензии на программное обеспечение и любую другую конфиденциальную информацию в надежном цифровом хранилище. Ваши данные хранятся на серверах 1Password за [ежемесячную плату](https://1password.com/ru/sign-up/). 1Password регулярно проходит [независимые проверки на безопасность](https://support.1password.com/security-assessments/) и обеспечивает прекрасную поддержку клиентов. 1Password имеет закрытый исходный код, но безопасность продукта подробно описана в их [технической документации по безопасности](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** — это менеджер паролей с акцентом на безопасность и простоту использования, который позволяет хранить пароли, кредитные карты, лицензии на программное обеспечение и любую другую конфиденциальную информацию в надежном цифровом хранилище. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password имеет закрытый исходный код, но безопасность продукта подробно описана в их [технической документации по безопасности](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ Psono предоставляет подробную документацию п [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC хранит экспортированные данные в виде **KeePassDX** - это легкий менеджер паролей для Android, который позволяет редактировать зашифрованные данные в одном файле в формате KeePass и безопасно заполнять формы. Покупка [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) позволяет разблокировать косметический контент и нестандартные функции протокола, но, что еще важнее, поддерживает развитие проекта. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC хранит экспортированные данные в виде ![Логотип Strongbox](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** - это нативный менеджер паролей с открытым исходным кодом для iOS и macOS. Он поддерживает форматы KeePass и Password Safe, поэтому может быть использован совместно с другими менеджерами паролей, например KeePassXC, на устройствах не от Apple. Strongbox использует модель [freemium](https://strongboxsafe.com/pricing/), поэтому предлагает большинство функций бесплатно, но дополнительные [функции](https://strongboxsafe.com/comparison/) для удобства, например биометрическая аутентификация, доступны по подписке или единоразовой покупке. +**Strongbox** - это нативный менеджер паролей с открытым исходным кодом для iOS и macOS. Он поддерживает форматы KeePass и Password Safe, поэтому может быть использован совместно с другими менеджерами паролей, например KeePassXC, на устройствах не от Apple. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Кроме того, предлагается и полностью оффлайн версия: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). Эта версия урезана, чтобы уменьшить площадь атаки. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Эта версия урезана, чтобы уменьшить площадь атаки. ### Для командной строки @@ -356,7 +356,7 @@ KeePassXC хранит экспортированные данные в виде **gopass** - это менеджер паролей для командной строки, написанный на языке Go. Он работает на всех основных операционных системах для ПК и серверов (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ KeePassXC хранит экспортированные данные в виде
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/ru/photo-management.md b/i18n/ru/photo-management.md index d1cf930f..e6f66c01 100644 --- a/i18n/ru/photo-management.md +++ b/i18n/ru/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/ru/productivity.md b/i18n/ru/productivity.md index 4be09314..60ff7c95 100644 --- a/i18n/ru/productivity.md +++ b/i18n/ru/productivity.md @@ -19,9 +19,9 @@ cover: productivity.webp [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -52,11 +52,11 @@ cover: productivity.webp **CryptPad** - это приватная альтернатива популярным офисным инструментам. Все содержимое этой веб-службы шифруется сквозным шифрованием и может быть легко передано другим пользователям. -[:octicons-home-16: Домашняя страница](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Политика конфиденциальности" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Документация} -[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Исходный код" } -[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute }
@@ -99,20 +99,20 @@ cover: productivity.webp **LibreOffice** - это бесплатный офисный пакет с открытым исходным кодом и широкими функциональными возможностями. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ cover: productivity.webp **OnlyOffice** - это облачный бесплатный офисный пакет с открытым исходным кодом и широкими функциональными возможностями, включающими интеграцию с Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ cover: productivity.webp - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -175,10 +175,10 @@ cover: productivity.webp **PrivateBin** - это минималистичный онлайновый сервис размещения текста с открытым исходным кодом, где сервер не знает о вставляемых данных. Данные шифруются/дешифруются в браузере с помощью 256-битного AES. Это улучшенная версия ZeroBin. -[:octicons-home-16: Домашняя страница](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Публичный экземпляр"} -[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Документация} -[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Исходный код" } +[:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} +[:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" }
diff --git a/i18n/ru/real-time-communication.md b/i18n/ru/real-time-communication.md index b3b4f317..e0b3767b 100644 --- a/i18n/ru/real-time-communication.md +++ b/i18n/ru/real-time-communication.md @@ -22,18 +22,18 @@ cover: real-time-communication.webp **Signal** - мобильное приложение, разработанное Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Личные профили также шифруются и предоставляются только тем контактам, с которыми вы переписываетесь. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Сигнал имеет минимальные метаданные, если включена функция [запечатанного отправителя](https://signal.org/blog/sealed-sender/). Адрес отправителя шифруется вместе с текстом сообщения, серверу виден только адрес получателя. Функция запечатанного отправителя включена только для людей из вашего списка контактов, но может быть включена для всех получателей с повышенным риском получения спама. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Личные профили также шифруются и предоставляются только тем контактам, с которыми вы переписываетесь. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. Адрес отправителя шифруется вместе с текстом сообщения, серверу виден только адрес получателя. Функция запечатанного отправителя включена только для людей из вашего списка контактов, но может быть включена для всех получателей с повышенным риском получения спама. -Протокол прошел независимый [аудит](https://eprint.iacr.org/2016/1013.pdf) в 2016 году. Спецификацию протокола Signal можно найти в их [документации](https://signal.org/docs/). +Протокол прошел независимый [аудит](https://eprint.iacr.org/2016/1013.pdf) в 2016 году. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). У нас есть несколько дополнительных советов по настройке и улучшению безопасности вашей установки Signal: -[Настройка и усиление безопасности Signal :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Настройка и усиление безопасности Signal :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ Contact lists on Signal are encrypted using your Signal PIN and the server does Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -96,22 +96,22 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and
-![Логотип Briar](assets/img/messengers/briar.svg){ align=right } +![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** - это зашифрованный мессенджер, который [соединяется с ](https://briarproject.org/how-it-works/) другими клиентам с помощью сети Tor. Briar также может передавать сообщения через Wi-Fi или Bluetooth, если получатель находится в непосредственной близости. Режим локальной сети Briar может быть полезен, когда Вы не имеете доступа к Интернету. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar также может передавать сообщения через Wi-Fi или Bluetooth, если получатель находится в непосредственной близости. Режим локальной сети Briar может быть полезен, когда Вы не имеете доступа к Интернету. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and Чтобы добавить контакт в Briar, вы оба должны сначала добавить друг друга. Вы можете либо обмениваться ссылками `briar://`, либо сканировать QR-код контакта, если он находится поблизости. -Клиентское программное обеспечение прошло независимый [аудит](https://briarproject.org/news/2017-beta-released-security-audit/); протокол анонимной маршрутизации использует сеть Tor, который также был проверен в прошлом. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar имеет полностью [опубликованную документацию](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Сообщения, файлы, голосовые и видео звонки между двумя людьми, которые обмениваются ими в приватных комнатах (для которых требуется приглашение), по умолчанию являются E2EE. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -Протокол прошел независимый [аудит](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) в 2016 году. Спецификацию протокола Matrix можно найти в их [документации](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +Протокол прошел независимый [аудит](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) в 2016 году. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The Matrix protocol itself [theoretically supports forward secrecy](https://gitl **Session** - это децентрализованный мессенджер, ориентированный на приватные, безопасные и анонимные коммуникации. Session предлагает поддержку обычных чатов, групповых чатов и голосовых вызовов. -Session использует децентрализованную [Oxen Service Node Network](https://oxen.io/) для хранения и маршрутизации сообщений. Каждое зашифрованное сообщение проходит через три узла в сети Oxen Service Node Network, что делает практически невозможным для узлов собрать значимую информацию о тех, кто пользуется сетью. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Каждое зашифрованное сообщение проходит через три узла в сети Oxen Service Node Network, что делает практически невозможным для узлов собрать значимую информацию о тех, кто пользуется сетью. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/ru/router.md b/i18n/ru/router.md index 9941bc58..dcc07603 100644 --- a/i18n/ru/router.md +++ b/i18n/ru/router.md @@ -35,10 +35,10 @@ cover: router.webp **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense часто используется для файерволов, роутеров, беспроводных точек доступа, серверов DHCP, DNS серверов и конечных точек VPN. -[:octicons-home-16: Домашняя страница](https://opnsense.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Документация} -[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Исходный код" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Поддержать } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/ru/search-engines.md b/i18n/ru/search-engines.md index c0f2130e..479f76e3 100644 --- a/i18n/ru/search-engines.md +++ b/i18n/ru/search-engines.md @@ -10,7 +10,7 @@ cover: search-engines.webp Приведенные здесь рекомендации основаны на политиках конфиденциальности этих сервисов. Не существует **никакой гарантии** того, что эти политики конфиденциальности будут соблюдены. -Советуем использовать [VPN](/vpn) или [Tor](https://www.torproject.org/), если ваша модель угроз требует скрытия вашего IP-адреса от поискового провайдера. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,10 +24,10 @@ Brave Search включает такие уникальные функции, к Мы рекомендуем вам отключить [Анонимные метрики использования](https://search.brave.com/help/usage-metrics), поскольку они включены по умолчанию и могут быть отключены в настройках. -[:octicons-home-16: Домашняя страница](https://search.brave.com/){ .md-button .md-button--primary } -[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Сервис Onion" } -[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Политика конфиденциальности" } -[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Документация} +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search включает такие уникальные функции, к ![Логотип DuckDuckGo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** - одна из наиболее распространенных приватных поисковых систем. Примечательные функции поиска DuckDuckGo включают [bangs](https://duckduckgo.com/bang) и множество [мгновенных ответов] (https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). Поисковая система полагается на коммерческий API Bing для получения большинства результатов, но использует множество [других источников](https://help.duckduckgo.com/results/sources/) для получения мгновенных ответов и других не основных результатов. +**DuckDuckGo** - одна из наиболее распространенных приватных поисковых систем. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo является поисковой системой по умолчанию для браузера Tor и одним из немногих доступных вариантов в браузере Safari от Apple. -[:octicons-home-16: Домашняя страница](https://duckduckgo.com){ .md-button .md-button--primary } -[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Сервис Onion" } -[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Политика конфиденциальности" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Документация} +[:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } +[:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } +[:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation} @@ -56,7 +56,7 @@ DuckDuckGo является поисковой системой по умолч Компания DuckDuckGo базируется в США. В их [политике конфиденциальности](https://duckduckgo.com/privacy) говорится, что они **ведут логи** ваших поисковых запросов в целях улучшения качества продукции, но не записывают IP-адреса или любую другую личную информацию. -DuckDuckGo предлагает две [другие версии](https://help.duckduckgo.com/features/non-javascript/) своей поисковой системы, обе из которых не требуют JavaScript. Однако в этих версиях меньше функций. Эти версии также можно использовать в сочетании с их адресом [Tor onion](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/), добавив [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) или [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) для соответствующей версии. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. Однако в этих версиях меньше функций. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -66,9 +66,9 @@ DuckDuckGo предлагает две [другие версии](https://help. **SearXNG** - это мета-поисковая система с открытым исходным кодом и возможностью самостоятельного хостинга, агрегирующая результаты других поисковых систем и не хранящая никакой информации сама. Это активно поддерживаемый форк [SearX](https://github.com/searx/searx). -[:octicons-home-16: Домашняя страница](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Публичный экземпляр"} -[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Исходный код" } +[:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} +[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" } @@ -87,11 +87,11 @@ SearXNG — это прокси между пользователями и по ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. Одной из уникальных особенностей Startpage является [анонимный просмотр](https://www.startpage.com/en/anonymous-view/), который прилагает усилия для стандартизации действий пользователя, чтобы затруднить его уникальную идентификацию. Эта функция может быть полезна для скрытия [некоторых](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) свойств сети и браузера. Несмотря на название, на эту функцию не следует полагаться для обеспечения анонимности. Если вам нужна анонимность, используйте [Tor Browser](tor.md#tor-browser). +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Несмотря на название, на эту функцию не следует полагаться для обеспечения анонимности. Если вам нужна анонимность, используйте [Tor Browser](tor.md#tor-browser). -[:octicons-home-16: Домашняя страница](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Политика конфиденциальности" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Документация} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} @@ -104,9 +104,9 @@ Startpage регулярно ограничивает доступ к серви -Startpage базируется в Нидерландах. Согласно их [ политике конфиденциальности](https://www.startpage.com/en/privacy-policy/), они регистрируют такие данные, как: операционная система, тип браузера и язык. Они не хранят ваш IP-адрес, поисковые запросы или другую идентифицирующую вас информацию. +Startpage базируется в Нидерландах. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. Они не хранят ваш IP-адрес, поисковые запросы или другую идентифицирующую вас информацию. -Основным акционером Startpage является компания System1, занимающаяся рекламными технологиями. Мы не считаем это проблемой, поскольку у них есть отдельная [политика конфиденциальности](https://system1.com/terms/privacy-policy). Команда Privacy Guides связалась со Startpage [еще в 2020 году](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/), чтобы прояснить любые сомнения по поводу значительных инвестиций System1 в сервис. Мы были удовлетворены полученными ответами. +Основным акционером Startpage является компания System1, занимающаяся рекламными технологиями. Мы не считаем это проблемой, поскольку у них есть отдельная [политика конфиденциальности](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. Мы были удовлетворены полученными ответами. ## Критерии diff --git a/i18n/ru/tools.md b/i18n/ru/tools.md index d1a4bd36..1a5e8625 100644 --- a/i18n/ru/tools.md +++ b/i18n/ru/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides - это самый прозрачный и наде Если вы ищете какое-либо решение, то в этом списке все аппаратные и программные средства, которые мы рекомендуем. Рекомендуемые инструменты для обеспечения приватности/конфиденциальности выбираются в первую очередь на основе функций безопасности с дополнительным акцентом на децентрализованные инструменты с открытым исходным кодом. Эти инструменты можно использовать с различными моделями угроз: например, для защиты от массовой слежки или избегания big-tech компаний, — но только вы сможете определить, что необходимо именно в вашем случае. -Если вам нужна помощь в выборе лучших инструментов для обеспечения конфиденциальности и альтернативных программ для ваших нужд, начните обсуждение на нашем [форуме](https://discuss.privacyguides.net/) или в сообществе [Matrix](https://matrix.to/#/#privacyguides:matrix.org)! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! Для получения более подробной информации о каждом проекте, почему он был выбран, а также о дополнительных советах или приемах, которые мы рекомендуем, нажмите на ссылку "Узнать больше" в каждом разделе или нажмите на саму рекомендацию, чтобы перейти в этот конкретный раздел страницы. @@ -89,7 +89,7 @@ description: Privacy Guides - это самый прозрачный и наде #### Провайдеры DNS -Мы [рекомендуем](dns.md#recommended-providers) ряд зашифрованных DNS-серверов, основанных на различных критериях, таких как [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) и [Quad9](https://quad9.net/) среди прочих. Мы рекомендуем вам прочитать наши материалы о DNS перед выбором провайдера. Во многих случаях использование других DNS-провайдеров не рекомендуется. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. Мы рекомендуем вам прочитать наши материалы о DNS перед выбором провайдера. Во многих случаях использование других DNS-провайдеров не рекомендуется. [Узнать больше :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/ru/tor.md b/i18n/ru/tor.md index 11905582..4546c955 100644 --- a/i18n/ru/tor.md +++ b/i18n/ru/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org/ru/ + url: https://torproject.org sameAs: https://ru.wikipedia.org/wiki/Tor applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: Сеть **Tor** - это группа серверов, управляемых волонтёрами, которая позволяет тебе бесплатно подключаться к сети и повышать уровень конфиденциальности и безопасности в интернете. Частные лица и организации также могут делиться информацией через сеть Tor с помощью "скрытых сервисов .onion" без ущерба для своей конфиденциальности. Поскольку трафик Tor сложно заблокировать и отследить, Tor является эффективным инструментом обхода цензуры. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor работает, направляя твой трафик через эти серверы, управляемые волонтёрами, вместо прямого соединения с сайтом, который ты пытаешься посетить. Это скрывает, откуда идет трафик, и ни один сервер на пути соединения не может увидеть полный путь того, откуда и куда идет трафик, то есть даже серверы, которые ты используешь для подключения, не могут нарушить твою анонимность. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** - это выбор, если тебе нужна анонимность, поскольку он предоставляет доступ к сети Tor и мостам, а также включает в себя настройки и расширения, которые автоматически конфигурируются по выбранным уровням безопасности: *Обычный*, *Высокий* и *Высший*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ If more complete anonymity is paramount to your situation, you should **only** b -Браузер Tor предназначен для предотвращения "отпечатков браузера", или идентификации тебя на основе конфигурации твоего браузера. Поэтому крайне важно, чтобы ты **не** изменял браузер, помимо установленных по умолчанию [уровней безопасности](https://tb-manual.torproject.org/ru/security-settings/). +Браузер Tor предназначен для предотвращения "отпечатков браузера", или идентификации тебя на основе конфигурации твоего браузера. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** - это бесплатный Tor VPN для смартфонов, который направляет трафик от любого приложения на твоём устройстве через сеть Tor. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) @@ -134,7 +134,7 @@ Orbot может проксировать отдельные приложени ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ Orbot может проксировать отдельные приложени Люди, подвергающиеся цензуре, могут использовать прокси Snowflake для подключения к сети Tor. Snowflake - это отличный способ внести свой вклад в работу сети Tor, даже если у вас нет технических знаний для запуска ретранслятора или моста Tor. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake никоим образом не увеличивает вашу ко Запуск прокси Snowflake не представляет особого риска. Это даже менее рискованно, чем запуск ретранслятора или моста Tor, которые не являются особо рискованными мероприятиями. Тем не менее он все равно проксирует трафик через вашу сеть, что может иметь определенные последствия, особенно если ваша сеть ограничена в пропускной способности. Убедитесь, что вы понимаете [как работает Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home), прежде чем принимать решение о запуске прокси. -[^1]: Настройка `IsolateDestAddr` обсуждается в [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) и [документации Whonix's Stream Isolation](https://www.whonix.org/wiki/Stream_Isolation), в которых оба проекта пришли к выводу, что это неподходящий подход для большинства пользователей. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/ru/vpn.md b/i18n/ru/vpn.md index fa58d368..f28218c7 100644 --- a/i18n/ru/vpn.md +++ b/i18n/ru/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. Если вам нужна дополнительная **безопасность**, убедитесь, что вы подключаетесь к веб-сайтам, используя HTTPS. VPN не является заменой полезных привычек для обеспечения безопасности. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ If you are looking for **anonymity**, you should use the Tor Browser. **Proton VPN** - сильный соперник в сфере VPN, работающий с 2016 года. Proton AG базируется в Швейцарии и предлагает ограниченный бесплатный доступ, а также более функциональный премиум вариант. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. #### :material-check:{ .pg-green } Независимый аудит -По состоянию на январь 2020 года компания Proton VPN прошла независимый аудит от SEC Consult. SEC Consult обнаружила несколько уязвимостей среднего и низкого риска в приложениях Proton VPN для Windows, Android и iOS, все из которых Proton VPN "должным образом устранил" ещё до публикации отчетов. Ни одна из выявленных проблем не предоставила бы злоумышленнику удаленный доступ к вашему устройству или трафику. Вы можете просмотреть отдельные отчеты для каждой платформы на сайте [protonvpn.com](https://protonvpn.com/blog/open-source/). В апреле 2022 года Proton VPN прошел [еще один аудит](https://protonvpn.com/blog/no-logs-audit/), отчет был [подготовлен компанией Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). [Аттестационное письмо](https://proton.me/blog/security-audit-all-proton-apps) было предоставлено для приложений Proton VPN 9 ноября 2021 года компанией [Securitum](https://research.securitum.com). +По состоянию на январь 2020 года компания Proton VPN прошла независимый аудит от SEC Consult. SEC Consult обнаружила несколько уязвимостей среднего и низкого риска в приложениях Proton VPN для Windows, Android и iOS, все из которых Proton VPN "должным образом устранил" ещё до публикации отчетов. Ни одна из выявленных проблем не предоставила бы злоумышленнику удаленный доступ к вашему устройству или трафику. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). [Аттестационное письмо](https://proton.me/blog/security-audit-all-proton-apps) было предоставлено для приложений Proton VPN 9 ноября 2021 года компанией [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Клиенты с открытым исходным кодом @@ -84,31 +84,31 @@ Proton VPN предоставляет исходный код для своих #### :material-check:{ .pg-green } Поддержка WireGuard -Proton VPN, в основном, поддерживает протокол WireGuard®. [WireGuard](https://www.wireguard.com) - это более новый протокол, которой использует современную [криптография](https://www.wireguard.com/protocol/). Кроме того, WireGuard стремится быть более простым и производительным. +Proton VPN, в основном, поддерживает протокол WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Кроме того, WireGuard стремится быть более простым и производительным. -Proton VPN [рекомендует](https://protonvpn.com/blog/wireguard/) использовать WireGuard вместе со своими сервисами. В приложениях Proton VPN для Windows, macOS, iOS, Android, ChromeOS и Android TV протокол WireGuard используется по умолчанию; однако [поддержка](https://protonvpn.com/support/how-to-change-vpn-protocols/) для этого протокола отсутствует в их приложении для Linux. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Удалённая переадресация портов -В настоящее время Proton VPN поддерживает только эфемерную удаленную [переадресацию портов](https://protonvpn.com/support/port-forwarding/) через NAT-PMP, со временем аренды на 60 секунд. Приложение для Windows обеспечивает легкий доступ к нему, в то время как в других операционных системах вам придется запустить собственное [приложение NAT-PMP](https://protonvpn.com/support/port-forwarding-manual-setup/). Торрент приложения часто поддерживают NAT-PMP нативно. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Торрент приложения часто поддерживают NAT-PMP нативно. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Приложения для смартфонов -Помимо предоставления стандартных файлов конфигурации OpenVPN, Proton VPN имеет мобильные клиенты в [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), и [GitHub](https://github.com/ProtonVPN/android-app/releases), позволяющие легко подключаться к их серверам. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Дополнительная функциональность -В настоящее время клиенты Proton VPN поддерживают двухфакторную аутентификацию на всех платформах, кроме Linux. Proton VPN имеет собственные серверы и дата-центры в Швейцарии, Исландии и Швеции. They offer content blocking and known-malware blocking with their DNS service. Кроме того, Proton VPN также предлагает "Tor" серверы, позволяющие легко подключаться к onion сайтам, но мы все же настоятельно рекомендуем использовать для этих целей [официальный Tor Browser](https://www.torproject.org/). +В настоящее время клиенты Proton VPN поддерживают двухфакторную аутентификацию на всех платформах, кроме Linux. Proton VPN имеет собственные серверы и дата-центры в Швейцарии, Исландии и Швеции. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Функция Killswitch не работает на Mac на базе Intel -При использовании VPN killswitch [возможны системные сбои](https://protonvpn.com/support/macos-t2-chip-kill-switch/) на компьютерах Mac на базе Intel. Если вам необходима эта функция, и вы используете Mac с чипсетом Intel, вам следует рассмотреть возможность использования другой службы VPN. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. Если вам необходима эта функция, и вы используете Mac с чипсетом Intel, вам следует рассмотреть возможность использования другой службы VPN. ### IVPN @@ -118,9 +118,9 @@ Unfortunately it does not work very well in countries where sophisticated filter **IVPN** — еще один платный VPN-провайдер, работающий с 2009 года. Компания IVPN базируется в Гибралтаре. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ Unfortunately it does not work very well in countries where sophisticated filter - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ Unfortunately it does not work very well in countries where sophisticated filter #### :material-check:{ .pg-green } 37 Стран -У IVPN есть [серверы в 37 странах](https://www.ivpn.net/server-locations).(1) Выбор VPN провайдера с ближайшим к вам сервером снизит задержку при передаче трафика. Это происходит из-за более короткого маршрута (меньше промежуточных серверов) до пункта назначения. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Это происходит из-за более короткого маршрута (меньше промежуточных серверов) до пункта назначения. { .annotate } 1. Последняя проверка: 21.12.2023 @@ -148,11 +148,11 @@ Unfortunately it does not work very well in countries where sophisticated filter #### :material-check:{ .pg-green } Независимый аудит -IVPN прошла [аудит отсутствия логов от Cure53](https://cure53.de/audit-report_ivpn.pdf), который подтвердил заявление IVPN о том, что они не сохраняют логи. IVPN также подготовила [отчет о комплексном пентесте Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) в январе 2020 года. Кроме того, IVPN заявила, что в будущем планирует составлять [годовые отчеты](https://www.ivpn.net/blog/independent-security-audit-concluded). Следующий аудит был проведен [в апреле 2022 года](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) и представлен компанией Cure53 [на их сайте](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN прошла [аудит отсутствия логов от Cure53](https://cure53.de/audit-report_ivpn.pdf), который подтвердил заявление IVPN о том, что они не сохраняют логи. IVPN также подготовила [отчет о комплексном пентесте Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) в январе 2020 года. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Клиенты с открытым исходным кодом -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Исходный код можно получить из их [репозиториев на GitHub](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Исходный код можно получить из их [репозиториев на GitHub](https://github.com/ivpn). #### :material-check:{ .pg-green } Принимает наличные и Monero @@ -160,25 +160,25 @@ As of February 2020 [IVPN applications are now open source](https://www.ivpn.net #### :material-check:{ .pg-green } Поддержка WireGuard -IVPN поддерживает протокол WireGuard®️. [WireGuard](https://www.wireguard.com) - это более новый протокол, которой использует современную [криптография](https://www.wireguard.com/protocol/). Кроме того, WireGuard стремится быть более простым и производительным. +IVPN поддерживает протокол WireGuard®️. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Кроме того, WireGuard стремится быть более простым и производительным. -IVPN [рекомендует](https://www.ivpn.net/wireguard/) использовать WireGuard для их сервиса, и поэтому протокол по умолчанию используется во всех IVPN приложениях. IVPN также предлагает генератор конфигурации WireGuard для использования с официальными [приложениями](https://www.wireguard.com/install/)WireGuard. +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Удаленная переадресация портов -IVPN ранее поддерживал перенаправление портов, но убрал эту опцию в [июне 2023 года](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Отсутствие этой функции может негативно сказаться на некоторых приложениях, особенно на пиринговых приложениях, таких как торрент-клиенты. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Отсутствие этой функции может негативно сказаться на некоторых приложениях, особенно на пиринговых приложениях, таких как торрент-клиенты. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Приложения для смартфонов -Помимо обычных файлов конфигурации OpenVPN, IVPN предлагает приложения в [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) и на [GitHub](https://github.com/ivpn/android-app/releases), позволяющие легко подключиться к их серверам. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Дополнительная функциональность -Приложения IVPN поддерживают двухфакторную аутентификацию (приложения Mullvad - нет). IVPN также предоставляет функцию "[AntiTracker](https://www.ivpn.net/antitracker)", которая блокирует рекламу и трекеры на сетевом уровне. +Приложения IVPN поддерживают двухфакторную аутентификацию (приложения Mullvad - нет). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html #### :material-check:{ .pg-green } 40 Стран -У Mullvad есть [серверы в 40 странах](https://mullvad.net/servers/).(1) Выбор VPN провайдера с ближайшим к вам сервером снизит задержку при передаче трафика. Это происходит из-за более короткого маршрута (меньше промежуточных серверов) до пункта назначения. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Это происходит из-за более короткого маршрута (меньше промежуточных серверов) до пункта назначения. { .annotate } 1. Последняя проверка: 21.12.2023 @@ -223,11 +223,11 @@ IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html > Cure53 и Assured AB довольны результатами аудита, а программное обеспечение оставляет в целом положительное впечатление. Учитывая преданность безопасности внутренней команды Mullvad VPN, у тестеров нет сомнений в том, что проект находится на правильном пути с точки зрения безопасности. -В 2020 году [было объявлено](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) о проведении повторного аудита и на сайте Cure53 был размещен [итоговый отчет об аудите](https://cure53.de/pentest-report_mullvad_2020_v2.pdf): +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > Результаты этого проекта, осуществляемого в мае-июне 2020 года и направленного на комплекс Mullvad, весьма позитивны. [...] Общая экосистема приложений, используемая Mullvad, оставляет впечатление надежности и структурированности. Общая структура приложения позволяет легко и структурировано внедрять исправления и патчи. Более того, результаты, обнаруженные Cure53, демонстрируют важность постоянного аудита и переоценки текущих векторов утечки, чтобы всегда обеспечивать конфиденциальность конечных пользователей. Mullvad отлично справляется с защитой конечных пользователей от утечек личной информации и рисков, связанных с конфиденциальностью. -В 2021 году [было объявлено](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) о проведении аудита инфраструктуры и на сайте Cure53 был размещен [итоговый отчет об аудите](https://cure53.de/pentest-report_mullvad_2021_v1.pdf). Другой отчет был заказан [в июне 2022 года](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) и доступен на [сайте Assured](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Клиенты с открытым исходным кодом @@ -239,17 +239,17 @@ Mullvad предоставляет исходный код для своих н #### :material-check:{ .pg-green } Поддержка WireGuard -Mullvad поддерживает протокол WireGuard®. [WireGuard](https://www.wireguard.com) - это более новый протокол, которой использует современную [криптография](https://www.wireguard.com/protocol/). Кроме того, WireGuard стремится быть более простым и производительным. +Mullvad поддерживает протокол WireGuard®. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Кроме того, WireGuard стремится быть более простым и производительным. -Mullvad [рекомендует](https://mullvad.net/en/help/why-wireguard/) использовать WireGuard с их сервисами. Это протокол по умолчанию или единственный протокол в приложениях Mullvad для Android, iOS, macOS и Linux, но в Windows вам придется [вручную включить](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad также предлагает генератор конфигурации WireGuard для использования с официальными[приложениями](https://www.wireguard.com/install/) WireGuard. +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } Поддержка IPv6 -Mullvad позволяет вам [получить доступ к сервисам, размещенным на IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), в отличие от других провайдеров, которые блокируют IPv6-соединения. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Удалённая переадресация портов -Mullvad ранее поддерживал переадресацию портов, но убрал эту возможность в [мае 2023 года](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Отсутствие этой функции может негативно сказаться на некоторых приложениях, особенно на пиринговых приложениях, таких как торрент-клиенты. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Отсутствие этой функции может негативно сказаться на некоторых приложениях, особенно на пиринговых приложениях, таких как торрент-клиенты. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Приложения для смартфонов -Mullvad опубликовал клиенты в [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) и [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn), оба поддерживают простой в использовании интерфейс, не требующий ручной настройки соединения WireGuard. Клиент для Android также доступен на [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. Клиент для Android также доступен на [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Дополнительная функциональность -Mullvad очень прозрачен в отношении того, какими узлами они [владеют или арендуют](https://mullvad.net/en/servers/). Они используют [ShadowSocks](https://shadowsocks.org/) в конфигурации ShadowSocks + OpenVPN, что делает их более устойчивыми к фаэрволам с [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection), пытающимся блокировать VPN. Предположительно, [Китаю приходится использовать другой метод для блокировки серверов ShadowSocks](https://github.com/net4people/bbs/issues/22). Сайт Mullvad также доступен через Tor по адресу [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Предположительно, [Китаю приходится использовать другой метод для блокировки серверов ShadowSocks](https://github.com/net4people/bbs/issues/22). Сайт Mullvad также доступен через Tor по адресу [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Критерии diff --git a/i18n/sv/CODE_OF_CONDUCT.md b/i18n/sv/CODE_OF_CONDUCT.md index 4995f1e5..e9c2c64d 100644 --- a/i18n/sv/CODE_OF_CONDUCT.md +++ b/i18n/sv/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ Vad vi förväntar oss av medlemmarna i våra samhällen: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Uppför dig på ett positivt och konstruktivt sätt** diff --git a/i18n/sv/about/index.md b/i18n/sv/about/index.md index 5c00f63d..84c3eba9 100644 --- a/i18n/sv/about/index.md +++ b/i18n/sv/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** är en socialt motiverad webbplats som tillhandahåller [information](/kb) för att skydda din datasäkerhet och integritet. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } -[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Källkod" } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } +[:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > För att hitta [integritetsfokuserade alternativ] appar, kolla in sajter som Goda Rapporter och **integritetsguider**, som lista sekretessfokuserade appar i en mängd olika kategorier, särskilt inklusive e-postleverantörer (vanligtvis på betalda planer) som inte drivs av de stora teknikföretag. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > Om du letar efter en ny VPN kan du gå till rabattkoden för nästan alla poddar. Om du letar efter en **bra** VPN behöver du professionell hjälp. Samma sak gäller för e-postklienter, webbläsare, operativsystem och lösenordshanterare. Hur vet du vilket av dessa alternativ som är det bästa och mest integritetsvänliga? För det finns **Sekretessguider**, en plattform där ett antal volontärer söker dag i, dag ut för de bästa integritetsvänliga verktyg att använda på internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## Historik @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/sv/about/notices.md b/i18n/sv/about/notices.md index d948a76a..0ef0e6f8 100644 --- a/i18n/sv/about/notices.md +++ b/i18n/sv/about/notices.md @@ -29,7 +29,7 @@ This does not include third-party code embedded in this repository, or code wher This means that you can use the human-readable content in this repository for your own project, per the terms outlined in the Creative Commons Attribution-NoDerivatives 4.0 International Public License text. You may do so in any reasonable manner, but not in any way that suggests Privacy Guides endorses you or your use. You **may not** use the Privacy Guides branding in your own project without express approval from this project. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://www.copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* +We believe that the logos and other images in `assets` obtained from third-party providers are either in the public domain or **fair use**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. However, these logos and other images may still be subject to trademark laws in one or more jurisdictions. Before using this content, please ensure that it is used to identify the entity or organization that owns the trademark and that you have the right to use it under the laws which apply in the circumstances of your intended use. *When copying content from this website, you are solely responsible for ensuring that you do not infringe someone else's trademark or copyright.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ You must not conduct any systematic or automated data collection activities on o --- -*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Portions of this notice itself were adopted from [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) on GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/sv/about/privacytools.md b/i18n/sv/about/privacytools.md index b10c334a..aa51736f 100644 --- a/i18n/sv/about/privacytools.md +++ b/i18n/sv/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Allt verkade gå smidigt och de flesta av våra aktiva medlemmar gick över till ## Följande händelser -Ungefär en vecka efter övergången återkom BurungHantu online för första gången på nästan ett år, men ingen i vårt team var villig att återvända till PrivacyTools på grund av hans historiska opålitlighet. Istället för att be om ursäkt för sin långa frånvaro gick han omedelbart till offensiv och såg övergången till Privacy Guides som ett angrepp mot honom och hans projekt. Därefter raderade han [](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) många av dessa inlägg när gemenskapen påpekade att han hade varit frånvarande och övergivit projektet. +Ungefär en vecka efter övergången återkom BurungHantu online för första gången på nästan ett år, men ingen i vårt team var villig att återvända till PrivacyTools på grund av hans historiska opålitlighet. Istället för att be om ursäkt för sin långa frånvaro gick han omedelbart till offensiv och såg övergången till Privacy Guides som ett angrepp mot honom och hans projekt. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. BurungHantu hävdade att han ville fortsätta att arbeta med privacytools.io på egen hand och bad oss ta bort omdirigeringen från www.privacytools.io till [www.privacyguides.org](https://www.privacyguides.org). Vi gick med på det och bad honom att hålla subdomänerna för Matrix, Mastodon och PeerTube aktiva så att vi kan köra dem som en offentlig tjänst för vår gemenskap under åtminstone några månader, så att användare på dessa plattformar enkelt kan flytta över till andra konton. På grund av den federerade karaktären hos de tjänster vi tillhandahöll var de bundna till specifika domännamn, vilket gjorde det mycket svårt att migrera (och i vissa fall omöjligt). -Eftersom BurungHantu inte fick tillbaka kontrollen över underreddit r/privacytoolsIO när han begärde det (mer information nedan), stängdes dessa underdomäner tyvärr av från [](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) i början av oktober, vilket innebar att alla användare som fortfarande använde dessa tjänster inte längre hade möjlighet att flytta. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. BurungHantu gjorde därefter falska anklagelser om att Jonah skulle ha stulit donationer från projektet. BurungHantu hade över ett år på nacken sedan den påstådda händelsen inträffade, men han informerade aldrig någon om den förrän efter att Privacy Guides migration hade genomförts. BurungHantu har upprepade gånger ombetts av teamet [och gemenskapen](https://twitter.com/TommyTran732/status/1526153536962281474)att lämna bevis och att kommentera orsaken till sin tystnad, men han har inte gjort det. @@ -77,11 +77,11 @@ BurungHantu gjorde också ett twitterinlägg på [](https://twitter.com/privacyt Sedan den 25 september 2022 ser vi hur BurungHantus övergripande planer förverkligas på privacytools.io, och det är just därför som vi beslutade att skapa den här förklarande sidan idag. Den webbplats som han driver verkar vara en starkt SEO-optimerad version av den webbplats som rekommenderar verktyg i utbyte mot ekonomisk ersättning. Nyligen togs IVPN och Mullvad, två VPN-leverantörer som nästan alla rekommenderar [](../vpn.md) av integritetsgruppen och som är kända för sin inställning till affiliateprogram, bort från PrivacyTools. I deras ställe? NordVPN, Surfshark, ExpressVPN och hide.me: Stora VPN-företag med opålitliga plattformar och affärsmetoder som är ökända för sin aggressiva marknadsföring och sina affiliateprogram. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. De av oss som faktiskt kämpar för integritet kämpar inte mot varandra och får inte råd från den högstbjudande. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. De av oss som faktiskt kämpar för integritet kämpar inte mot varandra och får inte råd från den högstbjudande. ## privacyTools. io nu -Efter lanseringen av [r/PrivacyGuides](https://www.reddit.com/r/privacyguides)blev det opraktiskt för u/trai_dep att fortsätta moderera båda underredaktionerna, och eftersom gemenskapen var med på övergången gjordes r/privacytoolsIO [till](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) en begränsad underredaktion i ett inlägg den 1 november 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ Efter lanseringen av [r/PrivacyGuides](https://www.reddit.com/r/privacyguides)bl Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/sv/advanced/communication-network-types.md b/i18n/sv/advanced/communication-network-types.md index 1f07a2c4..f6444ca4 100644 --- a/i18n/sv/advanced/communication-network-types.md +++ b/i18n/sv/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/sv/advanced/dns-overview.md b/i18n/sv/advanced/dns-overview.md index 21889d85..2ffb67b2 100644 --- a/i18n/sv/advanced/dns-overview.md +++ b/i18n/sv/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/sv/advanced/payments.md b/i18n/sv/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/sv/advanced/payments.md +++ b/i18n/sv/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/sv/advanced/tor-overview.md b/i18n/sv/advanced/tor-overview.md index dda1435b..e081a794 100644 --- a/i18n/sv/advanced/tor-overview.md +++ b/i18n/sv/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [Hur Tor fungerar - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Lök Tjänster - Datorfil](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: Det första reläet i din krets kallas "entry guard" eller "guard". Det är ett snabbt och stabilt relä som förblir det första i din krets i 2-3 månader för att skydda mot en känd attack som bryter anonymiteten. Resten av din krets ändras med varje ny webbplats du besöker, och alla dessa reläer ger Tor: s fullständiga integritetsskydd. För mer information om hur skyddsreläer fungerar, se detta [blogginlägg](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) och [papper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) på ingångsvakter. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: Det första reläet i din krets kallas "entry guard" eller "guard". Det är ett snabbt och stabilt relä som förblir det första i din krets i 2-3 månader för att skydda mot en känd attack som bryter anonymiteten. Resten av din krets ändras med varje ny webbplats du besöker, och alla dessa reläer ger Tor: s fullständiga integritetsskydd. För mer information om hur skyddsreläer fungerar, se detta [blogginlägg](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) och [papper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) på ingångsvakter. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Reläflagga: en särskild (diskvalificering) av reläer för kretslägen (t.ex. "Guard", "Exit", "BadExit"), kretsegenskaper (t.ex. "Fast", "Stable") eller roller (t.ex. "Authority", "HSDir") som tilldelats av katalogmyndigheterna och som definieras ytterligare i specifikationen för katalogprotokollet. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/sv/android.md b/i18n/sv/android.md index 2c673f3d..0be1d42d 100644 --- a/i18n/sv/android.md +++ b/i18n/sv/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,7 +113,7 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/sv/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/sv/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/sv/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/sv/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/sv/assets/img/how-tor-works/tor-encryption.svg b/i18n/sv/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/sv/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/sv/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/sv/assets/img/how-tor-works/tor-path-dark.svg b/i18n/sv/assets/img/how-tor-works/tor-path-dark.svg index 7747be79..a88ffb1f 100644 --- a/i18n/sv/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/sv/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Din - -enhet - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Din + -enhet + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/sv/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/sv/assets/img/how-tor-works/tor-path.svg b/i18n/sv/assets/img/how-tor-works/tor-path.svg index c0612131..7095872e 100644 --- a/i18n/sv/assets/img/how-tor-works/tor-path.svg +++ b/i18n/sv/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + @@ -29,22 +29,22 @@ - Inträde + Inträde - Inträde + Inträde - Inträde + Inträde - Inträde + Inträde diff --git a/i18n/sv/basics/account-deletion.md b/i18n/sv/basics/account-deletion.md index eea307f7..6174cfa2 100644 --- a/i18n/sv/basics/account-deletion.md +++ b/i18n/sv/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### E-postadress @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. Om tjänsten inte respekterar din rätt till radering kan du kontakta din nationella dataskyddsmyndighet [](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) och du kan ha rätt till ekonomisk kompensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. Om tjänsten inte respekterar din rätt till radering kan du kontakta din nationella dataskyddsmyndighet [](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) och du kan ha rätt till ekonomisk kompensation. ### Överskrivning av kontoinformation @@ -59,4 +59,4 @@ Om du är nöjd med att all information du bryr dig om tas bort kan du säkert g ## Undvik nya konton -Som det gamla talesättet säger: "Ett uns av förebyggande åtgärder är värt ett pund av botemedel" När du känner dig frestad att registrera dig för ett nytt konto, fråga dig själv, "Behöver jag verkligen det här? Kan jag uppnå det jag behöver utan ett konto?" Det kan ofta vara mycket svårare att radera ett konto än att skapa ett. Och även efter att du har raderat eller ändrat informationen på ditt konto kan det finnas en cachad version från en tredje part, till exempel [Internet Archive](https://archive.org/). Undvik frestelsen när du kan - ditt framtida jag kommer att tacka dig! +Som det gamla talesättet säger: "Ett uns av förebyggande åtgärder är värt ett pund av botemedel" När du känner dig frestad att registrera dig för ett nytt konto, fråga dig själv, "Behöver jag verkligen det här? Kan jag uppnå det jag behöver utan ett konto?" Det kan ofta vara mycket svårare att radera ett konto än att skapa ett. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Undvik frestelsen när du kan - ditt framtida jag kommer att tacka dig! diff --git a/i18n/sv/basics/common-misconceptions.md b/i18n/sv/basics/common-misconceptions.md index 74650997..5aeaae95 100644 --- a/i18n/sv/basics/common-misconceptions.md +++ b/i18n/sv/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/sv/basics/common-threats.md b/i18n/sv/basics/common-threats.md index c9351259..7bde1416 100644 --- a/i18n/sv/basics/common-threats.md +++ b/i18n/sv/basics/common-threats.md @@ -55,7 +55,7 @@ I **webbläsare**, **emailklienter** och **kontorsprogram** körs vanligtvis kod -Om du är orolig för **fysiska attacker** bör du använda ett operativsystem med en säker verifierad uppstart, t.ex. Android, iOS, macOS eller [Windows (med TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). Du bör också se till att enheten är krypterad och att operativsystemet använder en TPM eller Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) eller [Element](https://developers.google.com/android/security/android-ready-se) för att begränsa försöken att ange krypteringsfrasen. Du bör undvika att dela din dator med personer du inte litar på, eftersom de flesta stationära operativsystem inte krypterar data separat per användare. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). Du bör också se till att enheten är krypterad och att operativsystemet använder en TPM eller Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) eller [Element](https://developers.google.com/android/security/android-ready-se) för att begränsa försöken att ange krypteringsfrasen. Du bör undvika att dela din dator med personer du inte litar på, eftersom de flesta stationära operativsystem inte krypterar data separat per användare. ## Sekretess från tjänsteleverantörer @@ -89,16 +89,16 @@ Massövervakning är ett komplicerat försök att övervaka "beteende, många ak

Atlas of Surveillance

-Om du vill veta mer om övervakningsmetoder och hur de tillämpas i din stad kan du också ta en titt på [Atlas of Surveillance] (https://atlasofsurveillance.org/) från [Electronic Frontier Foundation] (https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Regeringar rättfärdigar ofta massövervakningsprogram som nödvändiga medel för att bekämpa terrorism och förebygga brottslighet. Men kränker de mänskliga rättigheterna, är det oftast används för att oproportionerligt rikta minoritetsgrupper och politiska dissidenter, bland annat.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

Med anledning av [Edward Snowdens avslöjanden om regeringsprogram som [PRISM](https://en.wikipedia.org/wiki/PRISM) och [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)] erkände underrättelsetjänstemännen också att NSA i åratal i hemlighet hade samlat in uppgifter om praktiskt taget alla amerikaners telefonsamtal - vem som ringer till vem, när samtalen görs och hur länge de varar. Den här typen av information kan, när den samlas in av NSA dag efter dag, avslöja otroligt känsliga detaljer om människors liv och umgänge, t. ex. om de har ringt till en pastor, en abortvårdare, en missbruksrådgivare eller en självmordshotline. @@ -144,7 +144,7 @@ Om du redan har skickat in din riktiga information till webbplatser som inte bor Censur på nätet kan utföras (i varierande grad) av aktörer som totalitära regeringar, nätverksadministratörer och tjänsteleverantörer. Dessa försök att kontrollera kommunikation och begränsa tillgången till information kommer alltid att vara oförenliga med den mänskliga rätten till yttrandefrihet.[^5] -Censur på företagsplattformar blir allt vanligare, eftersom plattformar som Twitter och Facebook ger efter för allmänhetens efterfrågan, marknadstryck och påtryckningar från myndigheter. Statliga påtryckningar kan vara dolda förfrågningar till företag, till exempel när Vita huset [begär att en provocerande YouTube-video ska tas bort](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html), eller öppna förfrågningar, till exempel när den kinesiska regeringen kräver att företag ska följa en strikt censurregim. +Censur på företagsplattformar blir allt vanligare, eftersom plattformar som Twitter och Facebook ger efter för allmänhetens efterfrågan, marknadstryck och påtryckningar från myndigheter. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. Människor som oroar sig för hotet om censur kan använda teknik som [Tor](../advanced/tor-overview.md) för att kringgå den och stödja censurresistenta kommunikationsplattformar som [Matrix](../real-time-communication.md#element), som inte har någon centraliserad kontoinspektion som kan stänga konton godtyckligt. @@ -162,5 +162,5 @@ Du måste alltid överväga riskerna med att försöka kringgå censur, de poten [^1]: Wikipedia: [*Massövervakning*](https://en.wikipedia.org/wiki/Mass_surveillance) och [*Övervakning*](https://en.wikipedia.org/wiki/Surveillance). [^2]: Usa: s tillsynsnämnd för integritet och medborgerliga fri- och rättigheter: [*Rapport om telefonregistreringsprogrammet som genomförts enligt avsnitt 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Övervakningskapitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Du bör också använda andra metoder för att minska risken. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Du bör också använda andra metoder för att minska risken. [^5]: Förenta nationerna: [*Universella förklaringen om de mänskliga rättigheterna*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/sv/basics/email-security.md b/i18n/sv/basics/email-security.md index 2f86f02e..508791e5 100644 --- a/i18n/sv/basics/email-security.md +++ b/i18n/sv/basics/email-security.md @@ -13,7 +13,7 @@ E-post används därför bäst för att ta emot transaktionsmeddelanden (t. ex. Standardmetoden för att lägga till E2EE i e-postmeddelanden mellan olika e-postleverantörer är att använda OpenPGP. Det finns olika implementeringar av OpenPGP-standarden, de vanligaste är [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) och [OpenPGP.js](https://openpgpjs.org). -Det finns en annan standard som är populär bland företag och som heter [S/MIME](https://en.wikipedia.org/wiki/S/MIME), men den kräver ett certifikat som utfärdats av en [Certifikatmyndighet](https://en.wikipedia.org/wiki/Certificate_authority) (alla utfärdar inte S/MIME-certifikat). Den har stöd för [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) och [Outlook for Web eller Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +Det finns en annan standard som är populär bland företag och som heter [S/MIME](https://en.wikipedia.org/wiki/S/MIME), men den kräver ett certifikat som utfärdats av en [Certifikatmyndighet](https://en.wikipedia.org/wiki/Certificate_authority) (alla utfärdar inte S/MIME-certifikat). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Även om du använder OpenPGP har det inte stöd för [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), vilket innebär att om antingen din eller mottagarens privata nyckel någonsin stjäls kommer alla tidigare meddelanden som krypterats med den att avslöjas. Det är därför vi rekommenderar [snabbmeddelanden](../real-time-communication.md) som implementerar vidarebefordran av sekretess via e-post för person-till-person-kommunikation när det är möjligt. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ E-postleverantörer som tillåter dig att använda standardprotokoll som IMAP oc ### Hur skyddar jag mina privata nycklar? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Meddelandet dekrypteras sedan av smartkortet och det dekrypterade innehållet skickas tillbaka till enheten. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Meddelandet dekrypteras sedan av smartkortet och det dekrypterade innehållet skickas tillbaka till enheten. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/sv/basics/multi-factor-authentication.md b/i18n/sv/basics/multi-factor-authentication.md index b60e01a5..b92e5286 100644 --- a/i18n/sv/basics/multi-factor-authentication.md +++ b/i18n/sv/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Flerfaktorsautentisering kan användas för att säkra lokala inloggningar, SSH- ### Windows -Yubico har en dedikerad [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) som lägger till Challenge-Response-autentisering för inloggningsflödet med användarnamn och lösenord för lokala Windows-konton. Om du har en YubiKey med stöd för autentisering med utmaningssvar kan du ta en titt på [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), där du kan konfigurera MFA på din Windows-dator. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS har [inbyggt stöd](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) för autentisering med smarta kort (PIV). Om du har ett smartkort eller en hårdvarunyckel som stöder PIV-gränssnittet, till exempel YubiKey, rekommenderar vi att du följer dokumentationen från leverantören av smartkortet eller hårdvarunyckeln och konfigurerar andrafaktorsautentisering för din macOS-dator. -[Använda din YubiKey som ett smartkort i macOS](https://support.yubico.com/hc/en-us/articles/360016649059) som kan hjälpa dig att ställa in din YubiKey på macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. När din smartkort/säkerhetsnyckel har ställts in rekommenderar vi att du kör det här kommandot i terminalen: @@ -147,22 +147,22 @@ Om värdnamnet på ditt system ändras (till exempel på grund av DHCP), skulle
-Modulen `pam_u2f` på Linux kan ge tvåfaktorsautentisering för inloggning på de flesta populära Linuxdistributioner. Om du har en maskinvarusäkerhetsnyckel som stöder U2F kan du konfigurera MFA-autentisering för inloggning. Yubico har en guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) som borde fungera för alla distributioner. Pakethanteraren kommandon-såsom `apt-get`-och paketnamn kan dock skilja sig. Den här guiden gäller **inte** för Qubes OS. +Modulen `pam_u2f` på Linux kan ge tvåfaktorsautentisering för inloggning på de flesta populära Linuxdistributioner. Om du har en maskinvarusäkerhetsnyckel som stöder U2F kan du konfigurera MFA-autentisering för inloggning. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. Pakethanteraren kommandon-såsom `apt-get`-och paketnamn kan dock skilja sig. Den här guiden gäller **inte** för Qubes OS. ### Qubes OS -Qubes OS har stöd för autentisering med Challenge-Response-autentisering med YubiKeys. Om du har en YubiKey med stöd för autentisering med utmaningssvar kan du ta en titt på dokumentationen för Qubes OS [YubiKey](https://www.qubes-os.org/doc/yubikey/) om du vill konfigurera MFA på Qubes OS. +Qubes OS har stöd för autentisering med Challenge-Response-autentisering med YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hårdvarusäkerhetsnycklar -SSH MFA kan konfigureras med flera olika autentiseringsmetoder som är populära med hårdvarusäkerhetsnycklar. Vi rekommenderar att du läser Yubicos dokumentation på [](https://developers.yubico.com/SSH/) om hur du ställer in detta. +SSH MFA kan konfigureras med flera olika autentiseringsmetoder som är populära med hårdvarusäkerhetsnycklar. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Tidsbaserat engångslösenord (TOTP) -SSH MFA kan också ställas in med TOTP. DigitalOcean har tillhandahållit en handledning [Hur man ställer in flerfaktorsautentisering för SSH på Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Det mesta bör vara likadant oavsett distribution, men kommandona för pakethanteraren - t. ex. `apt-get`- och paketnamnen kan skilja sig åt. +SSH MFA kan också ställas in med TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Det mesta bör vara likadant oavsett distribution, men kommandona för pakethanteraren - t. ex. `apt-get`- och paketnamnen kan skilja sig åt. ### KeePass (och KeePassXC) -KeePass- och KeePassXC-databaser kan säkras med hjälp av Challenge-Response eller HOTP som andrafaktorsautentisering. Yubico har tillhandahållit ett dokument för KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) och det finns också ett dokument på webbplatsen [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa). +KeePass- och KeePassXC-databaser kan säkras med hjälp av Challenge-Response eller HOTP som andrafaktorsautentisering. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/sv/basics/passwords-overview.md b/i18n/sv/basics/passwords-overview.md index 74e62bf1..30f452ba 100644 --- a/i18n/sv/basics/passwords-overview.md +++ b/i18n/sv/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/sv/basics/vpn-overview.md b/i18n/sv/basics/vpn-overview.md index e3c25d95..07078b70 100644 --- a/i18n/sv/basics/vpn-overview.md +++ b/i18n/sv/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. För att kompensera för detta dirigerar VPN-leverantörer vanligtvis alla paket som inte är TCP-paket genom sin VPN-server (ditt första hopp). Detta är fallet med [ProtonVPN](https://protonvpn.com/support/tor-vpn/). När du använder denna Tor-över-VPN-inställning har du inte heller kontroll över andra viktiga Tor-funktioner, t.ex. [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (använder en annan Tor-krets för varje domän du besöker). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. För att kompensera för detta dirigerar VPN-leverantörer vanligtvis alla paket som inte är TCP-paket genom sin VPN-server (ditt första hopp). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Relevant information -- [Problemet med VPN- och integritetsgranskningswebbplatser](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Undersökning av gratis VPN-app](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Dolda VPN-ägare avslöjas: 101 VPN-produkter som drivs av endast 23 företag](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [Det här kinesiska företaget ligger i hemlighet bakom 24 populära appar som kräver farliga behörigheter](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - en mycket osäker berättelse](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) av Dennis Schubert +- [Problemet med VPN- och integritetsgranskningswebbplatser](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Undersökning av gratis VPN-app](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Dolda VPN-ägare avslöjas: 101 VPN-produkter som drivs av endast 23 företag](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [Det här kinesiska företaget ligger i hemlighet bakom 24 populära appar som kräver farliga behörigheter](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/sv/basics/why-privacy-matters.md b/i18n/sv/basics/why-privacy-matters.md index b89423e0..b48c26e5 100644 --- a/i18n/sv/basics/why-privacy-matters.md +++ b/i18n/sv/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/sv/calendar.md b/i18n/sv/calendar.md index a479c146..bba70ec6 100644 --- a/i18n/sv/calendar.md +++ b/i18n/sv/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/sv/cloud.md b/i18n/sv/cloud.md index 022c06f7..7602166c 100644 --- a/i18n/sv/cloud.md +++ b/i18n/sv/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Kriterier diff --git a/i18n/sv/cryptocurrency.md b/i18n/sv/cryptocurrency.md index eb45d4a2..a862f990 100644 --- a/i18n/sv/cryptocurrency.md +++ b/i18n/sv/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/sv/data-redaction.md b/i18n/sv/data-redaction.md index c64afcbb..f22c483c 100644 --- a/i18n/sv/data-redaction.md +++ b/i18n/sv/data-redaction.md @@ -88,12 +88,12 @@ Appen erbjuder flera sätt att radera metadata från bilder. Namn: **Metapho** är en enkel och ren visare för fotometadata som datum, filnamn, storlek, kameramodell, slutartid och plats. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ Appen erbjuder flera sätt att radera metadata från bilder. Namn: **PrivacyBlur** är en gratis app som kan sudda ut känsliga delar av bilder innan de delas på nätet. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ Appen erbjuder flera sätt att radera metadata från bilder. Namn: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/sv/desktop-browsers.md b/i18n/sv/desktop-browsers.md index d1cdb1ac..9be6901b 100644 --- a/i18n/sv/desktop-browsers.md +++ b/i18n/sv/desktop-browsers.md @@ -70,8 +70,8 @@ Om du vill surfa anonymt på internet bör du använda [Tor](tor.md) i stället. **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ Om du vill surfa anonymt på internet bör du använda [Tor](tor.md) i stället. -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** innehåller en inbyggd innehållsblockerare och [integritetsfunktioner] (https://brave.com/privacy-features/), varav många är aktiverade som standard. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave bygger på webbläsarprojektet Chromium, så den bör kännas bekant och ha minimala problem med webbkompatibilitet. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Sköldar -Brave har några åtgärder mot fingeravtryck i sin funktion [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Vi föreslår att du konfigurerar dessa alternativ [globalt](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) på alla sidor som du besöker. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields alternativ kan nedgraderas vid behov för varje enskild plats, men som standard rekommenderar vi att du ställer in följande: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) gör det möjligt att få tillgång till dina webbläsardata (historik, bokmärken osv.) på alla dina enheter utan att du behöver ett konto och skyddar dem med E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ Vi arbetar med att fastställa kriterier för varje del av vår webbplats, och d - Available on Linux, macOS, and Windows. - Eventuella ändringar som krävs för att göra webbläsaren mer integritetsvänlig bör inte påverka användarupplevelsen negativt. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Bästa fall Våra kriterier för bästa fall representerar vad vi skulle vilja se av det perfekta projektet i denna kategori. Våra rekommendationer kanske inte innehåller alla eller några av dessa funktioner, men de som gör det kan vara högre rankade än andra på den här sidan. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -462,4 +462,4 @@ Våra kriterier för bästa fall representerar vad vi skulle vilja se av det per - Måste direkt påverka användarens integritet, det vill säga får inte bara ge information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/sv/desktop.md b/i18n/sv/desktop.md index 70421fb0..eeff2ea4 100644 --- a/i18n/sv/desktop.md +++ b/i18n/sv/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. Den täcker många rekommendationer för sekretess och skydd av integritet som standard. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/sv/device-integrity.md b/i18n/sv/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/sv/device-integrity.md +++ b/i18n/sv/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/sv/dns.md b/i18n/sv/dns.md index 55ac74dc..d39da30c 100644 --- a/i18n/sv/dns.md +++ b/i18n/sv/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## Recommended Providers -| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | +| DNS Provider | Privacy Policy | Protocols | Logging | ECS | Filtering | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | ### Kriterier @@ -50,7 +50,7 @@ After installation of either a configuration profile or an app that uses the DNS #### Signed Profiles -Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home features a polished web interface to view insights and manage blocked content. @@ -144,13 +144,13 @@ AdGuard Home features a polished web interface to view insights and manage block ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -159,8 +159,8 @@ Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to suc
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/sv/email-clients.md b/i18n/sv/email-clients.md index 578076ef..c255ba67 100644 --- a/i18n/sv/email-clients.md +++ b/i18n/sv/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/sv/email.md b/i18n/sv/email.md index c2e1c137..dee26f58 100644 --- a/i18n/sv/email.md +++ b/i18n/sv/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail has internal crash reports that they **do not** share with third par #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. +Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -129,7 +129,7 @@ Proton Mail doesn't offer a digital legacy feature. #### :material-check:{ .pg-green } Custom Domains and Aliases -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -137,17 +137,17 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro #### :material-check:{ .pg-green } Account Security -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security -Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } Email Encryption -Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Your account will be set to a restricted user account when your contract ends, a #### :material-information-outline:{ .pg-blue } Additional Functionality -You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. -All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Kriterier @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/sv/encryption.md b/i18n/sv/encryption.md index d1b4c93e..4cf48fec 100644 --- a/i18n/sv/encryption.md +++ b/i18n/sv/encryption.md @@ -22,15 +22,15 @@ De alternativ som anges här är flera plattformar och bra för att skapa krypte [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator använder AES-256-kryptering för att kryptera både filer och filna Vissa kryptografiska bibliotek från Cryptomator har granskats [av Cure53](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44). De granskade biblioteken omfattar följande: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) och [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). Granskningen omfattade inte [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), som är ett bibliotek som används av Cryptomator för iOS. -I Cryptomators dokumentation beskrivs närmare det avsedda [säkerhetsmålet](https://docs.cryptomator.org/en/latest/security/security-target/), [säkerhetsarkitektur](https://docs.cryptomator.org/en/latest/security/architecture/)och [bästa praxis](https://docs.cryptomator.org/en/latest/security/best-practices/) för användning. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (Fil) @@ -81,15 +81,15 @@ I Cryptomators dokumentation beskrivs närmare det avsedda [säkerhetsmålet](ht [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker-logotyp](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** är den lösning för fullständig volymkryptering som ingår i Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** är den lösning för fullständig volymkryptering som ingår i Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker stöds endast av [](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) i Windows utgåvorna Pro, Enterprise och Education. Den kan aktiveras i Home-utgåvorna om de uppfyller förutsättningarna. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. Den kan aktiveras i Home-utgåvorna om de uppfyller förutsättningarna.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Avancerade startalternativ](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). Du måste starta om och samtidigt trycka på F8-tangenten innan Windows startar och gå in i kommandotolken ** i **Felsökning** → **Avancerade alternativ** → **Kommandotolk**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). Du måste starta om och samtidigt trycka på F8-tangenten innan Windows startar och gå in i kommandotolken ** i **Felsökning** → **Avancerade alternativ** → **Kommandotolk**. 4. Logga in med ditt administratörskonto och skriv detta i kommandotolken för att starta kryptering: ```powershell manage-bde -on c: -used @@ -183,9 +183,9 @@ Vi rekommenderar att du lagrar en lokal återställningsnyckel på en säker pla **LUKS** är standardmetoden för FDE för Linux. Den kan användas för att kryptera hela volymer, partitioner eller skapa krypterade behållare. -[:octicons-home-16: Repository](https://github.com/Hackeralert/Picocrypt){ .md-button .md-button--primary } -[:octicons-info-16:](https://github.com/Hackeralert/Picocrypt){ .card-link title="Source Code" } -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } +[:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Verktyg med kommandoradsgränssnitt är användbara för att integrera [skalskri ![Kryptor-logotyp](assets/img/encryption-software/kryptor.png){ align=right } -** Kryptor** är ett gratis och öppet källkodsverktyg för filkryptering och signering som använder moderna och säkra kryptografiska algoritmer. Det syftar till att vara en bättre version av [age](https://github.com/FiloSottile/age) och [Minisign](https://jedisct1.github.io/minisign/) för att ge ett enkelt, enklare alternativ till GPG. +** Kryptor** är ett gratis och öppet källkodsverktyg för filkryptering och signering som använder moderna och säkra kryptografiska algoritmer. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Verktyg med kommandoradsgränssnitt är användbara för att integrera [skalskri * * Tomb * * är ett kommandoradsskal för LUKS. Den stöder steganografi via [verktyg från tredje part] (https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://openwrt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://openwrt.org/docs/start){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Verktyg med kommandoradsgränssnitt är användbara för att integrera [skalskri OpenPGP behövs ibland för specifika uppgifter som digital signering och kryptering av e-post. PGP har många funktioner och är [komplext](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) eftersom det har funnits länge. För uppgifter som signering eller kryptering av filer föreslår vi ovanstående alternativ. -Vid kryptering med PGP har du möjlighet att konfigurera olika alternativ i din `gpg.conf` -fil. Vi rekommenderar att du använder de standardalternativ som anges i [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +Vid kryptering med PGP har du möjlighet att konfigurera olika alternativ i din `gpg.conf` -fil. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard-logotypen](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG * * är ett GPL-licensierat alternativ till PGP-paketet med kryptografisk programvara. GnuPG är kompatibel med [RFC 4880](https://tools.ietf.org/html/rfc4880), som är den aktuella IETF-specifikationen för OpenPGP. GnuPG-projektet har arbetat med ett [uppdaterat utkast](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) i ett försök att modernisera OpenPGP. GnuPG är en del av Free Software Foundations GNU-programvaruprojekt och har fått stora [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) från den tyska regeringen. +**GnuPG * * är ett GPL-licensierat alternativ till PGP-paketet med kryptografisk programvara. GnuPG är kompatibel med [RFC 4880](https://tools.ietf.org/html/rfc4880), som är den aktuella IETF-specifikationen för OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG är en del av Free Software Foundations GNU-programvaruprojekt och har fått stora [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) från den tyska regeringen. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ Vi rekommenderar att du tar en titt på deras [First steps] (https://gpgtools.te ![OpenKeychain-logotyp](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** är en Android-implementering av GnuPG. Det krävs vanligtvis av e-postklienter som [K-9 Mail](email-clients.md#k-9-mail) och [FairEmail](email-clients.md#fairemail) och andra Android-appar för att ge krypteringsstöd. Cure53 genomförde en [säkerhetsrevision] (https://www.openkeychain.org/openkeychain-3-6) av OpenKeychain 3.6 i oktober 2015. Tekniska detaljer om granskningen och OpenKeychains lösningar finns på [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** är en Android-implementering av GnuPG. Det krävs vanligtvis av e-postklienter som [K-9 Mail](email-clients.md#k-9-mail) och [FairEmail](email-clients.md#fairemail) och andra Android-appar för att ge krypteringsstöd. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Tekniska detaljer om granskningen och OpenKeychains lösningar finns på [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/sv/file-sharing.md b/i18n/sv/file-sharing.md index 93c86304..337ebed6 100644 --- a/i18n/sv/file-sharing.md +++ b/i18n/sv/file-sharing.md @@ -15,7 +15,7 @@ Upptäck hur du kan dela dina filer privat mellan dina enheter, med vänner och ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** är en förgrening av Mozillas nedlagda Firefox Send-tjänst som låter dig skicka filer till andra med en länk. Filerna krypteras på din enhet så att de inte kan läsas av servern, och de kan också skyddas med lösenord. Den som upprätthåller Send är värd för en [offentlig instans] (https://send.vis.ee/). Du kan använda andra offentliga instanser, eller du kan vara värd för Skicka själv. +**Send** är en förgrening av Mozillas nedlagda Firefox Send-tjänst som låter dig skicka filer till andra med en länk. Filerna krypteras på din enhet så att de inte kan läsas av servern, och de kan också skyddas med lösenord. The maintainer of Send hosts a [public instance](https://send.vis.ee). Du kan använda andra offentliga instanser, eller du kan vara värd för Skicka själv. [:octicons-home-16: Startsida](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-server-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } @@ -80,8 +80,8 @@ Vi arbetar med att fastställa kriterier för varje del av vår webbplats, och d **FreedomBox** är ett operativsystem som är utformat för att köras på en [single-board computer (SBC)] (https://en.wikipedia.org/wiki/Single-board_computer). Syftet är att göra det enkelt att konfigurera serverprogram som du kanske vill vara värd för själv. -[:octicons-home-16: Homepage](https://openwrt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://openwrt.org/docs/start){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } [:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute } @@ -101,9 +101,9 @@ Vi arbetar med att fastställa kriterier för varje del av vår webbplats, och d [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ Vi rekommenderar inte att du använder [E2EE App](https://apps.nextcloud.com/app [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/sv/financial-services.md b/i18n/sv/financial-services.md index 7475d824..e48857aa 100644 --- a/i18n/sv/financial-services.md +++ b/i18n/sv/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/sv/frontends.md b/i18n/sv/frontends.md index 03de82cb..2128819d 100644 --- a/i18n/sv/frontends.md +++ b/i18n/sv/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/sv/index.md b/i18n/sv/index.md index d91f189b..84ff6c2f 100644 --- a/i18n/sv/index.md +++ b/i18n/sv/index.md @@ -62,7 +62,7 @@ Trying to protect all your data from everyone all the time is impractical, expen ## We need you! Here's how to get involved: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } [:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } [:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } [:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } diff --git a/i18n/sv/kb-archive.md b/i18n/sv/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/sv/kb-archive.md +++ b/i18n/sv/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/sv/meta/admonitions.md b/i18n/sv/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/sv/meta/admonitions.md +++ b/i18n/sv/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/sv/meta/translations.md b/i18n/sv/meta/translations.md index 4779284d..34175e91 100644 --- a/i18n/sv/meta/translations.md +++ b/i18n/sv/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/sv/meta/uploading-images.md b/i18n/sv/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/sv/meta/uploading-images.md +++ b/i18n/sv/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/sv/meta/writing-style.md b/i18n/sv/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/sv/meta/writing-style.md +++ b/i18n/sv/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/sv/mobile-browsers.md b/i18n/sv/mobile-browsers.md index bb03d9dc..83abeaa5 100644 --- a/i18n/sv/mobile-browsers.md +++ b/i18n/sv/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ Detta är våra för närvarande rekommenderade mobila webbläsare och konfigura ## Android -På Android är Firefox fortfarande mindre säkert än Chromium-baserade alternativ: Mozillas motor, [GeckoView](https://mozilla.github.io/geckoview/), har ännu inte stöd för [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) eller aktiverar [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ På Android är Firefox fortfarande mindre säkert än Chromium-baserade alterna ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** innehåller en inbyggd innehållsblockerare och [integritetsfunktioner] (https://brave.com/privacy-features/), varav många är aktiverade som standard. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave bygger på webbläsarprojektet Chromium, så den bör kännas bekant och ha minimala problem med webbkompatibilitet. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ Dessa alternativ finns i :material-menu: → **Inställningar** → **Modiga sk ##### Sköldar -Brave har några åtgärder mot fingeravtryck i sin funktion [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-). Vi föreslår att du konfigurerar dessa alternativ [globalt](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) på alla sidor som du besöker. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave skyddar globala standardvärden @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Rensa surfhistorik @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) gör det möjligt att få tillgång till dina webbläsardata (historik, bokmärken osv.) på alla dina enheter utan att du behöver ett konto och skyddar dem med E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,11 +141,11 @@ I iOS är alla appar som kan surfa på webben [](https://developer.apple.com/app ![Safari-logotyp](assets/img/browsers/safari.svg){ align=right } -**Safari** är standardwebbläsaren i iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** är standardwebbläsaren i iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Repository](https://github.com/Hackeralert/Picocrypt){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/Hackeralert/Picocrypt){ .card-link title="Source Code" } -[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Contribute} +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Rapporten om sekretess är tillgänglig via menyn Sidinställningar. - [ ] Inaktivera **Integritetsbevarande annonsmätning** -Vid mätning av annonsklick har man traditionellt använt spårningsteknik som inkräktar på användarnas integritet. [Privat klickmätning](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) är en WebKit-funktion och föreslagen webbstandard som syftar till att göra det möjligt för annonsörer att mäta effektiviteten hos webbkampanjer utan att kompromissa med användarnas integritet. +Vid mätning av annonsklick har man traditionellt använt spårningsteknik som inkräktar på användarnas integritet. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. Funktionen har i sig själv inga större problem med integriteten, så även om du kan välja att låta den vara aktiverad anser vi att det faktum att den automatiskt inaktiveras i privat surfning är en indikator för att inaktivera funktionen. @@ -201,9 +201,9 @@ Observera att privat surfning inte sparar cookies och webbplatsdata, så det är ##### iCloud-synkronisering -Synkronisering av Safari-historik, flikgrupper, iCloud-flikar och sparade lösenord är E2EE. Som standard är bokmärken dock [och inte](https://support.apple.com/en-us/HT202303). Apple kan dekryptera och komma åt dem i enlighet med sin sekretesspolicy för [](https://www.apple.com/legal/privacy/en-ww/). +Synkronisering av Safari-historik, flikgrupper, iCloud-flikar och sparade lösenord är E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Gå till ditt **Apple-ID-namn → iCloud → Avancerat dataskydd**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Gå till ditt **Apple-ID-namn → iCloud → Avancerat dataskydd**. - [x] Aktivera **Avancerat dataskydd** @@ -227,7 +227,7 @@ AdGuard för iOS har vissa premiumfunktioner, men standardblockeringen av inneh
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/sv/multi-factor-authentication.md b/i18n/sv/multi-factor-authentication.md index 0970e936..d5faf3dc 100644 --- a/i18n/sv/multi-factor-authentication.md +++ b/i18n/sv/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** har en säkerhetsnyckel som kan [FIDO2 och WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) som heter **Nitrokey FIDO2**. För PGP-stöd måste du köpa en av deras andra nycklar som * * Nitrokey Start * *, * *NitrokeyPro 2** eller **NitrokeyStorage 2**. -[:octicons-home-16: Repository](https://github.com/Hackeralert/Picocrypt){ .md-button .md-button--primary } -[:octicons-eye-16:](https://github.com/Hackeralert/Picocrypt){ .card-link title="Source Code" } -[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Contribute} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-Jämförelsetabellen [](https://www.nitrokey.com/#comparison) visar funktionerna och hur Nitrokey-modellerna jämför. De **Nitrokey 3** listade kommer att ha en kombinerad funktionsuppsättning. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. De **Nitrokey 3** listade kommer att ha en kombinerad funktionsuppsättning. -Nitrokey-modeller kan konfigureras med [Nitrokey-appen](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). För de modeller som stöder HOTP och TOTP finns det 3 platser för HOTP och 15 för TOTP. Vissa Nitrokeys kan fungera som en lösenordshanterare. De kan lagra 16 olika autentiseringsuppgifter och kryptera dem med samma lösenord som OpenPGP-gränssnittet. @@ -74,7 +74,7 @@ För de modeller som stöder HOTP och TOTP finns det 3 platser för HOTP och 15 -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. Den inbyggda programvaran på moderna NitroKey-modeller (utom **NitroKey Pro 2**) kan uppdateras. @@ -127,7 +127,7 @@ Vi rekommenderar starkt att du använder mobila TOTP-appar i stället för alter Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ Vi rekommenderar starkt att du använder mobila TOTP-appar i stället för alter [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/sv/news-aggregators.md b/i18n/sv/news-aggregators.md index d159fe67..df89b275 100644 --- a/i18n/sv/news-aggregators.md +++ b/i18n/sv/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** är en gratis och öppen källkodsläsare för macOS och iOS med fokus på en inhemsk design och funktionalitet. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ På Reddit kan du prenumerera på subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ Du kan prenumerera på YouTube-kanaler utan att logga in och koppla användnings To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/sv/notebooks.md b/i18n/sv/notebooks.md index f41976e0..6e2f96c0 100644 --- a/i18n/sv/notebooks.md +++ b/i18n/sv/notebooks.md @@ -34,7 +34,7 @@ Om du för närvarande använder ett program som Evernote, Google Keep eller Mic - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ Om du för närvarande använder ett program som Evernote, Google Keep eller Mic ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ Om du för närvarande använder ett program som Evernote, Google Keep eller Mic Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** är ett kostnadsfritt, öppen källkod och fullt utrustat program för anteckningar och att göra som kan hantera ett stort antal markdown-noter organiserade i anteckningsböcker och taggar. Det erbjuder E2EE och kan synkroniseras via Nextcloud, Dropbox och mer. Det erbjuder också enkel import från Evernote och vanlig text anteckningar. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee erbjuder 100 Mb lagring gratis, med betalalternativ om du behöver mer. ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** är ett [major mode] (https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) för GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synkronisering är möjlig med [filsynkronisering](file-sharing.md#file-sync)-verktyg. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synkronisering är möjlig med [filsynkronisering](file-sharing.md#file-sync)-verktyg. [:octicons-home-16: Homepage](https://openwrt.org){ .md-button .md-button--primary } [:octicons-info-16:](https://openwrt.org/docs/start){ .card-link title=Documentation} diff --git a/i18n/sv/os/android-overview.md b/i18n/sv/os/android-overview.md index 1ffa3cdc..f866b6cb 100644 --- a/i18n/sv/os/android-overview.md +++ b/i18n/sv/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/sv/os/ios-overview.md b/i18n/sv/os/ios-overview.md index 1f4dfbdc..5c43ce9a 100644 --- a/i18n/sv/os/ios-overview.md +++ b/i18n/sv/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/sv/os/linux-overview.md b/i18n/sv/os/linux-overview.md index f043a430..748e4bb1 100644 --- a/i18n/sv/os/linux-overview.md +++ b/i18n/sv/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Undvik telemetri som ofta kommer med egna operativsystem -- Bevara [frihet för programvara](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Välja din distribution @@ -42,9 +42,9 @@ Inte alla Linux-distributioner är skapade lika. Our [Linux recommendation page] Vi rekommenderar starkt att du väljer distributioner som ligger nära de stabila uppströmsutgåvorna, ofta kallade rullande utgåvor. Detta beror på att frysta utgåvor ofta inte uppdaterar paketversioner och hamnar bakom säkerhetsuppdateringar. -För frusna distributioner som [Debian](https://www.debian.org/security/faq#handling)förväntas paketansvariga backa patchar för att åtgärda sårbarheter snarare än att stöta programvaran till "nästa version" som släppts av uppströmsutvecklaren. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. Som ett resultat hålls mindre säkerhetskorrigeringar ibland tillbaka till nästa stora utgåva. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. Som ett resultat hålls mindre säkerhetskorrigeringar ibland tillbaka till nästa stora utgåva. -Vi tror inte att hålla paket tillbaka och tillämpa tillfälliga patchar är en bra idé, eftersom det skiljer sig från hur utvecklaren kan ha avsett att programvaran ska fungera. [Richard Brown](https://rootco.de/aboutme/) har en presentation om detta: +Vi tror inte att hålla paket tillbaka och tillämpa tillfälliga patchar är en bra idé, eftersom det skiljer sig från hur utvecklaren kan ha avsett att programvaran ska fungera. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re För ett säkert system förväntas du också ha tillräckliga Linuxkunskaper för att korrekt konfigurera säkerheten för deras system, t.ex. anta ett [obligatoriskt system för åtkomstkontroll](https://en.wikipedia.org/wiki/Mandatory_access_control), konfigurera [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, skärpa uppstartsparametrar, manipulera [sysctl](https://en.wikipedia.org/wiki/Sysctl) -parametrar och veta vilka komponenter de behöver, t.ex. [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR-paket är innehåll som produceras av gemenskapen och är inte granskade på något sätt, och är därför sårbara för attacker i programvarukedjan, vilket faktiskt har hänt [tidigare](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Liknande varningar gäller för användning av tredje parts Personal Package Archives (PPAs) på Debianbaserade distributioner eller Community Projects (COPR) på Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: Denna distribution håller tillbaka paket i två veckor för att se till att deras egna ändringar inte går sönder, inte för att se till att uppströmsversionen är stabil. När AUR-paket används byggs de ofta med de senaste [-biblioteken](https://en.wikipedia.org/wiki/Library_(computing)) från Arch:s arkiv. -- **Garuda**: De använder [Chaotic-AUR](https://aur.chaotic.cx/) som automatiskt och blint kompilerar paket från AUR. Det finns ingen verifieringsprocess för att se till att AUR-paketen inte drabbas av attacker i leveranskedjan. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. Det finns ingen verifieringsprocess för att se till att AUR-paketen inte drabbas av attacker i leveranskedjan. ### Linux-libre-kärnan och "Libre"-distributioner -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## Allmänna rekommendationer @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit De flesta Linux-distributioner har ett alternativ i installationsprogrammet för att aktivera [LUKS](../encryption.md#linux-unified-key-setup) fde. Om det här alternativet inte är inställt vid installationstillfället måste du säkerhetskopiera dina data och installera om, eftersom krypteringen tillämpas efter [diskpartitionering](https://en.wikipedia.org/wiki/Disk_partitioning), men innan [filsystem](https://en.wikipedia.org/wiki/File_system) formateras. Vi föreslår också att du raderar din lagringsenhet på ett säkert sätt: -- [Säker radering av data :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Säker radering av data :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Växla @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). Om du använder en av dessa miljöer är det lika enkelt som att välja "Wayland"-sessionen i skrivbordsdisplayhanteraren ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). Om du använder en av dessa miljöer är det lika enkelt som att välja "Wayland"-sessionen i skrivbordsdisplayhanteraren ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). Vi rekommenderar **mot** om du använder skrivbordsmiljöer eller fönsterhanterare som inte har stöd för Wayland, till exempel Cinnamon (standard i Linux Mint), Pantheon (standard i Elementary OS), MATE, Xfce och i3. ### Proprietär fast programvara (uppdateringar av mikrokod) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Några anmärkningsvärda exempel på dessa sårbarheter är [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), och andra [maskinvarusårbarheter](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora och openSUSE har båda mikrokoduppdateringar som standard. @@ -131,11 +131,11 @@ Dessutom hämtar vissa distributioner inte uppdateringar av den fasta programvar Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -Det är möjligt att [randomisera MAC-adressen](https://fedoramagazine.org/randomize-mac-address-nm/) [MAC-adressen](https://en.wikipedia.org/wiki/MAC_address) när du använder NetworkManager. Detta ger lite mer integritet i Wi-Fi-nätverk eftersom det är svårare att spåra specifika enheter i nätverket du är ansluten till. Den [**gör dig inte anonym**](https://papers.mathyvanhoef.com/wisec2016.pdf). +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. Detta ger lite mer integritet i Wi-Fi-nätverk eftersom det är svårare att spåra specifika enheter i nätverket du är ansluten till. Den [**gör dig inte anonym**](https://papers.mathyvanhoef.com/wisec2016.pdf). -Vi rekommenderar att du ändrar inställningen till **random** i stället för **stable**, vilket föreslås i artikeln [](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -Om du använder [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components)måste du ställa in [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) vilket aktiverar [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomisering av Wi-Fi- MAC-adresser beror på stöd från Wi-Fi-programmets fasta programvara. @@ -151,6 +151,6 @@ Det finns andra systemidentifierare som du bör vara försiktig med. Du bör fun The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/sv/os/macos-overview.md b/i18n/sv/os/macos-overview.md index b10408a2..eb1e133f 100644 --- a/i18n/sv/os/macos-overview.md +++ b/i18n/sv/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Rekommenderad konfiguration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/sv/os/qubes-overview.md b/i18n/sv/os/qubes-overview.md index ecfb71b7..2904b839 100644 --- a/i18n/sv/os/qubes-overview.md +++ b/i18n/sv/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## Hur fungerar Qubes OS? -Qubes använder [compartmentalization](https://www.qubes-os.org/intro/) för att hålla systemet säkert. Qubes skapas från mallar, med Fedora, Debian och [Whonix](../desktop.md#whonix)som standard. Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes skapas från mallar, med Fedora, Debian och [Whonix](../desktop.md#whonix)som standard. Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes arkitektur](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes arkitektur, kredit: Vad är Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. Du kan till exempel använda en särskild färg för din bankwebbläsare och en annan färg för en allmänt opålitlig webbläsare. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. Du kan till exempel använda en särskild färg för din bankwebbläsare och en annan färg för en allmänt opålitlig webbläsare. ![Färgad kant](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes fönstergränser, kredit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Kopiera och klistra in text -Du kan [kopiera och klistra in text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) med hjälp av `qvm-copy-to-vm` eller nedanstående instruktioner: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. När du gör det görs inte ändringarna omedelbart och kan lätt ångras i händelse av en olycka. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. När du gör det görs inte ändringarna omedelbart och kan lätt ångras i händelse av en olycka. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM-interaktioner -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. Det bygger på Xen-biblioteket *vchan*, som underlättar [isolering genom policyer](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Ytterligare resurser -För ytterligare information rekommenderar vi att du konsulterar de omfattande Qubes OS-dokumentationssidorna som finns på webbplatsen [Qubes OS](https://www.qubes-os.org/doc/). Offlinekopior kan laddas ner från dokumentationsarkivet för Qubes OS [](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offlinekopior kan laddas ner från dokumentationsarkivet för Qubes OS [](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/sv/passwords.md b/i18n/sv/passwords.md index 5e1ee1a9..a4ee7e7a 100644 --- a/i18n/sv/passwords.md +++ b/i18n/sv/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Lösenordshanterare gör att du kan lagra och hantera lösenord och andra autent Inbyggda lösenordshanterare i programvaror som webbläsare och operativsystem är ibland inte lika bra som en särskild programvara för lösenordshantering. Fördelen med en inbyggd lösenordshanterare är att den är väl integrerad med programvaran, men den kan ofta vara mycket enkel och saknar integritets- och säkerhetsfunktioner som fristående produkter har. -Lösenordshanteraren i Microsoft Edge erbjuder till exempel inte alls E2EE. Googles lösenordshanterare har [optional](https://support.google.com/accounts/answer/11350823) E2EE, och [Apple's](https://support.apple.com/en-us/HT202303) erbjuder E2EE som standard. +Lösenordshanteraren i Microsoft Edge erbjuder till exempel inte alls E2EE. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ Dessa lösenordshanterare synkroniserar dina lösenord till en molnserver så at [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ Dessa lösenordshanterare synkroniserar dina lösenord till en molnserver så at -Bitwarden har också [Bitwarden Send](https://bitwarden.com/products/send/), vilket gör att du kan dela text och filer säkert med [end-to-end-kryptering](https://bitwarden.com/help/send-encryption). Ett lösenord [](https://bitwarden.com/help/send-privacy/#send-passwords) kan krävas tillsammans med sändningslänken. Bitwarden Send har också [automatisk radering](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). Ett lösenord [](https://bitwarden.com/help/send-privacy/#send-passwords) kan krävas tillsammans med sändningslänken. Bitwarden Send har också [automatisk radering](https://bitwarden.com/help/send-lifespan). Du behöver [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) för att kunna dela filer. Gratisabonnemanget tillåter endast textdelning. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** är en lösenordshanterare med starkt fokus på säkerhet och användarvänlighet, som gör att du kan lagra lösenord, kreditkort, programlicenser och annan känslig information i ett säkert digitalt valv. Ditt valv lagras på 1Passwords servrar för en [månadsavgift] (https://1password.com/sign-up/). 1Password är [audited](https://support.1password.com/security-assessments/) på regelbunden basis och erbjuder exceptionell kundsupport. 1Password är en sluten källa, men produktens säkerhet dokumenteras noggrant i deras [white paper om säkerhet](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** är en lösenordshanterare med starkt fokus på säkerhet och användarvänlighet, som gör att du kan lagra lösenord, kreditkort, programlicenser och annan känslig information i ett säkert digitalt valv. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password är en sluten källa, men produktens säkerhet dokumenteras noggrant i deras [white paper om säkerhet](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ En fördel som 1Password har jämfört med Bitwarden är dess förstklassiga st Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ Med dessa alternativ kan du hantera en krypterad lösenordsdatabas lokalt. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC lagrar sina exportdata som [CSV](https://en.wikipedia.org/wiki/Comma-s **KeePassDX** är en lättviktig lösenordshanterare för Android som gör det möjligt att redigera krypterade data i en enda fil i KeePass-format och fylla i formulär på ett säkert sätt. [Contributor Pro] (https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) gör det möjligt att låsa upp kosmetiskt innehåll och icke-standardiserade protokollfunktioner, men viktigare är att det hjälper och uppmuntrar till utveckling. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC lagrar sina exportdata som [CSV](https://en.wikipedia.org/wiki/Comma-s ![Strongbox-logotyp](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** är en inhemsk lösenordshanterare med öppen källkod för iOS och macOS. Strongbox stöder både KeePass- och Password Safe-format och kan användas tillsammans med andra lösenordshanterare, som KeePassXC, på andra plattformar än Apple-plattformar. Genom att använda en [freemium modell](https://strongboxsafe.com/pricing/), erbjuder Strongbox de flesta funktioner under sin fria nivå med mer bekvämlighetsinriktad [features](https://strongboxsafe. om/comparison/) – såsom biometrisk autentisering – låst bakom en prenumeration eller evig licens. +**Strongbox** är en inhemsk lösenordshanterare med öppen källkod för iOS och macOS. Strongbox stöder både KeePass- och Password Safe-format och kan användas tillsammans med andra lösenordshanterare, som KeePassXC, på andra plattformar än Apple-plattformar. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Dessutom finns det en offline-version som erbjuds: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). Denna version är avskalad i ett försök att minska angreppsytan. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). Denna version är avskalad i ett försök att minska angreppsytan. ### Kommandorad @@ -356,7 +356,7 @@ Dessa produkter är minimala lösenordshanterare som kan användas inom skriptpr **gopass** är en lösenordshanterare för kommandoraden skriven i Go. Det fungerar på alla större skrivbords- och serveroperativsystem (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ Dessa produkter är minimala lösenordshanterare som kan användas inom skriptpr
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/sv/photo-management.md b/i18n/sv/photo-management.md index 2f53719a..486489fb 100644 --- a/i18n/sv/photo-management.md +++ b/i18n/sv/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/sv/productivity.md b/i18n/sv/productivity.md index 018a227f..5acb5c05 100644 --- a/i18n/sv/productivity.md +++ b/i18n/sv/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ Vi rekommenderar inte att du använder [E2EE App](https://apps.nextcloud.com/app **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Våra kriterier för bästa fall representerar vad vi skulle vilja se av det per **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Våra kriterier för bästa fall representerar vad vi skulle vilja se av det per **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Våra kriterier för bästa fall representerar vad vi skulle vilja se av det per - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/sv/real-time-communication.md b/i18n/sv/real-time-communication.md index d7184cc4..10c44dec 100644 --- a/i18n/sv/real-time-communication.md +++ b/i18n/sv/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/sv/router.md b/i18n/sv/router.md index 87bb9f95..b735d29b 100644 --- a/i18n/sv/router.md +++ b/i18n/sv/router.md @@ -35,8 +35,8 @@ Du kan se OpenWrts [tabell över maskinvara](https://openwrt.org/toh/start) för **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense används vanligen som brandvägg, router, trådlös åtkomstpunkt, DHCP-server, DNS-server och VPN-slutpunkt. -[:octicons-home-16: Homepage](https://openwrt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://openwrt.org/docs/start){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } [:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute } diff --git a/i18n/sv/search-engines.md b/i18n/sv/search-engines.md index 88696900..2581e43f 100644 --- a/i18n/sv/search-engines.md +++ b/i18n/sv/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Kriterier diff --git a/i18n/sv/tools.md b/i18n/sv/tools.md index 8b5eff50..2b79bc51 100644 --- a/i18n/sv/tools.md +++ b/i18n/sv/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin Om du letar efter en specifik lösning på något är det här hård- och mjukvaruverktyg som vi rekommenderar i olika kategorier. Våra rekommenderade verktyg för integritetsskydd är i första hand valda utifrån säkerhetsfunktioner, med ytterligare betoning på decentraliserade verktyg och verktyg med öppen källkod. De kan tillämpas på en mängd olika hotmodeller, från skydd mot globala massövervakningsprogram och undvikande av stora teknikföretag till begränsning av attacker, men det är bara du som kan avgöra vad som fungerar bäst för dina behov. -Om du vill ha hjälp med att hitta de bästa verktygen för sekretess och alternativa program för dina behov kan du starta en diskussion i vårt forum [](https://discuss.privacyguides.net/) eller i vår community [Matrix](https://matrix.to/#/#privacyguides:matrix.org)! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! Om du vill ha mer information om varje projekt, varför de valdes ut och ytterligare tips och tricks som vi rekommenderar, kan du klicka på länken "Läs mer" i varje avsnitt eller klicka på själva rekommendationen för att komma till det specifika avsnittet på sidan. @@ -89,7 +89,7 @@ Om du vill ha mer information om varje projekt, varför de valdes ut och ytterli #### DNS Leverantörer -Vi [rekommenderar](dns.md#recommended-providers) ett antal krypterade DNS-servrar utifrån olika kriterier, t.ex. [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) och [Quad9](https://quad9.net/). Vi rekommenderar att du läser våra sidor om DNS innan du väljer en leverantör. I många fall är det inte rekommenderat att använda en alternativ DNS-leverantör. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. Vi rekommenderar att du läser våra sidor om DNS innan du väljer en leverantör. I många fall är det inte rekommenderat att använda en alternativ DNS-leverantör. [Läs mer :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/sv/tor.md b/i18n/sv/tor.md index c930b6bc..86ec2e8c 100644 --- a/i18n/sv/tor.md +++ b/i18n/sv/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a -The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
@@ -181,4 +181,4 @@ Snowflake ökar inte din integritet på något sätt och används inte heller f Att driva en Snowflake-proxy är en låg risk, till och med mer än att driva en Tor-relä eller en bro, som redan inte är särskilt riskfyllda verksamheter. Men det gör fortfarande proxy-trafik genom ditt nätverk som kan vara effektiva på vissa sätt, särskilt om ditt nätverk är bandbredd-begränsad. Se till att du förstår [hur Snowflake fungerar](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) innan du bestämmer dig för att köra en proxy. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/sv/vpn.md b/i18n/sv/vpn.md index 5b8746ca..d924c2ff 100644 --- a/i18n/sv/vpn.md +++ b/i18n/sv/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. Om du vill öka **säkerheten** bör du alltid se till att du ansluter till webbplatser med HTTPS. En VPN är inte en ersättning för goda säkerhetsrutiner. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Kriterier diff --git a/i18n/tr/CODE_OF_CONDUCT.md b/i18n/tr/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/tr/CODE_OF_CONDUCT.md +++ b/i18n/tr/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/tr/about/index.md b/i18n/tr/about/index.md index 59e0303f..07f75655 100644 --- a/i18n/tr/about/index.md +++ b/i18n/tr/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. Tamamen gönüllü [ekip üyeleri](https://discuss.privacyguides.net/g/team) ve katkıda bulunanlar tarafından işletilen, kâr amacı gütmeyen bir kolektifiz. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/tr/about/notices.md b/i18n/tr/about/notices.md index ecbd02c4..4d101a5d 100644 --- a/i18n/tr/about/notices.md +++ b/i18n/tr/about/notices.md @@ -29,7 +29,7 @@ Bu, yerini alan bir lisansın aksi belirtildiği bu depoya veya koda yerleştiri Bu, Creative Commons Attribution-Noderivatives 4.0 International Public License metninde belirtilen şartlara göre, bu depodaki insan tarafından okunabilir içeriği kendi projeniz için kullanabileceğiniz anlamına gelir. Bunu herhangi bir makul bir şekilde yapabilirsiniz, ancak Gizlilik Kılavuzları (Privacy Guides) sizi veya kullanımınızı onayladığı hiçbir şekilde değil. Gizlilik Kılavuzları (Privacy Guides) markasını bu projeden açık bir onay almadan kendi projenizde **kullanamazsınız**. Gizlilik Kılavuzları'nın (Privacy Guides) marka ticari markaları arasında "Gizlilik Kılavuzları (Privacy Guides)" kelime işaretleri ve zırh (shield) logosu yer alıyor. -Üçüncü taraf sağlayıcılardan elde edilen `varlıklardaki` logoların ve diğer görüntülerin ya kamu malı ya da **adil kullanımda** olduğuna inanıyoruz. Özetle, yasal [adil kullanım doktrini](https://www.copyright.gov/fair-use/more-info.html), konuyu kamuoyu yorumu amacıyla tanımlamak için telif hakkıyla korunan görüntülerin kullanılmasına izin verir. Bununla birlikte, bu logolar ve diğer görüntüler yine de bir veya daha fazla yargı alanında ticari marka yasalarına tabi olabilir. Bu içeriği kullanmadan önce, lütfen ticari markanın sahibi olan varlığı veya kuruluşu tanımlamak için kullanıldığından ve bunu amaçladığınız kullanım koşullarında geçerli olan yasalar uyarınca kullanma hakkına sahip olduğunuzdan emin olun. *Bu web sitesinden içerik kopyalarken, başka birinin ticari markasını veya telif hakkını ihlal etmediğinizden yalnızca siz sorumlusunuz.* +Üçüncü taraf sağlayıcılardan elde edilen `varlıklardaki` logoların ve diğer görüntülerin ya kamu malı ya da **adil kullanımda** olduğuna inanıyoruz. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. Bununla birlikte, bu logolar ve diğer görüntüler yine de bir veya daha fazla yargı alanında ticari marka yasalarına tabi olabilir. Bu içeriği kullanmadan önce, lütfen ticari markanın sahibi olan varlığı veya kuruluşu tanımlamak için kullanıldığından ve bunu amaçladığınız kullanım koşullarında geçerli olan yasalar uyarınca kullanma hakkına sahip olduğunuzdan emin olun. *Bu web sitesinden içerik kopyalarken, başka birinin ticari markasını veya telif hakkını ihlal etmediğinizden yalnızca siz sorumlusunuz.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ Aşağıdakiler de dahil olmak üzere, bu web sitesinde veya bu web sitesine gö --- -*Bu bildirimin kendisi [opensource.guide'den](https://github.com/github/opensource.guide/blob/master/notices.md) Github'da kabul edildi. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Bu bildirimin kendisi [opensource.guide'den](https://github.com/github/opensource.guide/blob/master/notices.md) Github'da kabul edildi. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/tr/about/privacytools.md b/i18n/tr/about/privacytools.md index a2f53bd4..efffee02 100644 --- a/i18n/tr/about/privacytools.md +++ b/i18n/tr/about/privacytools.md @@ -14,13 +14,13 @@ Organizasyonun taşınması tamamlandıktan sonra PrivacyTools'un kurucusu geri PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/tr/advanced/communication-network-types.md b/i18n/tr/advanced/communication-network-types.md index ae58e980..be5a6426 100644 --- a/i18n/tr/advanced/communication-network-types.md +++ b/i18n/tr/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/tr/advanced/dns-overview.md b/i18n/tr/advanced/dns-overview.md index 21889d85..2ffb67b2 100644 --- a/i18n/tr/advanced/dns-overview.md +++ b/i18n/tr/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/tr/advanced/payments.md b/i18n/tr/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/tr/advanced/payments.md +++ b/i18n/tr/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/tr/advanced/tor-overview.md b/i18n/tr/advanced/tor-overview.md index 8a6ab1ce..cc7a2fad 100644 --- a/i18n/tr/advanced/tor-overview.md +++ b/i18n/tr/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/tr/android.md b/i18n/tr/android.md index 6a650455..2f79dd91 100644 --- a/i18n/tr/android.md +++ b/i18n/tr/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,7 +113,7 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/tr/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/tr/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/tr/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/tr/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/tr/assets/img/how-tor-works/tor-encryption.svg b/i18n/tr/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/tr/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/tr/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/tr/assets/img/how-tor-works/tor-path-dark.svg b/i18n/tr/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/tr/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/tr/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/tr/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/tr/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/tr/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/tr/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/tr/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/tr/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/tr/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/tr/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/tr/assets/img/how-tor-works/tor-path.svg b/i18n/tr/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/tr/assets/img/how-tor-works/tor-path.svg +++ b/i18n/tr/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/tr/basics/account-deletion.md b/i18n/tr/basics/account-deletion.md index 25c6572c..cf3af2c4 100644 --- a/i18n/tr/basics/account-deletion.md +++ b/i18n/tr/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Zamanla birlikte, çoğunu artık kullanmayacağınız birçok çevrimiçi hesap biriktirebilirsiniz. Kullanılmayan hesablar veri ihlallerine karşı savunmasız olduğundan, bu hesapları silmek gizliliğinizi geri kazanmak için önemli bir adımdır. Veri ihlali, bir hizmetin güvenliğinin tehlikeye girmesi ve korunan bilgilerin yetkisi olmayan kişiler tarafından görüntülenmesi, aktarılması veya çalınmasıdır. Veri ihlalleri ne yazık ki bu günlerde [ çok yaygın](https://haveibeenpwned.com/PwnedWebsites), bu yüzden iyi bir dijital hijyen uygulamak, bu ihlallerin verileriniz üzerindeki etkilerini azaltmanın en iyi yoludur. Bu rehberin amacı, çevrimiçi varlığınızın daha iyi olması için [aldatıcı tasarım](https://www.deceptive.design/)ile genellikle zorlaştırılan hesap silme gibi can sıkıcı bir süreçte size yol göstermeye yardımcı olmaktır. +Zamanla birlikte, çoğunu artık kullanmayacağınız birçok çevrimiçi hesap biriktirebilirsiniz. Kullanılmayan hesablar veri ihlallerine karşı savunmasız olduğundan, bu hesapları silmek gizliliğinizi geri kazanmak için önemli bir adımdır. Veri ihlali, bir hizmetin güvenliğinin tehlikeye girmesi ve korunan bilgilerin yetkisi olmayan kişiler tarafından görüntülenmesi, aktarılması veya çalınmasıdır. Veri ihlalleri ne yazık ki bu günlerde [ çok yaygın](https://haveibeenpwned.com/PwnedWebsites), bu yüzden iyi bir dijital hijyen uygulamak, bu ihlallerin verileriniz üzerindeki etkilerini azaltmanın en iyi yoludur. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Eski Hesapları Bulma ### Parola Yöneticisi -Eğer tüm dijital hayatınız boyunca kullandığınız bir parola t-yöneticisi varsa, bu kısım çok kolay olacaktır. Çoğu zaman, Bitwarden'ın [Veri İhlali Raporu](https://bitwarden.com/blog/have-you-been-pwned/) gibi, bilgilerinizin bir veri ihlalinde açığa çıkıp çıkmadığını kontrol edebileceğiniz bir özellik içerirler. +Eğer tüm dijital hayatınız boyunca kullandığınız bir parola t-yöneticisi varsa, bu kısım çok kolay olacaktır. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden'ın Veri İhlali Raporu özelliği](../assets/img/account-deletion/exposed_passwords.png)
-Daha önce harici bir parola yöneticisi kullanmamış olsanız bile, farkında olmadan tarayıcınızda veya telefonunuzda bir parola yöneticisi kullanmış olabilirsiniz. Örneğin: [Firefox Parola Yöneticisi](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [ Google Parola Yöneticisi](https://passwords.google.com/intro) ve [Edge Parola Yöneticisi](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Daha önce harici bir parola yöneticisi kullanmamış olsanız bile, farkında olmadan tarayıcınızda veya telefonunuzda bir parola yöneticisi kullanmış olabilirsiniz. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Masaüstü platformlarında da unutmuş olabileceğiniz parolaları kurtarmanıza yardımcı olabilecek parola yöneticileri bulunur: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### E-Posta @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/tr/basics/common-misconceptions.md b/i18n/tr/basics/common-misconceptions.md index 74650997..5aeaae95 100644 --- a/i18n/tr/basics/common-misconceptions.md +++ b/i18n/tr/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/tr/basics/common-threats.md b/i18n/tr/basics/common-threats.md index a8102469..67bd483b 100644 --- a/i18n/tr/basics/common-threats.md +++ b/i18n/tr/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacy From Service Providers @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/tr/basics/email-security.md b/i18n/tr/basics/email-security.md index 1f28f9b9..b0c739d0 100644 --- a/i18n/tr/basics/email-security.md +++ b/i18n/tr/basics/email-security.md @@ -13,7 +13,7 @@ Sonuç olarak e-posta, başkalarıyla iletişim kurmak için değil, çevrimiçi Farklı e-posta sağlayıcıları arasındaki e-postalara uçtan uca şifreleme eklemenin standart yolu OpenPGP kullanmaktır. OpenPGP standardının farklı uygulamaları vardır, en yaygın olanları [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) ve [OpenPGP.js](https://openpgpjs.org). -İş dünyasında popüler olan [S/MIME](https://en.wikipedia.org/wiki/S/MIME)adında başka bir standart daha vardır, ancak bir [Sertifika Yetkilisi](https://en.wikipedia.org/wiki/Certificate_authority) tarafından verilen bir sertifika gerektirir (hepsi S/MIME sertifikası vermez). [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) ve [Web için Outlook veya Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480)desteği vardır. +İş dünyasında popüler olan [S/MIME](https://en.wikipedia.org/wiki/S/MIME)adında başka bir standart daha vardır, ancak bir [Sertifika Yetkilisi](https://en.wikipedia.org/wiki/Certificate_authority) tarafından verilen bir sertifika gerektirir (hepsi S/MIME sertifikası vermez). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. Bu nedenle, mümkün olduğunca kişiden kişiye iletişim için e-posta yerine ileri gizlilik uygulayan [anlık mesajlaşma programlarını](../real-time-communication.md) öneriyoruz. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/tr/basics/multi-factor-authentication.md b/i18n/tr/basics/multi-factor-authentication.md index 6c7f7743..7c20f027 100644 --- a/i18n/tr/basics/multi-factor-authentication.md +++ b/i18n/tr/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/tr/basics/passwords-overview.md b/i18n/tr/basics/passwords-overview.md index 63b87498..5a828342 100644 --- a/i18n/tr/basics/passwords-overview.md +++ b/i18n/tr/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/tr/basics/vpn-overview.md b/i18n/tr/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/tr/basics/vpn-overview.md +++ b/i18n/tr/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/tr/basics/why-privacy-matters.md b/i18n/tr/basics/why-privacy-matters.md index f0bcbe6c..083e0725 100644 --- a/i18n/tr/basics/why-privacy-matters.md +++ b/i18n/tr/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Kaynaklar -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/tr/calendar.md b/i18n/tr/calendar.md index fd26697b..8390538c 100644 --- a/i18n/tr/calendar.md +++ b/i18n/tr/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/tr/cloud.md b/i18n/tr/cloud.md index d2042965..9813fb79 100644 --- a/i18n/tr/cloud.md +++ b/i18n/tr/cloud.md @@ -56,15 +56,15 @@ Proton Drive'ın yeni mobil uygulamaları henüz herhangi bir üçüncü tarafç **Tresorit** İsviçre-Macaristan tabanlı, 2011 yılında kurulmuş bir bulut depolama sağlayıcısıdır. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive'ın yeni mobil uygulamaları henüz herhangi bir üçüncü tarafç Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/tr/cryptocurrency.md b/i18n/tr/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/tr/cryptocurrency.md +++ b/i18n/tr/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/tr/data-redaction.md b/i18n/tr/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/tr/data-redaction.md +++ b/i18n/tr/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106)
diff --git a/i18n/tr/desktop-browsers.md b/i18n/tr/desktop-browsers.md index ba0aa3f5..e113afc2 100644 --- a/i18n/tr/desktop-browsers.md +++ b/i18n/tr/desktop-browsers.md @@ -70,8 +70,8 @@ Bunlar, standart/anonim olmayan gezinti için şu anda önerilen masaüstü web **Mullvad Browser**, [Tor Browser]'ın (tor.md#tor-browser) Tor ağ entegrasyonları kaldırılmış bir sürümüdür ve Tor Browser'ın parmak izi önleme tarayıcı teknolojilerini VPN kullanıcılarına sunmayı amaçlamaktadır. Tor Projesi tarafından geliştirilir ve [Mullvad] (vpn.md#mullvad) tarafından dağıtılır, ayrıca **Mullvad'ın VPN'inin kullanılmasını gerektirmez. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ Bunlar, standart/anonim olmayan gezinti için şu anda önerilen masaüstü web -[Tor Browser](tor.md) gibi, Mullvad Browser da tarayıcı parmak izinizi diğer tüm Mullvad Browser kullanıcılarıyla aynı hale getirerek parmak izini önlemek için tasarlanmıştır ve varsayılan güvenlik düzeyleri tarafından otomatik olarak yapılandırılan varsayılan ayarları ve eklentileri içerir: *Standart*, *Daha güvenli* ve *En güvenli*. Bu nedenle, varsayılan [güvenlik düzeylerini](https://tb-manual.torproject.org/security-settings/)ayarlamak dışında tarayıcıda hiçbir değişiklik yapmamanız gerekir. Diğer değişiklikler parmak izinizi benzersiz hale getirerek bu tarayıcıyı kullanma amacınızı ortadan kaldıracaktır. Tarayıcınızı daha fazla yapılandırmak istiyorsanız ve parmak izi sizin için bir endişe kaynağı değilse, bunun yerine [Firefox](#firefox) öneririz. +[Tor Browser](tor.md) gibi, Mullvad Browser da tarayıcı parmak izinizi diğer tüm Mullvad Browser kullanıcılarıyla aynı hale getirerek parmak izini önlemek için tasarlanmıştır ve varsayılan güvenlik düzeyleri tarafından otomatik olarak yapılandırılan varsayılan ayarları ve eklentileri içerir: *Standart*, *Daha güvenli* ve *En güvenli*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Diğer değişiklikler parmak izinizi benzersiz hale getirerek bu tarayıcıyı kullanma amacınızı ortadan kaldıracaktır. Tarayıcınızı daha fazla yapılandırmak istiyorsanız ve parmak izi sizin için bir endişe kaynağı değilse, bunun yerine [Firefox](#firefox) öneririz. ### Parmak İzi Önleme @@ -116,17 +116,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** yerleşik bir içerik engelleyici ve [gizlilik özellikleri] (https://brave.com/privacy-features/) içerir ve bunların çoğu varsayılan olarak etkindir. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave, Chromium web tarayıcısı projesi üzerine inşa edilmiştir, bu nedenle kullanımı daha tanıdıktır ve olabildiğince az web sitesi uyumluluğu yaşarsınız. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ We are working on establishing defined criteria for every section of our site, a - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -462,4 +462,4 @@ Our best-case criteria represents what we would like to see from the perfect pro - Must directly impact user privacy, i.e. must not simply provide information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/tr/desktop.md b/i18n/tr/desktop.md index a4777938..5fdf84eb 100644 --- a/i18n/tr/desktop.md +++ b/i18n/tr/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora genellikle yeni teknolojileri diğer dağıtımlardan önce benimser, örneğin [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). Bu yeni teknolojiler genellik güvenlik, gizlilik ve kullanılabilirlik iyileştirmeleriyle gelir. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). Bu yeni teknolojiler genellik güvenlik, gizlilik ve kullanılabilirlik iyileştirmeleriyle gelir. -[:octicons-home-16: Anasayfa](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/tr/device-integrity.md b/i18n/tr/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/tr/device-integrity.md +++ b/i18n/tr/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/tr/dns.md b/i18n/tr/dns.md index ed61a712..2f788c64 100644 --- a/i18n/tr/dns.md +++ b/i18n/tr/dns.md @@ -11,14 +11,14 @@ cover: dns.webp ## Önerilen Sağlayıcılar -| DNS Sağlayıcısı | Gizlilik Politikası | Protokoller | Günlük kaydı | ECS | Filtreleme | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ---------------- | ------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Bazı[^1] | Yes | Kişisel yapılandırmaya göre. Kullanılan filtre listesine buradan ulaşabilirsiniz. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Bazı[^2] | Hayır | Kişisel yapılandırmaya göre. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | İsteğe bağlı[^3] | Hayır | Kişisel yapılandırmaya göre. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | Hayır[^4] | Hayır | Kişisel yapılandırmaya göre. Kullanılan filtre listesine buradan ulaşabilirsiniz. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | İsteğe bağlı[^5] | İsteğe bağlı | Kişisel yapılandırmaya göre. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Bazı[^6] | İsteğe bağlı | Kişisel yapılandırmaya göre, varsayılan olarak Kötü Amaçlı Yazılım engelleme. | +| DNS Sağlayıcısı | Gizlilik Politikası | Protokoller | Günlük kaydı | ECS | Filtreleme | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ---------------- | ------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Bazı[^1] | Yes | Kişisel yapılandırmaya göre. Kullanılan filtre listesine buradan ulaşabilirsiniz. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Bazı[^2] | Hayır | Kişisel yapılandırmaya göre. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | İsteğe bağlı[^3] | Hayır | Kişisel yapılandırmaya göre. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | Hayır[^4] | Hayır | Kişisel yapılandırmaya göre. Kullanılan filtre listesine buradan ulaşabilirsiniz. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | İsteğe bağlı[^5] | İsteğe bağlı | Kişisel yapılandırmaya göre. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Bazı[^6] | İsteğe bağlı | Kişisel yapılandırmaya göre, varsayılan olarak Kötü Amaçlı Yazılım engelleme. | ### Kriterler @@ -50,7 +50,7 @@ Bir yapılandırma profili veya DNS Ayarları API'sini kullanan bir uygulama yü #### İmzalı Profiller -Apple şifrelenmiş DNS profilleri oluşturmak için yerel bir arayüz sağlamaz. [Güvenli DNS profil oluşturucu](https://dns.notjakob.com/tool.html) kendi şifreli DNS profillerinizi oluşturmak için resmi olmayan bir araçtır, ancak bunlar imzalanmayacaktır. İmzalanmış profiller tercih edilir; imzalama profilin kaynağını doğrular ve profillerin bütünlüğünü sağlamaya yardımcı olur. İmzalanmış yapılandırma profillerine yeşil bir "Doğrulandı" etiketi verilir. Kod imzalama hakkında daha fazla bilgi için bkz. [Kod İmzalama Hakkında](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **İmzalı profiller** [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io)ve [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/)tarafından sunulmaktadır. +Apple şifrelenmiş DNS profilleri oluşturmak için yerel bir arayüz sağlamaz. [Güvenli DNS profil oluşturucu](https://dns.notjakob.com/tool.html) kendi şifreli DNS profillerinizi oluşturmak için resmi olmayan bir araçtır, ancak bunlar imzalanmayacaktır. İmzalanmış profiller tercih edilir; imzalama profilin kaynağını doğrular ve profillerin bütünlüğünü sağlamaya yardımcı olur. İmzalanmış yapılandırma profillerine yeşil bir "Doğrulandı" etiketi verilir. Kod imzalama hakkında daha fazla bilgi için bkz. [Kod İmzalama Hakkında](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -125,7 +125,7 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home features a polished web interface to view insights and manage blocked content. @@ -144,13 +144,13 @@ AdGuard Home features a polished web interface to view insights and manage block ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -159,8 +159,8 @@ Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to suc
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/tr/email-clients.md b/i18n/tr/email-clients.md index 5c211f8a..c8ad2c39 100644 --- a/i18n/tr/email-clients.md +++ b/i18n/tr/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/tr/email.md b/i18n/tr/email.md index fad90b78..51bc6a02 100644 --- a/i18n/tr/email.md +++ b/i18n/tr/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail has internal crash reports that they **do not** share with third par #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. +Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Gizli Ödeme Yöntemleri @@ -129,7 +129,7 @@ Proton Mail dijital miras özelliği sunmuyor. #### :material-check:{ .pg-green } Custom Domains and Aliases -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Gizli Ödeme Yöntemleri @@ -137,17 +137,17 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro #### :material-check:{ .pg-green } Hesap Güvenliği -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security -Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } E-posta Şifreleme -Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Your account will be set to a restricted user account when your contract ends, a #### :material-information-outline:{ .pg-blue } Additional Functionality -You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. -All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criteria @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/tr/encryption.md b/i18n/tr/encryption.md index d774167a..aa3ee158 100644 --- a/i18n/tr/encryption.md +++ b/i18n/tr/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/tr/file-sharing.md b/i18n/tr/file-sharing.md index 3e7ddb25..f41684f4 100644 --- a/i18n/tr/file-sharing.md +++ b/i18n/tr/file-sharing.md @@ -15,7 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** Mozilla'nın artık geliştirilmeyen Firefox Send hizmetinin bir fork'udur, ve başkalarına bağlantı ile dosya göndermenize olanak tanır. Dosyalar cihanızda şifrelenir, böylece sunucu tarafından okunamazlar ve isteğe bağlı olarak parola korumalı da olabilirler. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** Mozilla'nın artık geliştirilmeyen Firefox Send hizmetinin bir fork'udur, ve başkalarına bağlantı ile dosya göndermenize olanak tanır. Dosyalar cihanızda şifrelenir, böylece sunucu tarafından okunamazlar ve isteğe bağlı olarak parola korumalı da olabilirler. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ Sitemizin her bölümü için tanımlanmış kriterler oluşturmaya çalışıyo [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ Sitemizin her bölümü için tanımlanmış kriterler oluşturmaya çalışıyo [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/tr/financial-services.md b/i18n/tr/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/tr/financial-services.md +++ b/i18n/tr/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/tr/frontends.md b/i18n/tr/frontends.md index 01d5ea76..1769b24a 100644 --- a/i18n/tr/frontends.md +++ b/i18n/tr/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/tr/index.md b/i18n/tr/index.md index b7c984ec..10500863 100644 --- a/i18n/tr/index.md +++ b/i18n/tr/index.md @@ -62,12 +62,12 @@ Tüm verilerinizi her zaman herkesten korumaya çalışmak pratik değildir, pah ## Sana ihtiyacımız var! Nasıl dahil olabilirsiniz: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Forumumuza Katılın" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Bizi Mastodon'da takip edin" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Bu web sitesine katkıda bulunun" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Bu web sitesini çevirmeye yardımcı olun" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Matrix'te bizimle sohbet edin" } -[:material-information-outline:](about/index.md){ title="Hakkımızda daha fazla bilgi edinin" } -[:material-hand-coin-outline:](about/donate.md){ title="Projeyi destekleyin" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } Privacy Guides gibi bir web sitesinin her zaman güncel kalması önemlidir. Hedef kitlemizin sitemizde listelenen uygulamalar için yazılım güncellemelerini takip etmesine ve önerdiğimiz sağlayıcılarla ilgili son haberleri izlemesine ihtiyacımız var. İnternetin hızlı temposuna ayak uydurmak zor, ancak elimizden gelenin en iyisini yapmaya çalışıyoruz. Bir hata tespit ederseniz, bir sağlayıcının listelenmemesi gerektiğini düşünürseniz, nitelikli bir sağlayıcının eksik olduğunu fark ederseniz, bir tarayıcı eklentisinin artık en iyi seçenek olmadığını düşünürseniz veya başka bir sorunu ortaya çıkarırsanız, lütfen bize bildirin. diff --git a/i18n/tr/kb-archive.md b/i18n/tr/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/tr/kb-archive.md +++ b/i18n/tr/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/tr/meta/admonitions.md b/i18n/tr/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/tr/meta/admonitions.md +++ b/i18n/tr/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/tr/meta/translations.md b/i18n/tr/meta/translations.md index 54002f37..d8902d2c 100644 --- a/i18n/tr/meta/translations.md +++ b/i18n/tr/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/tr/meta/uploading-images.md b/i18n/tr/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/tr/meta/uploading-images.md +++ b/i18n/tr/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/tr/meta/writing-style.md b/i18n/tr/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/tr/meta/writing-style.md +++ b/i18n/tr/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/tr/mobile-browsers.md b/i18n/tr/mobile-browsers.md index eed1c0da..32032bdb 100644 --- a/i18n/tr/mobile-browsers.md +++ b/i18n/tr/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ Bunlar, standart/anonim olmayan internet taraması için şu anda önerilen mobi ## Android -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** yerleşik bir içerik engelleyici ve [gizlilik özellikleri] (https://brave.com/privacy-features/) içerir ve bunların çoğu varsayılan olarak etkindir. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave, Chromium web tarayıcısı projesi üzerine inşa edilmiştir, bu nedenle kullanımı daha tanıdıktır ve olabildiğince az web sitesi uyumluluğu yaşarsınız. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/tr/multi-factor-authentication.md b/i18n/tr/multi-factor-authentication.md index 830c33c8..ee60af63 100644 --- a/i18n/tr/multi-factor-authentication.md +++ b/i18n/tr/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/tr/news-aggregators.md b/i18n/tr/news-aggregators.md index 17438718..00b22c26 100644 --- a/i18n/tr/news-aggregators.md +++ b/i18n/tr/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/tr/notebooks.md b/i18n/tr/notebooks.md index bfdd4e3d..f6bcf695 100644 --- a/i18n/tr/notebooks.md +++ b/i18n/tr/notebooks.md @@ -34,7 +34,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ If you are currently using an application like Evernote, Google Keep, or Microso Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/tr/os/android-overview.md b/i18n/tr/os/android-overview.md index b0fb0560..7965a062 100644 --- a/i18n/tr/os/android-overview.md +++ b/i18n/tr/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/tr/os/ios-overview.md b/i18n/tr/os/ios-overview.md index 868757f7..6de5554d 100644 --- a/i18n/tr/os/ios-overview.md +++ b/i18n/tr/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/tr/os/linux-overview.md b/i18n/tr/os/linux-overview.md index 5bb0b7d7..489fcfd8 100644 --- a/i18n/tr/os/linux-overview.md +++ b/i18n/tr/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## Genel Öneriler @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/tr/os/macos-overview.md b/i18n/tr/os/macos-overview.md index 9e4a745d..31b5ffbd 100644 --- a/i18n/tr/os/macos-overview.md +++ b/i18n/tr/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Önerilen Yapılandırma Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/tr/os/qubes-overview.md b/i18n/tr/os/qubes-overview.md index c76924d9..fcea270b 100644 --- a/i18n/tr/os/qubes-overview.md +++ b/i18n/tr/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/tr/passwords.md b/i18n/tr/passwords.md index d035acc9..2dd00250 100644 --- a/i18n/tr/passwords.md +++ b/i18n/tr/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Parola Yöneticisi operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Parola Yöneticisi operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Parola Yöneticisi operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Parola Yöneticisi operatingSystem: - Windows @@ -127,7 +127,7 @@ Parola yöneticileri, bir ana parola kullanarak parolaları ve diğer kimlik bil Tarayıcılar ve işletim sistemleri gibi yazılımlardaki yerleşik parola yöneticileri bazen özel parola yöneticisi yazılımları kadar iyi olmayabilir. Yerleşik parola yöneticisinin avantajı uygulamayla iyi entagrasyona sahip olmasıdır, ancak bazen çok basit kaçıp bağımsız uygulamaların sahip olduğu gizlilik ve güvenlik özelliklerinden yoksun olabilir. -Örneğin Microsoft Edge'in parola yöneticisi uçtan uca şifrelemeyi desteklemez. Google'ın parola yöneticisi [isteğe bağlı](https://support.google.com/accounts/answer/11350823) uçtan uca şifrelemeye sahiptir ve [Apple'ın](https://support.apple.com/en-us/HT202303) yöneticisi varsayılan olarak uçtan uca şifreleme sunar. +Örneğin Microsoft Edge'in parola yöneticisi uçtan uca şifrelemeyi desteklemez. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ Bu parola yöneticileri, tüm cihazlarınızdan kolay erişim ve cihaz kaybına [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ Bu parola yöneticileri, tüm cihazlarınızdan kolay erişim ve cihaz kaybına -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/tr/photo-management.md b/i18n/tr/photo-management.md index a041bdcb..1bb46cae 100644 --- a/i18n/tr/photo-management.md +++ b/i18n/tr/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/tr/productivity.md b/i18n/tr/productivity.md index ad033c14..dcc5f1cf 100644 --- a/i18n/tr/productivity.md +++ b/i18n/tr/productivity.md @@ -19,9 +19,9 @@ cover: productivity.webp [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** gelişmiş özelliklere sahip ücretsiz ve açık kaynaklı bir ofis programıdır. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice**, Nextcloud ile entegrasyon da dahil olmak üzere gelişmiş özelliklere sahip bulut tabanlı ücretsiz ve açık kaynaklı bir ofis programıdır. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ Genel olarak, ofis programlarını çoğu ihtiyaç için Microsoft Word'ün yeri **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/tr/real-time-communication.md b/i18n/tr/real-time-communication.md index e4d135f5..5a4a3a3a 100644 --- a/i18n/tr/real-time-communication.md +++ b/i18n/tr/real-time-communication.md @@ -22,18 +22,18 @@ Bu mesajlaşma uygulamaları hassas iletişimlerinizi güvence altına almak iç **Signal**, Signal Messenger LLC tarafından geliştirilen bir mobil uygulamadır. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Profiller de şifrelenir ve yalnızca sohbet ettiğiniz kişilerle paylaşılır. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. [Gizli Gönderici](https://signal.org/blog/sealed-sender/) etkinleştirildiğinde Signal, en aza indirgenmiş metadata'ya sahiptir. Gönderenin adresi mesajla birlikte şifrelenir ve sunucu tarafından yalnızca alıcı adresi görülebilir. Gizli Gönderici varsayılan olarak yalnızca kişileriniz için etkindir ancak spam alma riskini arttırmakla beraber tüm alıcılar için etkinleştirilebilir. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Profiller de şifrelenir ve yalnızca sohbet ettiğiniz kişilerle paylaşılır. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. Gönderenin adresi mesajla birlikte şifrelenir ve sunucu tarafından yalnızca alıcı adresi görülebilir. Gizli Gönderici varsayılan olarak yalnızca kişileriniz için etkindir ancak spam alma riskini arttırmakla beraber tüm alıcılar için etkinleştirilebilir. -Protokol 2016 yılında bağımsız olarak [denetlenmiştir](https://eprint.iacr.org/2016/1013.pdf). Signal protokolünün özellikleri [dokümantasyonunda](https://signal.org/docs/) bulunabilir. +Protokol 2016 yılında bağımsız olarak [denetlenmiştir](https://eprint.iacr.org/2016/1013.pdf). The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). Signal kurulumunuzu yapılandırma ve sağlamlaştırma konusunda bazı ek ipuçlarımız var: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ Signal kurulumunuzu yapılandırma ve sağlamlaştırma konusunda bazı ek ipuç Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/tr/router.md b/i18n/tr/router.md index 5100fb59..ecf83a37 100644 --- a/i18n/tr/router.md +++ b/i18n/tr/router.md @@ -35,7 +35,10 @@ Cihazınızın desteklenip desteklenmediğini kontrol etmek için OpenWrt'nin [d **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. Bir ağ için özel bir güvenlik duvarı/yönlendirici yapmak üzere bir bilgisayara kurulmuştur ve güvenilirliği, genellikle, sadece pahalı ticari güvenlik duvarlarında bulunan özellikler sunmasıyla bilinir. -pfSense genellikle çevre güvenlik duvarı, yönlendirici, kablosuz erişim noktası, DHCP sunucusu, DNS sunucusu ve VPN noktası olarak dağıtılır. +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/tr/search-engines.md b/i18n/tr/search-engines.md index 7fc05e18..9ffdbb0b 100644 --- a/i18n/tr/search-engines.md +++ b/i18n/tr/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/tr/tools.md b/i18n/tr/tools.md index 84d8fc27..8fb1f5ad 100644 --- a/i18n/tr/tools.md +++ b/i18n/tr/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Learn more :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/tr/tor.md b/i18n/tr/tor.md index f5df0b63..14d83bdb 100644 --- a/i18n/tr/tor.md +++ b/i18n/tr/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Tarayıcı image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a -The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake does not increase your privacy in any way, nor is it used to connect t Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/tr/vpn.md b/i18n/tr/vpn.md index 176375f2..ffd149b7 100644 --- a/i18n/tr/vpn.md +++ b/i18n/tr/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -42,19 +42,19 @@ If you're looking for added **security**, you should always ensure you're connec ![Proton VPN logo](assets/img/vpn/protonvpn.svg){ align=right } **Proton VPN**, VPN alanında güçlü bir rakiptir ve 2016'dan beri faaliyet göstermektedir. İsviçre merkezli Proton AG, sınırlı bir ücretsiz versiyonun yanı sıra daha özellikli bir premium seçenek de sunuyor. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -71,7 +71,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -Ocak 2020 itibarıyla Proton VPN, SEC Consult tarafından bağımsız bir denetimden geçmiştir. SEC Consult, Proton VPN'in Windows, Android ve iOS uygulamalarında bazı orta ve düşük riskli güvenlik açıklarını buldu ve bunların tümü raporlar yayınlanmadan önce Proton VPN tarafından "uygun şekilde düzeltildi". Tespit edilen sorunların hiçbiri bir saldırganın cihazınıza veya trafiğinize uzaktan erişim sağlamasına neden olmaz. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +Ocak 2020 itibarıyla Proton VPN, SEC Consult tarafından bağımsız bir denetimden geçmiştir. SEC Consult, Proton VPN'in Windows, Android ve iOS uygulamalarında bazı orta ve düşük riskli güvenlik açıklarını buldu ve bunların tümü raporlar yayınlanmadan önce Proton VPN tarafından "uygun şekilde düzeltildi". Tespit edilen sorunların hiçbiri bir saldırganın cihazınıza veya trafiğinize uzaktan erişim sağlamasına neden olmaz. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -83,31 +83,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -117,9 +117,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. Size en yakın sunucuya sahip bir VPN sağlayıcısı seçmek, gönderdiğiniz ağ trafiğinin gecikme süresini azaltacaktır. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -127,10 +127,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -138,7 +138,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Bunun nedeni hedefe giden rotanın daha kısa olmasıdır (daha az atlama). +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Bunun nedeni hedefe giden rotanın daha kısa olmasıdır (daha az atlama). { .annotate } 1. Last checked: 2023-12-21 @@ -147,11 +147,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -159,25 +159,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -189,19 +189,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -209,7 +209,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Bunun nedeni hedefe giden rotanın daha kısa olmasıdır (daha az atlama). +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. Bunun nedeni hedefe giden rotanın daha kısa olmasıdır (daha az atlama). { .annotate } 1. Last checked: 2023-12-21 @@ -222,11 +222,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -238,17 +238,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -256,11 +256,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria diff --git a/i18n/uk/CODE_OF_CONDUCT.md b/i18n/uk/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/uk/CODE_OF_CONDUCT.md +++ b/i18n/uk/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/uk/about/index.md b/i18n/uk/about/index.md index 1ed8aba7..4f8c3aae 100644 --- a/i18n/uk/about/index.md +++ b/i18n/uk/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/uk/about/notices.md b/i18n/uk/about/notices.md index 88fa05e7..1f7b335b 100644 --- a/i18n/uk/about/notices.md +++ b/i18n/uk/about/notices.md @@ -29,7 +29,7 @@ Unless otherwise noted, all **content** on this website is made available under Це означає, що ви можете використовувати читабельний вміст в цьому репозиторії для вашого власного проєкту відповідно до умов, викладених в універсальному тексті CC0 1.0. Ви **не маєте права** використовувати брендинг Privacy Guides у своєму власному проєкті без прямого схвалення цього проєкту. Торгові марки бернду Privacy Guides включають в себе логотип та "Privacy Guides". Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -Ми вважаємо, що логотипи та інші зображення в `assets`, отримані від сторонніх постачальників, є або суспільним надбанням, або **добросовісним використанням**. У двох словах, правова [доктрина добросовісного використання](https://www.copyright.gov/fair-use/more-info.html) дозволяє використання зображень, захищених авторським правом, для ідентифікації предмета з метою публічного обговорення. Однак ці логотипи та інші зображення все ще можуть підпадати під дію законів про товарні знаки в одній або декількох юрисдикціях. Перед використанням цього контенту, будь ласка, переконайтеся, що він використовується для ідентифікації юридичної особи або організації, якій належить товарний знак, і що у вас є право використовувати його відповідно до законів, які застосовуються в обставинах вашого передбачуваного використання. *Копіюючи вміст з цього вебсайту, ви несете повну відповідальність за те, щоб не порушувати чужу торгову марку або авторські права.* +Ми вважаємо, що логотипи та інші зображення в `assets`, отримані від сторонніх постачальників, є або суспільним надбанням, або **добросовісним використанням**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. Однак ці логотипи та інші зображення все ще можуть підпадати під дію законів про товарні знаки в одній або декількох юрисдикціях. Перед використанням цього контенту, будь ласка, переконайтеся, що він використовується для ідентифікації юридичної особи або організації, якій належить товарний знак, і що у вас є право використовувати його відповідно до законів, які застосовуються в обставинах вашого передбачуваного використання. *Копіюючи вміст з цього вебсайту, ви несете повну відповідальність за те, щоб не порушувати чужу торгову марку або авторські права.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ When you contribute to our website you are doing so under the above licenses, an --- -*Частини самого цього повідомлення були взяті з [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) на GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Частини самого цього повідомлення були взяті з [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) на GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/uk/about/privacytools.md b/i18n/uk/about/privacytools.md index 512ebb93..0c889f62 100644 --- a/i18n/uk/about/privacytools.md +++ b/i18n/uk/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/uk/advanced/communication-network-types.md b/i18n/uk/advanced/communication-network-types.md index e8e60399..29e535e6 100644 --- a/i18n/uk/advanced/communication-network-types.md +++ b/i18n/uk/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/uk/advanced/dns-overview.md b/i18n/uk/advanced/dns-overview.md index 21889d85..2ffb67b2 100644 --- a/i18n/uk/advanced/dns-overview.md +++ b/i18n/uk/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/uk/advanced/payments.md b/i18n/uk/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/uk/advanced/payments.md +++ b/i18n/uk/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/uk/advanced/tor-overview.md b/i18n/uk/advanced/tor-overview.md index 8a6ab1ce..cc7a2fad 100644 --- a/i18n/uk/advanced/tor-overview.md +++ b/i18n/uk/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/uk/android.md b/i18n/uk/android.md index 6a650455..2f79dd91 100644 --- a/i18n/uk/android.md +++ b/i18n/uk/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. To learn more about Android: @@ -113,7 +113,7 @@ End-of-life devices (such as GrapheneOS or CalyxOS's "extended support" devices) GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wiki/Hardening_(computing)) and privacy improvements. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported. -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS provides additional [security hardening](https://en.wikipedia.org/wik -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel phones are the only devices that currently meet GrapheneOS's [hardw ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org/). +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. It has signed builds, making it possible to have [verified boot](https://source.android.com/security/verifiedboot) on some non-Pixel devices. [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d -DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter supports blocking contact search cross profiles and sharing files across [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +322,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for **Aurora Store** is a Google Play Store client which does not require a Google Account, Google Play Services, or microG to download apps. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/uk/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/uk/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/uk/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/uk/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/uk/assets/img/how-tor-works/tor-encryption.svg b/i18n/uk/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/uk/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/uk/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/uk/assets/img/how-tor-works/tor-path-dark.svg b/i18n/uk/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/uk/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/uk/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/uk/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/uk/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/uk/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/uk/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/uk/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/uk/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/uk/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/uk/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/uk/assets/img/how-tor-works/tor-path.svg b/i18n/uk/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/uk/assets/img/how-tor-works/tor-path.svg +++ b/i18n/uk/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/uk/basics/account-deletion.md b/i18n/uk/basics/account-deletion.md index cd89ea6f..857a57d8 100644 --- a/i18n/uk/basics/account-deletion.md +++ b/i18n/uk/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/uk/basics/common-misconceptions.md b/i18n/uk/basics/common-misconceptions.md index b14bd796..0803e985 100644 --- a/i18n/uk/basics/common-misconceptions.md +++ b/i18n/uk/basics/common-misconceptions.md @@ -88,7 +88,7 @@ We don't suggest using a VPN or Tor for any of these things, as your identity is 2. **Невідома особистість** — невідома особистість може бути стабільним псевдонімом, який ви регулярно використовуєте. Він не є анонімним, бо не змінюється. Якщо ви є частиною онлайн-спільноти, можливо, ви захочете зберегти образ, який знають інші. Цей псевдонім не є анонімним, оскільки за умови тривалого спостереження за ним можна отримати додаткову інформацію про його власника, наприклад, про те, як він пише, його загальні знання про теми, які його цікавлять, тощо. -Ви можете використовувати VPN для цього, щоб приховати свою IP-адресу. Фінансові транзакції складніше приховати: Ви можете розглянути можливість використання анонімних криптовалют, таких як [Monero](https://www.getmonero.org/). Використання зміни альткоїнів також може допомогти приховати, звідки походить ваша валюта. Як правило, обмінники вимагають пройти процедуру KYC (знай свого клієнта), перш ніж вони дозволять вам обміняти фіатну валюту на будь-який вид криптовалюти. Місцеві варіанти зустрічей також можуть бути рішенням, але вони часто дорожчі, а іноді також вимагають KYC. +Ви можете використовувати VPN для цього, щоб приховати свою IP-адресу. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Використання зміни альткоїнів також може допомогти приховати, звідки походить ваша валюта. Як правило, обмінники вимагають пройти процедуру KYC (знай свого клієнта), перш ніж вони дозволять вам обміняти фіатну валюту на будь-який вид криптовалюти. Місцеві варіанти зустрічей також можуть бути рішенням, але вони часто дорожчі, а іноді також вимагають KYC. 3. **Анонімна особистість** — навіть маючи досвід, анонімну особистість важко підтримувати тривалий час. Це мають бути короткострокові та недовговічні ідентичності, які регулярно змінюються. diff --git a/i18n/uk/basics/common-threats.md b/i18n/uk/basics/common-threats.md index f76944b4..2038dbf4 100644 --- a/i18n/uk/basics/common-threats.md +++ b/i18n/uk/basics/common-threats.md @@ -55,7 +55,7 @@ description: Ваша модель загроз є особистою, але ц -Якщо ви стурбовані **фізичними атаками**, вам слід використовувати операційну систему з безпечною перевіреною реалізацією завантаження, таку як Android, iOS, macOS або [Windows (з TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). Також слід переконатися, що ваш диск зашифровано, а операційна система використовує TPM або Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) чи [Element](https://developers.google.com/android/security/android-ready-se) для обмеження кількості спроб введення ключової фрази шифрування. Вам слід уникати спільного використання комп'ютера з людьми, яким ви не довіряєте, оскільки більшість настільних операційних систем не шифрують дані окремо для кожного користувача. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). Також слід переконатися, що ваш диск зашифровано, а операційна система використовує TPM або Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) чи [Element](https://developers.google.com/android/security/android-ready-se) для обмеження кількості спроб введення ключової фрази шифрування. Вам слід уникати спільного використання комп'ютера з людьми, яким ви не довіряєте, оскільки більшість настільних операційних систем не шифрують дані окремо для кожного користувача. ## Конфіденційність від постачальників послуг @@ -89,16 +89,16 @@ description: Ваша модель загроз є особистою, але ц

Atlas of Surveillance

-Якщо ви хочете дізнатися більше про методи спостереження і про те, як вони застосовуються у вашому місті, ви також можете ознайомитися з [Атласом спостереження] (https://atlasofsurveillance.org/) від [Electronic Frontier Foundation] (https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Уряди часто виправдовують програми масового спостереження як необхідні засоби для боротьби з тероризмом і запобігання злочинності. Однак, порушуючи права людини, це найчастіше використовується для непропорційного переслідування груп меншин та політичних дисидентів, серед інших.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

Після викриттів [Едвардом Сноуденом таких урядових програм як [PRISM](https://uk.wikipedia.org/wiki/PRISM_(розвідувальна_програма)) і [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], співробітники розвідки також визнали, що АНБ роками таємно збирало записи про телефонні дзвінки практично кожного американця - хто кому дзвонить, коли ці дзвінки здійснюються і як довго вони тривають. Така інформація, яку АНБ збирає день за днем, може розкрити неймовірно делікатні подробиці про життя людей і їхні зв'язки, наприклад, чи телефонували вони до пастора, лікаря, який робить аборти, консультанта з питань залежності або на гарячу лінію для самогубців. @@ -144,7 +144,7 @@ In France you can take a look at the [Technopolice website](https://technopolice Цензуру в Інтернеті можуть здійснювати (різною мірою) такі суб'єкти, як тоталітарні уряди, мережеві адміністратори та провайдери послуг. Ці спроби контролювати комунікацію та обмежувати доступ до інформації завжди будуть несумісні з правом людини на свободу вираження поглядів.[^5] -Цензура на корпоративних платформах стає все більш поширеним явищем, оскільки такі платформи, як Twitter і Facebook, піддаються суспільному попиту, тиску ринку і тиску з боку державних органів. Державний тиск може бути прихованим, як, наприклад, коли Білий дім [вимагає видалити](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) провокаційне відео на YouTube, або відкритим, як, наприклад, коли уряд Китаю вимагає від компаній дотримуватися суворого режиму цензури. +Цензура на корпоративних платформах стає все більш поширеним явищем, оскільки такі платформи, як Twitter і Facebook, піддаються суспільному попиту, тиску ринку і тиску з боку державних органів. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. Люди, стурбовані загрозою цензури, можуть використовувати такі технології, як [Tor](../advanced/tor-overview.md), щоб обійти її, і підтримувати стійкі до цензури комунікаційні платформи, такі як [Matrix](../real-time-communication.md#element), які не мають централізованого облікового органу, що може довільно закривати акаунти. @@ -162,5 +162,5 @@ In France you can take a look at the [Technopolice website](https://technopolice [^1]: Вікіпедія: [*Масове спостереження*](https://en.wikipedia.org/wiki/Mass_surveillance) та [*Спостереження*](https://uk.wikipedia.org/wiki/Спостереження_(негласне)). [^2]: Рада з нагляду за дотриманням приватності та громадянських свобод США: [*Звіт про програму прослуховування телефонних розмов, здійснену відповідно до Розділу 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Вікіпедія: [*Капіталізм нагляду*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Ви також повинні використовувати інші методи пом'якшення. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. Ви також повинні використовувати інші методи пом'якшення. [^5]: Організація Об'єднаних Націй: [*Декларація про права людини*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/uk/basics/email-security.md b/i18n/uk/basics/email-security.md index 6b0577d8..5f492d9c 100644 --- a/i18n/uk/basics/email-security.md +++ b/i18n/uk/basics/email-security.md @@ -13,7 +13,7 @@ description: Електронна пошта за своєю природою є Стандартним способом додавання E2EE до листів між різними поштовими провайдерами є використання OpenPGP. Існують різні реалізації стандарту OpenPGP, найпоширенішими з яких є [GnuPG](https://uk.wikipedia.org/wiki/GNU_Privacy_Guard) та [OpenPGP.js](https://openpgpjs.org). -Існує ще один стандарт, популярний серед бізнесу, який називається [S/MIME](https://uk.wikipedia.org/wiki/S/MIME), однак для нього потрібен сертифікат, виданий [Центром сертифікації](https://uk.wikipedia.org/wiki/%D0%90%D0%BA%D1%80%D0%B5%D0%B4%D0%B8%D1%82%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B9_%D1%86%D0%B5%D0%BD%D1%82%D1%80_%D1%81%D0%B5%D1%80%D1%82%D0%B8%D1%84%D1%96%D0%BA%D0%B0%D1%86%D1%96%D1%97_%D0%BA%D0%BB%D1%8E%D1%87%D1%96%D0%B2) (не всі вони видають сертифікати S/MIME). Має підтримку в [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) і [Outlook for Web або Exchange Server 2016, 2019](https://support.microsoft.com/uk-ua/office/%D1%88%D0%B8%D1%84%D1%80%D1%83%D0%B2%D0%B0%D0%BD%D0%BD%D1%8F-%D0%BF%D0%BE%D0%B2%D1%96%D0%B4%D0%BE%D0%BC%D0%BB%D0%B5%D0%BD%D1%8C-%D0%B7%D0%B0-%D0%B4%D0%BE%D0%BF%D0%BE%D0%BC%D0%BE%D0%B3%D0%BE%D1%8E-%D0%BF%D1%80%D0%BE%D1%82%D0%BE%D0%BA%D0%BE%D0%BB%D1%83-s-mime-%D0%B2-%D1%96%D0%BD%D1%82%D0%B5%D1%80%D0%BD%D0%B5%D1%82-%D0%B2%D0%B5%D1%80%D1%81%D1%96%D1%97-outlook-878c79fc-7088-4b39-966f-14512658f480). +Існує ще один стандарт, популярний серед бізнесу, який називається [S/MIME](https://uk.wikipedia.org/wiki/S/MIME), однак для нього потрібен сертифікат, виданий [Центром сертифікації](https://uk.wikipedia.org/wiki/%D0%90%D0%BA%D1%80%D0%B5%D0%B4%D0%B8%D1%82%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B9_%D1%86%D0%B5%D0%BD%D1%82%D1%80_%D1%81%D0%B5%D1%80%D1%82%D0%B8%D1%84%D1%96%D0%BA%D0%B0%D1%86%D1%96%D1%97_%D0%BA%D0%BB%D1%8E%D1%87%D1%96%D0%B2) (не всі вони видають сертифікати S/MIME). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Навіть якщо ви використовуєте OpenPGP, він не підтримує [Пряму секретність](https://uk.wikipedia.org/wiki/%D0%9F%D1%80%D1%8F%D0%BC%D0%B0_%D1%81%D0%B5%D0%BA%D1%80%D0%B5%D1%82%D0%BD%D1%96%D1%81%D1%82%D1%8C), що означає, якщо закритий ключ ваш або одержувача буде викрадено, всі попередні повідомлення, зашифровані за допомогою цього ключа, будуть відкриті. Ось чому ми рекомендуємо [месенджери](../real-time-communication.md), які реалізують пряму секретність через електронну пошту для особистого спілкування, коли це можливо. @@ -23,7 +23,7 @@ description: Електронна пошта за своєю природою є На додачу до [рекомендованих поштових клієнтів](../email-clients.md), які підтримують WKD, деякі провайдери вебпошти також підтримують WKD. Чи буде *ваш власний ключ* опублікований у WKD для використання іншими, залежить від конфігурації вашого домену. Якщо ви використовуєте [провайдера електронної пошти](../email.md#openpgp-compatible-services), який підтримує WKD, наприклад, Proton Mail або Mailbox.org, вони можуть опублікувати для вас ваш ключ OpenPGP на своєму домені. -Якщо ви використовуєте власний домен, вам потрібно буде налаштувати WKD окремо. Якщо ви контролюєте своє доменне ім'я, ви можете налаштувати WKD незалежно від провайдера електронної пошти. Один з простих способів зробити це - скористатися функцією "[WKD як сервіс](https://keys.openpgp.org/about/usage#wkd-as-a-service)" з сайту keys.openpgp.org, встановивши запис CNAME на піддомені `openpgpkey` вашого домену, що вказує на `wkd.keys.openpgp.org`, а потім завантаживши ваш ключ на [keys.openpgp.org](https://keys.openpgp.org/). Крім того, ви можете [самостійно розмістити WKD на власному веб-сервері](https://wiki.gnupg.org/WKDHosting). +Якщо ви використовуєте власний домен, вам потрібно буде налаштувати WKD окремо. Якщо ви контролюєте своє доменне ім'я, ви можете налаштувати WKD незалежно від провайдера електронної пошти. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Крім того, ви можете [самостійно розмістити WKD на власному веб-сервері](https://wiki.gnupg.org/WKDHosting). Якщо ви використовуєте домен від провайдера, який не підтримує WKD, наприклад @gmail.com, ви не зможете поділитися своїм ключем OpenPGP з іншими за допомогою цього методу. @@ -33,7 +33,7 @@ description: Електронна пошта за своєю природою є ### Як захистити свої приватні ключі? -Смарт-карта (наприклад, [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) або [Nitrokey](https://www.nitrokey.com)) працює, отримуючи зашифроване електронне повідомлення з пристрою (телефона, планшета, комп'ютера тощо), на якому запущено клієнт електронної пошти/веб-пошти. Потім повідомлення розшифровується смарткартою, і розшифрований вміст надсилається назад на пристрій. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. Потім повідомлення розшифровується смарткартою, і розшифрований вміст надсилається назад на пристрій. Для уникнення можливого потрапляння вашого приватного ключа на скомпрометований пристрій бажано, щоб розшифрування відбувалося на смарткарті. diff --git a/i18n/uk/basics/multi-factor-authentication.md b/i18n/uk/basics/multi-factor-authentication.md index 75cb7e9b..92a563d7 100644 --- a/i18n/uk/basics/multi-factor-authentication.md +++ b/i18n/uk/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/uk/basics/passwords-overview.md b/i18n/uk/basics/passwords-overview.md index 9178bded..d6c5e877 100644 --- a/i18n/uk/basics/passwords-overview.md +++ b/i18n/uk/basics/passwords-overview.md @@ -54,13 +54,13 @@ description: These are some tips and tricks on how to create the strongest passw

Note

-Ці інструкції припускають, що ви використовуєте [великий список слів EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) для генерації парольної фрази, яка вимагає п'ять кидків кубика на слово. Інші словники можуть вимагати більшої або меншої кількості кидків на слово, а також іншої кількості слів для досягнення тієї ж самої ентропії. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Інші словники можуть вимагати більшої або меншої кількості кидків на слово, а також іншої кількості слів для досягнення тієї ж самої ентропії.
1. Киньте шестигранний кубик п'ять разів, записуючи число після кожного кидка. -2. Для прикладу, припустимо, що ви викинули `2-5-2-6-6`. Подивіться у [великий список слів EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) слово, яке відповідає `25266`. +2. Для прикладу, припустимо, що ви викинули `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. Ви знайдете слово `encrypt`. Запишіть це слово. @@ -75,20 +75,20 @@ description: These are some tips and tricks on how to create the strongest passw Якщо у вас немає доступу до справжніх гральних кубиків або ви не хочете використовувати їх, ви можете скористатися вбудованим генератором паролів вашого менеджера паролів, оскільки більшість з них мають можливість генерувати парольні фрази на додачу до звичайних паролів. -Ми рекомендуємо використовувати [великий список слів EFF](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) для генерації паролів для diceware, оскільки він забезпечує таку ж безпеку, як і оригінальний список, але містить слова, які легше запам'ятовувати. Існують також [інші списки слів різними мовами](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), якщо ви не хочете, щоб ваша парольна фраза була англійською. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. Існують також [інші списки слів різними мовами](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), якщо ви не хочете, щоб ваша парольна фраза була англійською.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. Одним із показників для визначення сили парольної фрази є її ентропія. Ентропія кожного слова у фразі обчислюється як $\text{log}_2(\text{WordsInList})$, а загальна ентропія фрази обчислюється як $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Отже, кожне слово у вищезгаданому списку дає ~12.9 біт ентропії ($\text{log}_2(7776)$), а похідна від нього фраза з семи слів має ~90.47 біт ентропії ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. Щоб підрахувати кількість можливих ключових фраз, все, що нам потрібно зробити, це $\text{WordsInList}^\text{WordsInPhrase}$, або у нашому випадку, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. Щоб підрахувати кількість можливих ключових фраз, все, що нам потрібно зробити, це $\text{WordsInList}^\text{WordsInPhrase}$, або у нашому випадку, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. В середньому, щоб вгадати вашу фразу, потрібно спробувати 50% всіх можливих комбінацій. Враховуючи це, навіть якщо ваш супротивник здатний робити ~1 000 000 000 000 000 спроб за секунду, йому все одно знадобиться ~27 255 689 років, щоб вгадати вашу парольну фразу. Це так, навіть якщо чинні наступні умови: diff --git a/i18n/uk/basics/vpn-overview.md b/i18n/uk/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/uk/basics/vpn-overview.md +++ b/i18n/uk/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/uk/basics/why-privacy-matters.md b/i18n/uk/basics/why-privacy-matters.md index 74ba251a..45dbc211 100644 --- a/i18n/uk/basics/why-privacy-matters.md +++ b/i18n/uk/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Джерела -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/uk/calendar.md b/i18n/uk/calendar.md index fd26697b..8390538c 100644 --- a/i18n/uk/calendar.md +++ b/i18n/uk/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). Multiple calendars and extended sharing functionality is limited to paid subscribers. @@ -21,18 +21,18 @@ Multiple calendars and extended sharing functionality is limited to paid subscri [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ Multiple calendars and extended sharing functionality is limited to paid subscri Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/uk/cloud.md b/i18n/uk/cloud.md index 34b98b3d..166e2dd6 100644 --- a/i18n/uk/cloud.md +++ b/i18n/uk/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/uk/cryptocurrency.md b/i18n/uk/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/uk/cryptocurrency.md +++ b/i18n/uk/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/uk/data-redaction.md b/i18n/uk/data-redaction.md index 06bf20af..9268e0b9 100644 --- a/i18n/uk/data-redaction.md +++ b/i18n/uk/data-redaction.md @@ -88,12 +88,12 @@ The app offers multiple ways to erase metadata from images. Namely: **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ The app offers multiple ways to erase metadata from images. Namely: **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ The app offers multiple ways to erase metadata from images. Namely: Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/uk/desktop-browsers.md b/i18n/uk/desktop-browsers.md index 1652e9ee..574bf3d7 100644 --- a/i18n/uk/desktop-browsers.md +++ b/i18n/uk/desktop-browsers.md @@ -70,8 +70,8 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -442,14 +442,14 @@ We are working on establishing defined criteria for every section of our site, a - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -462,4 +462,4 @@ Our best-case criteria represents what we would like to see from the perfect pro - Must directly impact user privacy, i.e. must not simply provide information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/uk/desktop.md b/i18n/uk/desktop.md index 5252084a..1fac706b 100644 --- a/i18n/uk/desktop.md +++ b/i18n/uk/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/uk/device-integrity.md b/i18n/uk/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/uk/device-integrity.md +++ b/i18n/uk/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/uk/dns.md b/i18n/uk/dns.md index 73a139df..5af2b5b6 100644 --- a/i18n/uk/dns.md +++ b/i18n/uk/dns.md @@ -11,14 +11,14 @@ cover: dns.webp ## Рекомендовані DNS-провайдери -| DNS-провайдер | Політика конфіденційності | Протоколи | Логування | ECS | Фільтрація | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | --------------- | ----------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------ | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Деяке[^1] | Yes | Based on personal configuration. Список використовуваних фільтрів можна знайти тут. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Незашифрований текст
DoH/3
DoT | Деяке[^2] | Ні | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Незашифрований текст
DoH/3
DoT
DoQ | Опціонально[^3] | Ні | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | Немає[^4] | Ні | Based on personal configuration. Список використовуваних фільтрів можна знайти тут. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Незашифрований текст
DoH/3
DoT
DoQ | Опціонально[^5] | Опціонально | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Незашифрований текст
DoH
DoT
DNSCrypt | Деяке[^6] | Опціонально | Based on personal configuration, Malware blocking by default. | +| DNS-провайдер | Політика конфіденційності | Протоколи | Логування | ECS | Фільтрація | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | --------------- | ----------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Деяке[^1] | Yes | Based on personal configuration. Список використовуваних фільтрів можна знайти тут. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Незашифрований текст
DoH/3
DoT | Деяке[^2] | Ні | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Незашифрований текст
DoH/3
DoT
DoQ | Опціонально[^3] | Ні | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | Немає[^4] | Ні | Based on personal configuration. Список використовуваних фільтрів можна знайти тут. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Незашифрований текст
DoH/3
DoT
DoQ | Опціонально[^5] | Опціонально | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Незашифрований текст
DoH
DoT
DNSCrypt | Деяке[^6] | Опціонально | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ Android 9 і вище підтримує DNS через TLS. Налаштува #### Підписані профілі -Apple не надає власного інтерфейсу для створення зашифрованих профілів DNS. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) — неофіційний інструмент для створення власних зашифрованих DNS профілів, які, однак, не будуть підписані. Підписаним профілям надається перевага; підпис підтверджує походження профілю і допомагає забезпечити цілісність профілів. Підписаним профілям конфігурації присвоюється зелена мітка "Перевірено". Для отримання додаткової інформації про підписання коду див. [Про підписання коду](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Підписані профілі** пропонують [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io)та [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple не надає власного інтерфейсу для створення зашифрованих профілів DNS. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) — неофіційний інструмент для створення власних зашифрованих DNS профілів, які, однак, не будуть підписані. Підписаним профілям надається перевага; підпис підтверджує походження профілю і допомагає забезпечити цілісність профілів. Підписаним профілям конфігурації присвоюється зелена мітка "Перевірено". Для отримання додаткової інформації про підписання коду див. [Про підписання коду](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -74,7 +74,7 @@ Apple не надає власного інтерфейсу для створе [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -123,9 +123,9 @@ Apple не надає власного інтерфейсу для створе
-![Логотип AdGuard Home](assets/img/dns/adguard-home.svg){ align=right } +![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** - це програма з відкритим вихідним кодом [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole), яка використовує [DNS-фільтрацію](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) для блокування небажаного веб-вмісту, наприклад, реклами. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home має відшліфований веб-інтерфейс для перегляду аналітики та керування заблокованим контентом. @@ -142,25 +142,25 @@ AdGuard Home має відшліфований веб-інтерфейс для
-![Логотип Pi-hole](assets/img/dns/pi-hole.svg){ align=right } +![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** - це [DNS-sinkhole]з відкритим вихідним кодом (https://wikipedia.org/wiki/DNS_sinkhole), який використовує [DNS-фільтрацію](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) для блокування небажаного веб-контенту, наприклад, реклами. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole розроблений для розміщення на Raspberry Pi, але він не обмежується цим обладнанням. Програмне забезпечення має зручний веб-інтерфейс для перегляду аналітики та управління заблокованим контентом. -[:octicons-home-16: Домашня сторінка](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Політика конфіденційності" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Документація} -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Вихідний код" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Зробити внесок} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
[^1]: AdGuard зберігає агреговані показники продуктивності своїх DNS-серверів, а саме: кількість завершених запитів до певного сервера, кількість заблокованих запитів і швидкість обробки запитів. Вони також ведуть і зберігають базу даних доменів, до яких надходили запити протягом останніх 24 годин. "Нам потрібна ця інформація, щоб виявляти та блокувати нові трекери та загрози". "Ми також фіксуємо, скільки разів той чи інший трекер був заблокований. Нам потрібна ця інформація, щоб видалити застарілі правила з наших фільтрів". [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare збирає та зберігає лише обмежену кількість даних DNS-запитів, які надсилаються до вирішувача 1.1.1.1. Сервіс 1.1.1.1 не реєструє особисті дані, а основна частина обмежених неперсоніфікованих даних запитів зберігається лише протягом 25 годин. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare збирає та зберігає лише обмежену кількість даних DNS-запитів, які надсилаються до вирішувача 1.1.1.1. Сервіс 1.1.1.1 не реєструє особисті дані, а основна частина обмежених неперсоніфікованих даних запитів зберігається лише протягом 25 годин. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D веде журнали лише для преміум-вирішувачів зі спеціальними профілями DNS. Безкоштовні розв'язувачі не логують дані. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: DNS-сервіс Mullvad доступний обом підписникам та не підписникам Mullvad VPN. У їхній політиці конфіденційності чітко зазначено, що вони не реєструють DNS-запити жодним чином. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: DNS-сервіс Mullvad доступний обом підписникам та не підписникам Mullvad VPN. У їхній політиці конфіденційності чітко зазначено, що вони не реєструють DNS-запити жодним чином. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. Ви можете вибрати час та місце зберігання для будь-яких логів, які ви вирішите зберігати. Якщо це спеціально не запитується, дані не реєструються. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 збирає деякі дані з метою моніторингу загроз та реагування на них. Потім ці дані можуть бути змішані та поширені, наприклад, з метою дослідження безпеки. Quad9 не збирає і не записує IP-адреси або інші дані, які вони вважають особистими. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 збирає деякі дані з метою моніторингу загроз та реагування на них. Потім ці дані можуть бути змішані та поширені, наприклад, з метою дослідження безпеки. Quad9 не збирає і не записує IP-адреси або інші дані, які вони вважають особистими. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/uk/email-clients.md b/i18n/uk/email-clients.md index 7434f6bb..c7051cdb 100644 --- a/i18n/uk/email-clients.md +++ b/i18n/uk/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/uk/email.md b/i18n/uk/email.md index e15383e3..f7ddfaa6 100644 --- a/i18n/uk/email.md +++ b/i18n/uk/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail має внутрішні звіти про збої, які **не* #### :material-check:{ .pg-green } Користувацькі домени та аліаси -Абоненти оплачуваних планів Proton Mail можуть використовувати власний домен з сервісом або [всеохоплюючу](https://proton.me/support/catch-all) адресу. Proton Mail також підтримує [субадресацію](https://proton.me/support/creating-aliases), що корисно для людей, які не хочуть купувати домен. +Абоненти оплачуваних планів Proton Mail можуть використовувати власний домен з сервісом або [всеохоплюючу](https://proton.me/support/catch-all) адресу. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Конфіденційні способи оплати @@ -129,7 +129,7 @@ Proton Mail не пропонує функцію цифрової спадщин #### :material-check:{ .pg-green } Користувацькі домени та аліаси -Mailbox.org дозволяє вам використовувати власний домен і підтримує [всеохоплюючі адреси](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain). Mailbox.org також підтримує [субадресацію](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), що корисно, якщо ви не хочете купувати домен. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Конфіденційні способи оплати @@ -137,17 +137,17 @@ Mailbox.org не приймає жодних криптовалют, оскіл #### :material-check:{ .pg-green } Безпека облікового запису -Mailbox.org підтримує [двофакторну аутентифікацію](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) лише для їхньої електронної пошти. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Веб-стандарти, такі як [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) на цей момент не підтримуються. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Веб-стандарти, такі як [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) на цей момент не підтримуються. #### :material-information-outline:{ .pg-blue } Безпека даних -Mailbox.org дозволяє шифрувати вхідну пошту за допомогою їхньої [зашифрованої поштової скриньки](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). Нові повідомлення, які ви отримуєте, будуть негайно зашифровані вашим публічним ключем. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). Нові повідомлення, які ви отримуєте, будуть негайно зашифровані вашим публічним ключем. -Однак, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), програмна платформа, що використовується Mailbox.org, [не підтримує](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) шифрування вашої адресної книги та календаря. Для цієї інформації може бути більш доречною [окрема опція](calendar.md). +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. Для цієї інформації може бути більш доречною [окрема опція](calendar.md). #### :material-check:{ .pg-green } Шифрування електронної пошти -Mailbox.org має [інтегроване шифрування](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) у свою електронну пошту, що спрощує надсилання повідомлень людям з публічними ключами OpenPGP. Вони також дозволяють віддаленим одержувачам [розшифровувати електронні листи](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) на серверах Mailbox.org. Ця функція корисна, коли віддалений одержувач не має OpenPGP і не може розшифрувати копію листа у власній поштовій скриньці. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. Ця функція корисна, коли віддалений одержувач не має OpenPGP і не може розшифрувати копію листа у власній поштовій скриньці. Mailbox.org також підтримує виявлення публічних ключів через HTTP з їхнього [каталогу веб-ключів (WKD)](https://wiki.gnupg.org/WKD). Це дозволяє людям за межами Mailbox.org легко знаходити ключі OpenPGP акаунтів Mailbox.org для незалежного від провайдерів E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Mailbox.org також підтримує виявлення публічних #### :material-information-outline:{ .pg-blue } Додаткова функціональність -Ви можете отримати доступ до свого облікового запису Mailbox.org через IMAP/SMTP за допомогою їхнього сервісу [.onion](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). Однак їхній інтерфейс електронної пошти не може бути доступний через сервіс .onion, і у вас можуть виникати помилки TLS сертифіката. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). Однак їхній інтерфейс електронної пошти не може бути доступний через сервіс .onion, і у вас можуть виникати помилки TLS сертифіката. -Усі акаунти постачаються з обмеженим хмарним сховищем, яке [можна зашифрувати](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org також пропонує аліас [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), який забезпечує TLS шифрування на з'єднанні між поштовими серверами, інакше повідомлення не буде надіслано взагалі. Mailbox.org також підтримує [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) на додаток до стандартних протоколів доступу, таких як IMAP і POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org також підтримує [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) на додаток до стандартних протоколів доступу, таких як IMAP і POP3. Mailbox.org має функцію цифрової спадщини для всіх тарифних планів. Ви можете вибрати, чи хочете ви, щоб будь-які ваші дані були передані спадкоємцям, за умови, що вони подадуть заяву та нададуть ваш заповіт. Крім того, ви можете номінувати людину за ім'ям та адресою. @@ -185,18 +185,18 @@ Mailbox.org має функцію цифрової спадщини для вс [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Користувацькі домени та аліаси -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Конфіденційні способи оплати @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). Це забезпечує контакт клієнта з бізнесом, який використовує E2EE. Ця функція коштує 240 євро на рік. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). Це забезпечує контакт клієнта з бізнесом, який використовує E2EE. Ця функція коштує 240 євро на рік. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Tuta doesn't offer a digital legacy feature. - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Особливі безкоштовні можливості: @@ -310,8 +310,8 @@ The number of shared aliases (which end in a shared domain like @addy.io) that y **SimpleLogin — це безкоштовний сервіс, який надає аліаси для електронної пошти на низці загальних доменних імен, а також опціонально надає платні функції, такі як необмежена кількість псевдонімів та власні домени. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ The number of shared aliases (which end in a shared domain like @addy.io) that y - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin був [придбаний компанією Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) 8 квітня 2022 року. Якщо ви використовуєте Proton Mail як основну поштову скриньку, SimpleLogin — чудовий вибір. Оскільки обидва продукти тепер належать одній компанії, вам достатньо довіряти лише одному суб'єкту. Ми також очікуємо, що в майбутньому SimpleLogin буде більш тісно інтегрований з пропозиціями Proton. SimpleLogin продовжує підтримувати переадресацію до будь-якого провайдера електронної пошти на ваш вибір. Securitum [провела аудит](https://simplelogin.io/blog/security-audit/) SimpleLogin на початку 2022 року, і всі проблеми [були вирішені](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin був [придбаний компанією Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) 8 квітня 2022 року. Якщо ви використовуєте Proton Mail як основну поштову скриньку, SimpleLogin — чудовий вибір. Оскільки обидва продукти тепер належать одній компанії, вам достатньо довіряти лише одному суб'єкту. Ми також очікуємо, що в майбутньому SimpleLogin буде більш тісно інтегрований з пропозиціями Proton. SimpleLogin продовжує підтримувати переадресацію до будь-якого провайдера електронної пошти на ваш вибір. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). Ви можете прив'язати свій обліковий запис SimpleLogin до свого облікового запису Proton в налаштуваннях. Якщо ви маєте тарифний план Proton Unlimited, Business або Visionary, ви отримаєте SimpleLogin Premium безкоштовно. @@ -351,10 +351,10 @@ SimpleLogin був [придбаний компанією Proton AG](https://pro **Mailcow** — це більш просунутий поштовий сервер, який ідеально підходить для тих, хто має трохи більше досвіду роботи з Linux. У ньому є все необхідне в Docker-контейнері: Поштовий сервер з підтримкою DKIM, антивірус та спам-моніторинг, електронна пошта та ActiveSync з SOGo, а також веб-адміністрування з підтримкою 2FA. -[:octicons-home-16: Домашня сторінка](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Документація} -[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Вихідний код" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Зробити внесок} +[:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ SimpleLogin був [придбаний компанією Proton AG](https://pro Для більш ручного підходу ми вибрали ці дві статті: -- [Налаштування поштового сервера з OpenSMTPD, Dovecot та Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [Як запустити власний поштовий сервер](https://www.c0ffee.net/blog/mail-server-guide/) (серпень 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Критерії @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/uk/encryption.md b/i18n/uk/encryption.md index d774167a..aa3ee158 100644 --- a/i18n/uk/encryption.md +++ b/i18n/uk/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/uk/file-sharing.md b/i18n/uk/file-sharing.md index d7cd5832..f6732765 100644 --- a/i18n/uk/file-sharing.md +++ b/i18n/uk/file-sharing.md @@ -15,7 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/uk/financial-services.md b/i18n/uk/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/uk/financial-services.md +++ b/i18n/uk/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/uk/frontends.md b/i18n/uk/frontends.md index 01d5ea76..1769b24a 100644 --- a/i18n/uk/frontends.md +++ b/i18n/uk/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/uk/index.md b/i18n/uk/index.md index 64049db6..cc7820a1 100644 --- a/i18n/uk/index.md +++ b/i18n/uk/index.md @@ -62,12 +62,12 @@ schema: ## Ви нам потрібні! Ось як можна долучитися: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Приєднуйтесь до нашого форуму" } -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Слідкуйте за нами на Mastodon" } -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Зробити внесок у цей сайт" } -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Допомогти з перекладом цього сайту" } -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Поспілкуйтеся з нами на Matrix" } -[:material-information-outline:](about/index.md){ title="Дізнатися більше про нас" } -[:material-hand-coin-outline:](about/donate.md){ title="Підтримати проект" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } Для таких сайтів, як Privacy Guides, важливо завжди залишатися актуальними. Ми хочемо, щоб наша аудиторія стежила за оновленнями програмного забезпечення для додатків, перелічених на нашому сайті, а також за останніми новинами про провайдерів, яких ми рекомендуємо. Важко встигати за швидким темпом інтернету, але ми намагаємося з усіх сил. Якщо ви помітили помилку, вважаєте, що провайдер не повинен бути в списку, помітили відсутність кваліфікованого провайдера, вважаєте, що плагін для браузера більше не є найкращим вибором, або виявили будь-яку іншу проблему, будь ласка, повідомте нам про це. diff --git a/i18n/uk/kb-archive.md b/i18n/uk/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/uk/kb-archive.md +++ b/i18n/uk/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/uk/meta/admonitions.md b/i18n/uk/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/uk/meta/admonitions.md +++ b/i18n/uk/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/uk/meta/translations.md b/i18n/uk/meta/translations.md index 658e0180..21f581fd 100644 --- a/i18n/uk/meta/translations.md +++ b/i18n/uk/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/uk/meta/uploading-images.md b/i18n/uk/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/uk/meta/uploading-images.md +++ b/i18n/uk/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/uk/meta/writing-style.md b/i18n/uk/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/uk/meta/writing-style.md +++ b/i18n/uk/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/uk/mobile-browsers.md b/i18n/uk/mobile-browsers.md index 57ae950f..e1875e1a 100644 --- a/i18n/uk/mobile-browsers.md +++ b/i18n/uk/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ These are our currently recommended mobile web browsers and configurations for s ## Android -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/uk/multi-factor-authentication.md b/i18n/uk/multi-factor-authentication.md index 830c33c8..ee60af63 100644 --- a/i18n/uk/multi-factor-authentication.md +++ b/i18n/uk/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/uk/news-aggregators.md b/i18n/uk/news-aggregators.md index 17438718..00b22c26 100644 --- a/i18n/uk/news-aggregators.md +++ b/i18n/uk/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/uk/notebooks.md b/i18n/uk/notebooks.md index 2131e5e0..0eb1ebef 100644 --- a/i18n/uk/notebooks.md +++ b/i18n/uk/notebooks.md @@ -34,7 +34,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ If you are currently using an application like Evernote, Google Keep, or Microso Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/uk/os/android-overview.md b/i18n/uk/os/android-overview.md index d8462bdc..a18436ec 100644 --- a/i18n/uk/os/android-overview.md +++ b/i18n/uk/os/android-overview.md @@ -60,7 +60,7 @@ Verified Boot забезпечує цілісність файлів опера Оскільки такі компоненти телефону, як процесор та радіотехнології, покладаються на компоненти із закритим вихідним кодом, оновлення повинні надаватися відповідними виробниками. Тому важливо, щоб ви придбали пристрій в рамках активного циклу підтримки. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) та [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) підтримують свої пристрої протягом 4 років, тоді як дешевші продукти часто мають коротші цикли підтримки. -Пристрої EOL, які більше не підтримуються виробником SoC, не можуть отримувати оновлення мікропрограми від OEM-виробників або сторонніх дистриб'юторів Android. Це означає, що проблеми безпеки на цих пристроях залишаться не усуненими. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +Пристрої EOL, які більше не підтримуються виробником SoC, не можуть отримувати оновлення мікропрограми від OEM-виробників або сторонніх дистриб'юторів Android. Це означає, що проблеми безпеки на цих пристроях залишаться не усуненими. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. Важливо не використовувати версії Android з [вичерпаним терміном служби](https://endoflife.date/android). Новіші версії Android не тільки отримують оновлення безпеки для операційної системи, але й важливі оновлення, що покращують конфіденційність. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ Android 7 and above supports a VPN kill switch, and it is available without the ### Програма додаткового захисту -Якщо у вас є обліковий запис Google, радимо зареєструватися в [Програмі Додаткового Захисту](https://landing.google.com/advancedprotection/). Це дозволить вам отримати **деякі** виправлення безпеки від Google, не порушуючи при цьому моделі безпеки Android використовуючи небезпечну похідну Android і збільшуючи поверхню атаки. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). Це дозволить вам отримати **деякі** виправлення безпеки від Google, не порушуючи при цьому моделі безпеки Android використовуючи небезпечну похідну Android і збільшуючи поверхню атаки. Програма додаткового захисту забезпечує посилений моніторинг загроз та вмикає: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Доступ до даних облікового запису можуть отримувати лише Google і перевірені сторонні програми - Сканування вхідних електронних листів в акаунтах Gmail на предмет [спроб фішингу](https://en.wikipedia.org/wiki/Phishing#Email_phishing) -- Суворіше [сканування веб-переглядача](https://www.google.com/chrome/privacy/whitepaper.html#malware) з Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Більш суворий процес відновлення облікових записів з втраченими обліковими даними - Якщо ви використовуєте не ізольовані сервіси Google Play (поширені в заводських операційних системах), Програма Додаткового Захисту також надає декілька [додаткових переваг](https://support.google.com/accounts/answer/9764949?hl=en), таких як: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Обов'язкове автоматичне сканування пристрою за допомогою [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Попередження про неперевірені додатки ### Оновлення системи Google Play @@ -169,7 +169,7 @@ In the past, Android security updates had to be shipped by the operating system ### Рекламний ідентифікатор -Всі пристрої з встановленими сервісами Google Play автоматично генерують [рекламний ідентифікатор](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en), який використовується для таргетованої реклами. Вимкніть цю функцію, щоб обмежити збір даних про вас. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Вимкніть цю функцію, щоб обмежити збір даних про вас. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/uk/os/ios-overview.md b/i18n/uk/os/ios-overview.md index 949d360e..d2744bad 100644 --- a/i18n/uk/os/ios-overview.md +++ b/i18n/uk/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/uk/os/linux-overview.md b/i18n/uk/os/linux-overview.md index da9fa962..56db7195 100644 --- a/i18n/uk/os/linux-overview.md +++ b/i18n/uk/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/uk/os/macos-overview.md b/i18n/uk/os/macos-overview.md index 9cbde7f5..f252fdb8 100644 --- a/i18n/uk/os/macos-overview.md +++ b/i18n/uk/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Recommended Configuration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/uk/os/qubes-overview.md b/i18n/uk/os/qubes-overview.md index 590ec180..c5d24dd6 100644 --- a/i18n/uk/os/qubes-overview.md +++ b/i18n/uk/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: pg/qubes-os description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/uk/passwords.md b/i18n/uk/passwords.md index da2b5d77..1514d105 100644 --- a/i18n/uk/passwords.md +++ b/i18n/uk/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/uk/photo-management.md b/i18n/uk/photo-management.md index a041bdcb..1bb46cae 100644 --- a/i18n/uk/photo-management.md +++ b/i18n/uk/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/uk/productivity.md b/i18n/uk/productivity.md index c63e28bb..1612e148 100644 --- a/i18n/uk/productivity.md +++ b/i18n/uk/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/uk/real-time-communication.md b/i18n/uk/real-time-communication.md index bb96b9c2..6a1f7de0 100644 --- a/i18n/uk/real-time-communication.md +++ b/i18n/uk/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/uk/router.md b/i18n/uk/router.md index 65fa281a..1f62fc06 100644 --- a/i18n/uk/router.md +++ b/i18n/uk/router.md @@ -34,7 +34,10 @@ cover: router.webp **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. Він встановлюється на комп'ютер для створення виділеного брандмауера/маршрутизатора для мережі та відомий своєю надійністю і пропонує функції, які часто зустрічаються тільки в дорогих комерційних брандмауерах. -pfSense зазвичай розгортається як брандмауер по периметру, маршрутизатор, бездротова точка доступу, DHCP-сервер, DNS-сервер і кінцева точка VPN. +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/uk/search-engines.md b/i18n/uk/search-engines.md index 7fc05e18..9ffdbb0b 100644 --- a/i18n/uk/search-engines.md +++ b/i18n/uk/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/uk/tools.md b/i18n/uk/tools.md index 8b2293ee..c16b1c86 100644 --- a/i18n/uk/tools.md +++ b/i18n/uk/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Learn more :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/uk/tor.md b/i18n/uk/tor.md index 466df3ac..5c90acd1 100644 --- a/i18n/uk/tor.md +++ b/i18n/uk/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: Мережа **Tor** - це група серверів, керованих волонтерами, яка дозволяє вам підключатися безкоштовно і покращувати вашу конфіденційність і безпеку в Інтернеті. Приватні особи та організації також можуть обмінюватися інформацією через мережу Tor з "прихованими сервісами .onion" без шкоди для своєї конфіденційності. Оскільки трафік Tor важко заблокувати і відстежити, Tor є ефективним інструментом обходу цензури. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor працює, спрямовуючи ваш інтернет-трафік через ці волонтерські сервери, замість того, щоб встановлювати пряме з'єднання з сайтом, який ви намагаєтесь відвідати. Це приховує, звідки надходить трафік, і жоден сервер у шляху з 'єднання не може побачити повний шлях, звідки надходить трафік, а це означає, що навіть сервери, які ви використовуєте для з' єднання, не можуть порушити вашу анонімність. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** — це вибір, якщо вам потрібна анонімність, оскільки він надає доступ до мережі Tor і мостів, а також включає в себе стандартні налаштування і розширення, які автоматично налаштовуються на рівні безпеки за замовчуванням: *Стандартний*, *Безпечніший* і *Найбезпечніший*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ If more complete anonymity is paramount to your situation, you should **only** b -Браузер Tor розроблений таким чином, щоб запобігти зняттю відбитків або ідентифікації вас на основі конфігурації вашого браузера. Тому вкрай важливо, щоб ви **не** модифікували браузер поза межами стандартних [рівнів безпеки](https://tb-manual.torproject.org/security-settings/). +Браузер Tor розроблений таким чином, щоб запобігти зняттю відбитків або ідентифікації вас на основі конфігурації вашого браузера. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** — це безкоштовна Tor VPN для смартфонів, яка спрямовує трафік від будь-якої програми на вашому пристрої через мережу Tor. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ Orbot часто застаріває в [F-Droid репозиторії](https: ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ Orbot часто застаріває в [F-Droid репозиторії](https: Люди, які зазнають цензури, можуть використовувати проксі-сервери Snowflake для підключення до мережі Tor. Snowflake — це чудовий спосіб зробити внесок у мережу, навіть якщо ви не володієте технічними знаннями для запуску Tor-реле або моста. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake жодним чином не збільшує вашу конфіде Запуск проксі-сервера Snowflake пов'язаний з навіть меншим ризиком, ніж запуск Tor-реле або моста, які й самі не є особливо ризикованими заходами. Однак він все одно спрямовує трафік проходить через вашу мережу, що може мати певний вплив, особливо якщо ваша мережа має обмежену пропускну здатність. Переконайтеся, що ви розумієте [як працює Snowflake](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) перед тим, як вирішити, чи запускати проксі. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/uk/vpn.md b/i18n/uk/vpn.md index 096fe20e..214c3af0 100644 --- a/i18n/uk/vpn.md +++ b/i18n/uk/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria diff --git a/i18n/vi/CODE_OF_CONDUCT.md b/i18n/vi/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/vi/CODE_OF_CONDUCT.md +++ b/i18n/vi/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/vi/about/index.md b/i18n/vi/about/index.md index bef355b1..7e25dbe8 100644 --- a/i18n/vi/about/index.md +++ b/i18n/vi/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. We are a non-profit collective operated entirely by volunteer [team members](https://discuss.privacyguides.net/g/team) and contributors. Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/vi/about/notices.md b/i18n/vi/about/notices.md index e348dca1..3dc054bf 100644 --- a/i18n/vi/about/notices.md +++ b/i18n/vi/about/notices.md @@ -29,7 +29,7 @@ Unless otherwise noted, all **content** on this website is made available under Điều này có nghĩa là bạn có thể sử dụng nội dung có thể đọc được của con người trong kho lưu trữ này cho dự án của riêng bạn, theo các điều khoản được nêu trong văn bản CC0 1.0 Universal. Bạn **không được** sử dụng thương hiệu Privacy Guides trong dự án của riêng bạn mà không có sự chấp thuận rõ ràng từ dự án này. Nhãn hiệu thương hiệu của Privacy Guides bao gồm nhãn hiệu chữ "Privacy Guides" và logo shield. Privacy Guides's brand trademarks include the "Privacy Guides" wordmark and shield logo. -Chúng tôi tin rằng các logo và hình ảnh khác trong `tài sản` thu được từ các nhà cung cấp bên thứ ba thuộc phạm vi công cộng hoặc **sử dụng hợp pháp**. Tóm lại, học thuyết sử dụng hợp pháp [](https://en.wikipedia.org/wiki/Fair_use) cho phép sử dụng hình ảnh có bản quyền để xác định chủ đề cho mục đích bình luận công khai. Tuy nhiên, các logo và hình ảnh khác này vẫn có thể tuân theo luật thương hiệu ở một hoặc nhiều khu vực pháp lý. Trước khi sử dụng nội dung này, vui lòng đảm bảo rằng nội dung được sử dụng để xác định thực thể hoặc tổ chức sở hữu thương hiệu và bạn có quyền sử dụng nội dung đó theo luật áp dụng trong trường hợp bạn dự định sử dụng. *Khi sao chép nội dung từ trang web này, bạn hoàn toàn chịu trách nhiệm đảm bảo rằng bạn không vi phạm thương hiệu hoặc bản quyền của người khác.* +Chúng tôi tin rằng các logo và hình ảnh khác trong `tài sản` thu được từ các nhà cung cấp bên thứ ba thuộc phạm vi công cộng hoặc **sử dụng hợp pháp**. In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. Tuy nhiên, các logo và hình ảnh khác này vẫn có thể tuân theo luật thương hiệu ở một hoặc nhiều khu vực pháp lý. Trước khi sử dụng nội dung này, vui lòng đảm bảo rằng nội dung được sử dụng để xác định thực thể hoặc tổ chức sở hữu thương hiệu và bạn có quyền sử dụng nội dung đó theo luật áp dụng trong trường hợp bạn dự định sử dụng. *Khi sao chép nội dung từ trang web này, bạn hoàn toàn chịu trách nhiệm đảm bảo rằng bạn không vi phạm thương hiệu hoặc bản quyền của người khác.* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ Bạn không được tiến hành bất kỳ hoạt động thu thập dữ li --- -*Phần của thông báo này chính nó đã được thông qua từ [mã nguồn mở](https://github.com/github/opensource.guide/blob/master/notices.md) trên GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*Phần của thông báo này chính nó đã được thông qua từ [mã nguồn mở](https://github.com/github/opensource.guide/blob/master/notices.md) trên GitHub. That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/vi/about/privacytools.md b/i18n/vi/about/privacytools.md index 512ebb93..0c889f62 100644 --- a/i18n/vi/about/privacytools.md +++ b/i18n/vi/about/privacytools.md @@ -14,13 +14,13 @@ After the organizational move was completed, the founder of PrivacyTools returne PrivacyTools was created in 2015 by "BurungHantu," who wanted to make a privacy information resource - helpful tools following the Snowden revelations. The site grew into a flourishing open-source project with [many contributors](https://github.com/privacytools/privacytools.io/graphs/contributors), some eventually given various organizational responsibilities, such as operating online services like Matrix and Mastodon, managing and reviewing changes to the site on GitHub, finding sponsors for the project, writing blog posts and operating social media outreach platforms like Twitter, etc. -Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. +Beginning in 2019, BurungHantu grew more and more distant from the active development of the website and communities, and began delaying payments he was responsible for related to the servers we operated. To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). This had the added benefits of making our finances completely transparent, a value we strongly believe in, and tax-deductible in the United States, because they were being held by the Open Collective Foundation 501(c)3. This change was unanimously agreed upon by the team and went uncontested. ## Why We Moved On In 2020, BurungHantu's absence grew much more noticeable. At one point, we required the domain's nameservers to be changed to nameservers controlled by our system administrator to avoid future disruption, and this change was not completed for over a month after the initial request. He would disappear from the public chat and private team chat rooms on Matrix for months at a time, occasionally popping in to give some small feedback or promise to be more active before disappearing once again. -In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah had been operating nearly every PrivacyTools service and acting as the *de facto* project lead for website development in BurungHantu's absence, thus his departure was a significant change to the organization. At the time, because of these significant organizational changes, BurungHantu promised the remaining team he would return to take control of the project going forward. ==The PrivacyTools team reached out via several communication methods over the following months, but did not receive any response.== ## Domain Name Reliance @@ -34,25 +34,25 @@ In mid-2021 the PrivacyTools team reached out to Jonah, who agreed to rejoin the ## Community Call to Action -At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. In the end, "Privacy Guides" was selected, with the `privacyguides.org` domain already owned by Jonah for a side-project from 2020 that went undeveloped. ## Control of r/privacytoolsIO -Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. +Simultaneously with the ongoing website issues at privacytools.io, the r/privacytoolsIO moderation team was facing challenges with managing the subreddit. The subreddit had always been operated mostly independently of the website's development, but BurungHantu was the primary moderator of the subreddit as well, and he was the only moderator granted "Full Control" privileges. u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit requires that subreddits have active moderators. If the primary moderator is inactive for a lengthy period of time (such as a year) the primary moderation position can be re-appointed to the next moderator in line. For this request to have been granted, BurungHantu had to have been completely absent from all Reddit activity for a long period of time, which was consistent with his behaviors on other platforms. > If you were removed as moderator from a subreddit through Reddit request it is because your lack of response and lack of activity qualified the subreddit for an r/redditrequest transfer. > -> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://www.redditinc.com/policies/moderator-code-of-conduct). +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## Beginning the Transition -On September 14th, 2021, we [announced](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) the beginning of our migration to this new domain: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] we found it necessary to make this switch sooner rather than later to ensure people would find out about this transition as soon as possible. This gives us adequate time to transition the domain name, which is currently redirecting to www.privacyguides.org, and it hopefully gives everyone enough time to notice the change, update bookmarks and websites, etc. -This change [entailed:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - Redirecting www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). - Archiving the source code on GitHub to preserve our past work and issue tracker, which we continued to use for months of future development of this site. @@ -63,11 +63,11 @@ Things appeared to be going smoothly, and most of our active community made the ## Following Events -Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. +Roughly a week following the transition, BurungHantu returned online for the first time in nearly a year, however nobody on our team was willing to return to PrivacyTools because of his historic unreliability. Rather than apologize for his prolonged absence, he immediately went on the offensive and positioned the transition to Privacy Guides as an attack against him and his project. He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. At this point, BurungHantu claimed he wanted to continue working on privacytools.io on his own and requested that we remove the redirect from www.privacytools.io to [www.privacyguides.org](https://www.privacyguides.org). We obliged and requested that he keep the subdomains for Matrix, Mastodon, and PeerTube active for us to run as a public service to our community for at least a few months, in order to allow users on those platforms to easily migrate to other accounts. Due to the federated nature of the services we provided, they were tied to specific domain names making it very difficult to migrate (and in some cases impossible). -Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) at the beginning of October, ending any migration possibilities to any users still using those services. +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. Following this, BurungHantu made false accusations about Jonah stealing donations from the project. BurungHantu had over a year since the alleged incident occurred, and yet he never made anyone aware of it until after the Privacy Guides migration. BurungHantu has been repeatedly asked for proof and to comment on the reason for his silence by the team [and the community](https://twitter.com/TommyTran732/status/1526153536962281474), and has not done so. @@ -77,11 +77,11 @@ BurungHantu also made a [twitter post](https://twitter.com/privacytoolsIO/status As of September 25th 2022 we are seeing BurungHantu's overall plans come to fruition on privacytools.io, and this is the very reason we decided to create this explainer page today. The website he is operating appears to be a heavily SEO-optimized version of the site which recommends tools in exchange for financial compensation. Very recently, IVPN and Mullvad, two VPN providers near-universally [recommended](../vpn.md) by the privacy community and notable for their stance against affiliate programs were removed from PrivacyTools. In their place? NordVPN, Surfshark, ExpressVPN, and hide.me; Giant VPN corporations with untrustworthy platforms and business practices, notorious for their aggressive marketing and affiliate programs. -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. Those of us actually fighting for privacy are not fighting against each other, and are not getting our advice from the highest bidder. ## r/privacytoolsIO Now -After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) a restricted sub in a post on November 1st, 2021: +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] The growth of this Sub was the result of great effort, across several years, by the PrivacyGuides.org team. And by every one of you. > @@ -89,7 +89,7 @@ After the launch of [r/PrivacyGuides](https://www.reddit.com/r/privacyguides), i Subreddits do not belong to anybody, and they especially do not belong to brand-holders. They belong to their communities, and the community and its moderators made the decision to support the move to r/PrivacyGuides. -In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) of Reddit rules: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > Retaliation from any moderator with regards to removal requests is disallowed. @@ -107,12 +107,12 @@ Thus, the funds in OpenCollective belong to Privacy Guides, they were given to o This topic has been discussed extensively within our communities in various locations, and it seems likely that most people reading this page will already be familiar with the events leading up to the move to Privacy Guides. Some of our previous posts on the matter may have extra detail we omitted here for brevity. They have been linked below for the sake of completion. -- [June 28, 2021 request for control of r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [June 28, 2021 request for control of r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [July 27, 2021 announcement of our intentions to move on the PrivacyTools blog, written by the team](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [Sept 13, 2021 announcement of the beginning of our transition to Privacy Guides on r/privacytoolsIO](https://reddit.com/pnql46) - [Sept 17, 2021 announcement on OpenCollective from Jonah](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [Sept 30, 2021 Twitter thread detailing most of the events now described on this page](https://twitter.com/privacy_guides/status/1443633412800225280) -- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [Oct 1, 2021 post by u/dng99 noting subdomain failure](https://reddit.com/comments/pymthv/comment/hexwrps) +- [Apr 2, 2022 response by u/dng99 to PrivacyTools' accusatory blog post](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [May 16, 2022 response by @TommyTran732 on Twitter](https://twitter.com/TommyTran732/status/1526153497984618496) - [Sep 3, 2022 post on Techlore's forum by @dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/vi/advanced/communication-network-types.md b/i18n/vi/advanced/communication-network-types.md index 1f07a2c4..f6444ca4 100644 --- a/i18n/vi/advanced/communication-network-types.md +++ b/i18n/vi/advanced/communication-network-types.md @@ -28,7 +28,7 @@ Some self-hosted messengers allow you to set up your own server. Self-hosting ca - Can include [restricted control or access](https://drewdevault.com/2018/08/08/Signal.html). This can include things like: - Being [forbidden from connecting third-party clients](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165) to the centralized network that might provide for greater customization or a better experience. Often defined in Terms and Conditions of usage. - Poor or no documentation for third-party developers. -- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - Self-hosting requires effort and knowledge of how to set up a service. ## Federated Networks @@ -60,7 +60,7 @@ When self-hosted, members of a federated server can discover and communicate wit P2P messengers connect to a [distributed network](https://en.wikipedia.org/wiki/Distributed_networking) of nodes to relay a message to the recipient without a third-party server. -Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://www.scuttlebutt.nz) social network protocol). +Clients (peers) usually find each other through the use of a [distributed computing](https://en.wikipedia.org/wiki/Distributed_computing) network. Examples of this include [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT), used by [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) and [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) for example. Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). Once a peer has found a route to its contact via any of these methods, a direct connection between them is made. Although messages are usually encrypted, an observer can still deduce the location and identity of the sender and recipient. diff --git a/i18n/vi/advanced/dns-overview.md b/i18n/vi/advanced/dns-overview.md index 21889d85..2ffb67b2 100644 --- a/i18n/vi/advanced/dns-overview.md +++ b/i18n/vi/advanced/dns-overview.md @@ -18,7 +18,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s ### Unencrypted DNS -1. Using [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. This command records packets that meet the rules specified: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ Below, we discuss and provide a tutorial to prove what an outside observer may s nslookup privacyguides.org 8.8.8.8 ``` -3. Next, we want to [analyse](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ Encrypted DNS can refer to one of a number of protocols, the most common ones be ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq/) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) is another method for encrypting DNS communication that is defined in [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858). Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT also operates on a dedicated port 853 which can be blocked easily by restrictive firewalls. ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ In this example we will record what happens when we make a DoH request: wireshark -r /tmp/dns_doh.pcap ``` -We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. When looking at the "application data" packets that follow, none of them contain the domain we requested or the IP address returned. ## Why **shouldn't** I use encrypted DNS? @@ -158,9 +158,9 @@ Server Name Indication is typically used when a IP address hosts many websites. tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/), which prevents this kind of leak. +This means even if we are using "Encrypted DNS" servers, the domain will likely be disclosed through SNI. The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -Governments, in particular [China](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) and [Russia](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. Recently, Russia has [started blocking foreign websites](https://github.com/net4people/bbs/issues/108) that use the [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) standard. This is because the [QUIC](https://en.wikipedia.org/wiki/QUIC) protocol that is a part of HTTP/3 requires that `ClientHello` also be encrypted. ### Online Certificate Status Protocol (OCSP) @@ -289,7 +289,7 @@ The DNSSEC signing process is similar to someone signing a legal document with a DNSSEC implements a hierarchical digital signing policy across all layers of DNS. For example, in the case of a `privacyguides.org` lookup, a root DNS server would sign a key for the `.org` nameserver, and the `.org` nameserver would then sign a key for `privacyguides.org`’s authoritative nameserver. -Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0/). +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## What is QNAME minimization? diff --git a/i18n/vi/advanced/payments.md b/i18n/vi/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/vi/advanced/payments.md +++ b/i18n/vi/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/vi/advanced/tor-overview.md b/i18n/vi/advanced/tor-overview.md index 8a6ab1ce..cc7a2fad 100644 --- a/i18n/vi/advanced/tor-overview.md +++ b/i18n/vi/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [How Tor Works - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor Onion Services - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: The first relay in your circuit is called an "entry guard" or "guard". It is a fast and stable relay that remains the first one in your circuit for 2-3 months in order to protect against a known anonymity-breaking attack. The rest of your circuit changes with every new website you visit, and all together these relays provide the full privacy protections of Tor. For more information on how guard relays work, see this [blog post](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) and [paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf) on entry guards. ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: Relay flag: a special (dis-)qualification of relays for circuit positions (for example, "Guard", "Exit", "BadExit"), circuit properties (for example, "Fast", "Stable"), or roles (for example, "Authority", "HSDir"), as assigned by the directory authorities and further defined in the directory protocol specification. ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/vi/android.md b/i18n/vi/android.md index f713e4c9..0bb93624 100644 --- a/i18n/vi/android.md +++ b/i18n/vi/android.md @@ -83,9 +83,9 @@ schema: The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features. -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } These are the Android operating systems, devices, and apps we recommend to maximize your mobile device's security and privacy. khuyến nghị @@ -113,23 +113,27 @@ Các thiết bị cuối đời (chẳng hạn như thiết bị "hỗ trợ m GrapheneOS cung cấp thêm [tăng cường bảo mật](https://en.wikipedia.org/wiki/Hardening_(computing)) và các cải tiến về quyền riêng tư. Nó có [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), quyền mạng và cảm biến cũng như nhiều [tính năng bảo mật](https://grapheneos.org/features). GrapheneOS cũng đi kèm với các bản cập nhật chương trình cơ sở đầy đủ và các bản dựng đã ký, vì vậy khởi động đã xác minh được hỗ trợ đầy đủ. -[Homepage](https://grapheneos.org/){ .md-button .md-button--primary } [Chính Sách Bảo Mật](https://grapheneos.org/faq#privacy-policy){ .md-button } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### CalyxOS
-![CalyxOS logo](assets/img/android/calyxos.svg){ align=right } +![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**CalyxOS** là một hệ thống có một số tính năng bảo mật trên AOSP, bao gồm [Datura](https://calyxos.org/docs/tech/datura-details) tường lửa, [Signal](https://signal.org) tích hợp trong ứng dụng quay số và nút dừng khẩn cấp được tích hợp sẵn. +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. [Homepage](https://calyxos.org/){ .md-button .md-button--primary } [Chính Sách Bảo Mật](https://calyxinstitute.org/legal/privacy-policy){ .md-button } [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -141,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d
-DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

Warning

@@ -164,13 +168,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### DivestOS @@ -192,7 +196,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -218,14 +222,14 @@ Bắt đầu với **Pixel 6** và **6 Pro**, các thiết bị Pixel nhận đ [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning

-Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular/) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). When using Shelter, you are placing complete trust in its developer, as Shelter acts as a [Device Admin](https://developer.android.com/guide/topics/admin/device-admin) to create the Work Profile, and it has extensive access to the data stored within the Work Profile. @@ -322,11 +326,11 @@ The image orientation metadata is not deleted. If you enable location (in Secure
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS App Store -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### Aurora Store @@ -336,7 +340,7 @@ The Google Play Store requires a Google account to login which is not great for Vì CalyxOS bao gồm một bộ điều khiển thiết bị, chúng tôi khuyên bạn nên sử dụng hồ sơ công việc được tích hợp sẵn của chúng để thay thế. -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -373,7 +377,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/). +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools). @@ -391,7 +395,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website. +5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -404,18 +408,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/vi/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/vi/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/vi/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/vi/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/vi/assets/img/how-tor-works/tor-encryption.svg b/i18n/vi/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/vi/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/vi/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/vi/assets/img/how-tor-works/tor-path-dark.svg b/i18n/vi/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/vi/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/vi/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/vi/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/vi/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/vi/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/vi/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/vi/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/vi/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/vi/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/vi/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/vi/assets/img/how-tor-works/tor-path.svg b/i18n/vi/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/vi/assets/img/how-tor-works/tor-path.svg +++ b/i18n/vi/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/vi/basics/account-deletion.md b/i18n/vi/basics/account-deletion.md index cd89ea6f..857a57d8 100644 --- a/i18n/vi/basics/account-deletion.md +++ b/i18n/vi/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: It's easy to accumulate a large number of internet accounts, here are some tips on how to prune your collection. --- -Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://www.deceptive.design/), for the betterment of your online presence. +Over time, it can be easy to accumulate a number of online accounts, many of which you may no longer use. Deleting these unused accounts is an important step in reclaiming your privacy, as dormant accounts are vulnerable to data breaches. A data breach is when a service's security is compromised and protected information is viewed, transmitted, or stolen by unauthorized actors. Data breaches are unfortunately all [too common](https://haveibeenpwned.com/PwnedWebsites) these days, and so practicing good digital hygiene is the best way to minimize the impact they have on your life. The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## Finding Old Accounts ### Password Manager -If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned/). +If you have a password manager that you've used for your entire digital life, this part will be very easy. Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). +Even if you haven't explicitly used a password manager before, there's a chance you've used the one in your browser or your phone without even realizing it. For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). Desktop platforms also often have a password manager which may help you recover passwords you've forgotten about: -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, which can be accessed through [Seahorse](https://wiki.gnome.org/Apps/Seahorse) or [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) ### Email @@ -39,7 +39,7 @@ When attempting to regain access, if the site returns an error message saying th ### GDPR (EEA residents only) -Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://www.gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. If it's applicable to you, read the privacy policy for any given service to find information on how to exercise your right to erasure. Reading the privacy policy can prove important, as some services have a "Delete Account" option that only disables your account and for real deletion you have to take additional action. Sometimes actual deletion may involve filling out surveys, emailing the data protection officer of the service or even proving your residence in the EEA. If you plan to go this way, do **not** overwrite account information—your identity as an EEA resident may be required. Note that the location of the service does not matter; GDPR applies to anyone serving European users. If the service does not respect your right to erasure, you can contact your national [Data Protection Authority](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) and you may be entitled to monetary compensation. ### Overwriting Account information @@ -59,4 +59,4 @@ Even when you are able to delete an account, there is no guarantee that all your ## Avoid New Accounts -As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org/). Avoid the temptation when you're able to—your future self will thank you! +As the old saying goes, "an ounce of prevention is worth a pound of cure." Whenever you feel tempted to sign up for a new account, ask yourself, "Do I really need this? Can I accomplish what I need to without an account?" It can often be much harder to delete an account than to create one. And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). Avoid the temptation when you're able to—your future self will thank you! diff --git a/i18n/vi/basics/common-misconceptions.md b/i18n/vi/basics/common-misconceptions.md index 74650997..5aeaae95 100644 --- a/i18n/vi/basics/common-misconceptions.md +++ b/i18n/vi/basics/common-misconceptions.md @@ -88,7 +88,7 @@ When shopping online, the use of a [parcel locker](https://en.wikipedia.org/wiki 2. **Unknown identity** - An unknown identity could be a stable pseudonym that you regularly use. It is not anonymous because it doesn't change. If you're part of an online community, you may wish to retain a persona that others know. This pseudonym isn't anonymous because—if monitored for long enough—details about the owner can reveal further information, such as the way they write, their general knowledge about topics of interest, etc. -You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://www.getmonero.org/). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. +You may wish to use a VPN for this, to mask your IP address. Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). Employing altcoin shifting may also help to disguise where your currency originated. Typically, exchanges require KYC (know your customer) to be completed before they'll allow you to exchange fiat currency into any kind of cryptocurrency. Local meet-up options may also be a solution; however, those are often more expensive and sometimes also require KYC. 3. **Anonymous identity** - Even with experience, anonymous identities are difficult to maintain over long periods of time. They should be short-term and short-lived identities which are rotated regularly. diff --git a/i18n/vi/basics/common-threats.md b/i18n/vi/basics/common-threats.md index a8102469..67bd483b 100644 --- a/i18n/vi/basics/common-threats.md +++ b/i18n/vi/basics/common-threats.md @@ -55,7 +55,7 @@ By design, **web browsers**, **email clients**, and **office applications** typi -If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). You should also make sure that your drive is encrypted, and that the operating system uses a TPM or Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) or [Element](https://developers.google.com/android/security/android-ready-se) to rate limit attempts to enter the encryption passphrase. You should avoid sharing your computer with people you don't trust, because most desktop operating systems don't encrypt data separately per-user. ## Privacy From Service Providers @@ -89,16 +89,16 @@ Mass surveillance is the intricate effort to monitor the "behavior, many activit

Atlas of Surveillance

-If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org/) by the [Electronic Frontier Foundation](https://www.eff.org/). +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
Governments often justify mass surveillance programs as necessary means to combat terrorism and prevent crime. However, breaching human rights, it's most often used to disproportionately target minority groups and political dissidents, among others.
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

In the face of [Edward Snowden's disclosures of government programs such as [PRISM](https://en.wikipedia.org/wiki/PRISM) and [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)], intelligence officials also admitted that the NSA had for years been secretly collecting records about virtually every American’s phone calls — who’s calling whom, when those calls are made, and how long they last. This kind of information, when amassed by the NSA day after day, can reveal incredibly sensitive details about people’s lives and associations, such as whether they have called a pastor, an abortion provider, an addiction counselor, or a suicide hotline. @@ -144,7 +144,7 @@ If you've already submitted your real information to sites which shouldn't have Censorship online can be carried out (to varying degrees) by actors including totalitarian governments, network administrators, and service providers. These efforts to control communication and restrict access to information will always be incompatible with the human right to Freedom of Expression.[^5] -Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. +Censorship on corporate platforms is increasingly common, as platforms like Twitter and Facebook give in to public demand, market pressures, and pressures from government agencies. Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. People concerned with the threat of censorship can use technologies like [Tor](../advanced/tor-overview.md) to circumvent it, and support censorship-resistant communication platforms like [Matrix](../real-time-communication.md#element), which doesn't have a centralized account authority that can close accounts arbitrarily. @@ -162,5 +162,5 @@ You must always consider the risks of trying to bypass censorship, the potential [^1]: Wikipedia: [*Mass Surveillance*](https://en.wikipedia.org/wiki/Mass_surveillance) and [*Surveillance*](https://en.wikipedia.org/wiki/Surveillance). [^2]: United States Privacy and Civil Liberties Oversight Board: [*Report on the Telephone Records Program Conducted under Section 215*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: Wikipedia: [*Surveillance capitalism*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. You should also employ other mitigation techniques. [^5]: United Nations: [*Universal Declaration of Human Rights*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/vi/basics/email-security.md b/i18n/vi/basics/email-security.md index 6fbfda4f..cdb3c158 100644 --- a/i18n/vi/basics/email-security.md +++ b/i18n/vi/basics/email-security.md @@ -13,7 +13,7 @@ As a result, email is best used for receiving transactional emails (like notific The standard way to add E2EE to emails between different email providers is by using OpenPGP. There are different implementations of the OpenPGP standard, the most common being [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) and [OpenPGP.js](https://openpgpjs.org). -There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). +There is another standard which is popular with business called [S/MIME](https://en.wikipedia.org/wiki/S/MIME), however, it requires a certificate issued from a [Certificate Authority](https://en.wikipedia.org/wiki/Certificate_authority) (not all of them issue S/MIME certificates). It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). Even if you use OpenPGP, it does not support [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy), which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. This is why we recommend [instant messengers](../real-time-communication.md) which implement forward secrecy over email for person-to-person communications whenever possible. @@ -23,7 +23,7 @@ The Web Key Directory (WKD) standard allows email clients to discover the OpenPG In addition to the [email clients we recommend](../email-clients.md) which support WKD, some webmail providers also support WKD. Whether *your own* key is published to WKD for others to use depends on your domain configuration. If you use an [email provider](../email.md#openpgp-compatible-services) which supports WKD, such as Proton Mail or Mailbox.org, they can publish your OpenPGP key on their domain for you. -If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org/). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). +If you use your own custom domain, you will need to configure WKD separately. If you control your domain name, you can set up WKD regardless of your email provider. One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). Alternatively, you can [self-host WKD on your own web server](https://wiki.gnupg.org/WKDHosting). If you use a shared domain from a provider which doesn't support WKD, like @gmail.com, you won't be able to share your OpenPGP key with others via this method. @@ -33,7 +33,7 @@ Email providers which allow you to use standard access protocols like IMAP and S ### How Do I Protect My Private Keys? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. The message is then decrypted by the smartcard and the decrypted content is sent back to the device. It is advantageous for the decryption to occur on the smartcard to avoid possibly exposing your private key to a compromised device. diff --git a/i18n/vi/basics/multi-factor-authentication.md b/i18n/vi/basics/multi-factor-authentication.md index 75cb7e9b..92a563d7 100644 --- a/i18n/vi/basics/multi-factor-authentication.md +++ b/i18n/vi/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP is one of the most common forms of MFA available. When you set up TOTP, you The time-limited code is then derived from the shared secret and the current time. As the code is only valid for a short time, without access to the shared secret, an adversary cannot generate new codes. -If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. Hardware such as the YubiKey was developed with the intention of making the "shared secret" difficult to extract and copy. A YubiKey is also not connected to the Internet, unlike a phone with a TOTP app. Unlike [WebAuthn](#fido-fast-identity-online), TOTP offers no protection against [phishing](https://en.wikipedia.org/wiki/Phishing) or reuse attacks. If an adversary obtains a valid code from you, they may use it as many times as they like until it expires (generally 60 seconds). @@ -122,13 +122,13 @@ Beyond just securing your website logins, multi-factor authentication can be use ### Windows -Yubico has a dedicated [Credential Provider](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS has [native support](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) for authentication with smart cards (PIV). If you have a smartcard or a hardware security key that supports the PIV interface such as the YubiKey, we recommend that you follow your smartcard/hardware security vendor's documentation and set up second factor authentication for your macOS computer. -Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/en-us/articles/360016649059) which can help you set up your YubiKey on macOS. +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. After your smartcard/security key is set up, we recommend running this command in the Terminal: @@ -147,22 +147,22 @@ If the hostname of your system changes (such as due to DHCP), you would be unabl
-The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. +The `pam_u2f` module on Linux can provide two-factor authentication for logging in on most popular Linux distributions. If you have a hardware security key that supports U2F, you can set up MFA authentication for your login. Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. The package manager commands—such as `apt-get`—and package names may however differ. This guide does **not** apply to Qubes OS. ### Qubes OS -Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://www.qubes-os.org/doc/yubikey/) if you want to set up MFA on Qubes OS. +Qubes OS has support for Challenge-Response authentication with YubiKeys. If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### Hardware Security Keys -SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH/) on how to set this up. +SSH MFA could be set up using multiple different authentication methods that are popular with hardware security keys. We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### Time-based One-time Password (TOTP) -SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. +SSH MFA can also be set up using TOTP. DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). Most things should be the same regardless of distribution, however the package manager commands—such as `apt-get`—and package names may differ. ### KeePass (and KeePassXC) -KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. +KeePass and KeePassXC databases can be secured using Challenge-Response or HOTP as a second-factor authentication. Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/vi/basics/passwords-overview.md b/i18n/vi/basics/passwords-overview.md index 63b87498..5a828342 100644 --- a/i18n/vi/basics/passwords-overview.md +++ b/i18n/vi/basics/passwords-overview.md @@ -54,13 +54,13 @@ To generate a diceware passphrase using real dice, follow these steps:

Note

-These instructions assume that you are using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy. +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. Other wordlists may require more or less rolls per word, and may require a different amount of words to achieve the same entropy.
1. Roll a six-sided die five times, noting down the number after each roll. -2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. +2. As an example, let's say you rolled `2-5-2-6-6`. Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. You will find the word `encrypt`. Write that word down. @@ -75,20 +75,20 @@ You should **not** re-roll words until you get a combination of words that appea If you don't have access to or would prefer to not use real dice, you can use your password manager's built-in password generator, as most of them have the option to generate diceware passphrases in addition to regular passwords. -We recommend using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. One metric to determine the strength of a diceware passphrase is how much entropy it has. The entropy per word in a diceware passphrase is calculated as $\text{log}_2(\text{WordsInList})$ and the overall entropy of the passphrase is calculated as $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$. Therefore, each word in the aforementioned list results in ~12.9 bits of entropy ($\text{log}_2(7776)$), and a seven word passphrase derived from it has ~90.47 bits of entropy ($\text{log}_2(7776^7)$). -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. To calculate the amount of possible passphrases, all we have to do is $\text{WordsInList}^\text{WordsInPhrase}$, or in our case, $7776^7$. -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. On average, it takes trying 50% of all the possible combinations to guess your phrase. With that in mind, even if your adversary is capable of ~1,000,000,000,000 guesses per second, it would still take them ~27,255,689 years to guess your passphrase. That is the case even if the following things are true: diff --git a/i18n/vi/basics/vpn-overview.md b/i18n/vi/basics/vpn-overview.md index 77e9a2d9..b406d320 100644 --- a/i18n/vi/basics/vpn-overview.md +++ b/i18n/vi/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn/). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://www.whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. To compensate for this, VPN providers typically will route all non-TCP packets through their VPN server (your first hop). This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## Related VPN Information -- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [Free VPN App Investigation](https://www.top10vpn.com/free-vpn-app-investigation/) -- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [The Trouble with VPN and Privacy Review Sites](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [Free VPN App Investigation](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [Hidden VPN owners unveiled: 101 VPN products run by just 23 companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [This Chinese company is secretly behind 24 popular apps seeking dangerous permissions](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/vi/basics/why-privacy-matters.md b/i18n/vi/basics/why-privacy-matters.md index b89423e0..b48c26e5 100644 --- a/i18n/vi/basics/why-privacy-matters.md +++ b/i18n/vi/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ Privacy is something we need to have baked into the [software and services](../t ## Sources -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [The New Oil: Why Privacy & Security Matter](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/vi/calendar.md b/i18n/vi/calendar.md index 0c6dfe81..94ec474d 100644 --- a/i18n/vi/calendar.md +++ b/i18n/vi/calendar.md @@ -13,7 +13,7 @@ Calendars contain some of your most sensitive data; use products that implement ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). tải xuống @@ -30,18 +30,18 @@ tải xuống [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -67,7 +67,7 @@ tải xuống Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/vi/cloud.md b/i18n/vi/cloud.md index ad33181c..a2a088a4 100644 --- a/i18n/vi/cloud.md +++ b/i18n/vi/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Framadate diff --git a/i18n/vi/cryptocurrency.md b/i18n/vi/cryptocurrency.md index 4e5fda4a..2a13d290 100644 --- a/i18n/vi/cryptocurrency.md +++ b/i18n/vi/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/vi/data-redaction.md b/i18n/vi/data-redaction.md index 4635b295..cd6e9006 100644 --- a/i18n/vi/data-redaction.md +++ b/i18n/vi/data-redaction.md @@ -90,12 +90,12 @@ The app offers multiple ways to erase metadata from images. chú ý **Metapho** is a simple and clean viewer for photo metadata such as date, file name, size, camera model, shutter speed, and location. [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -109,7 +109,7 @@ The app offers multiple ways to erase metadata from images. chú ý **PrivacyBlur** is a free app which can blur sensitive portions of pictures before sharing them online. -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -118,7 +118,7 @@ The app offers multiple ways to erase metadata from images. chú ý Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/vi/desktop-browsers.md b/i18n/vi/desktop-browsers.md index 67ff8ec0..3dab5bc4 100644 --- a/i18n/vi/desktop-browsers.md +++ b/i18n/vi/desktop-browsers.md @@ -70,8 +70,8 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins **Mullvad Browser** is a version of [Tor Browser](tor.md#tor-browser) with Tor network integrations removed, aimed at providing Tor Browser's anti-fingerprinting browser technologies to VPN users. It is developed by the Tor Project and distributed by [Mullvad](vpn.md#mullvad), and does **not** require the use of Mullvad's VPN. [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ If you need to browse the internet anonymously, you should use [Tor](tor.md) ins -Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings/). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. +Like [Tor Browser](tor.md), Mullvad Browser is designed to prevent fingerprinting by making your browser fingerprint identical to all other Mullvad Browser users, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). Other modifications would make your fingerprint unique, defeating the purpose of using this browser. If you want to configure your browser more heavily and fingerprinting is not a concern for you, we recommend [Firefox](#firefox) instead. ### Anti-Fingerprinting @@ -116,17 +116,17 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search- **Firefox** provides strong privacy settings such as [Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop), which can help block various [types of tracking](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks). [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser comes with DuckDuckGo set as the default [search engine](search-

Warning

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ This protects you by blocking social media trackers, fingerprinting scripts (not ##### Firefox Suggest (US only) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. We recommend disabling it for the same reason we recommend disabling search suggestions. If you don't see these options under the **Address Bar** header, you do not have the new experience and can ignore these changes. - [ ] Uncheck **Suggestions from the web** - [ ] Uncheck **Suggestions from sponsors** @@ -183,7 +183,7 @@ This protects you from persistent cookies, but does not protect you against cook > Firefox sends data about your Firefox version and language; device operating system and hardware configuration; memory, basic information about crashes and errors; outcome of automated processes like updates, safebrowsing, and activation to us. When Firefox sends data to us, your IP address is temporarily collected as part of our server logs. -Additionally, the Firefox Accounts service collects [some technical data](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). If you use a Firefox Account you can opt-out: 1. Open your [profile settings on accounts.firefox.com](https://accounts.firefox.com/settings#data-collection) 2. Uncheck **Data Collection and Use** > **Help improve Firefox Accounts** @@ -204,7 +204,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s #### Sync -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (advanced) @@ -215,7 +215,7 @@ Max Protection enforces the use of DNS over HTTPS, and a security warning will s -The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) support. +The [Arkenfox project](https://github.com/arkenfox/user.js) provides a set of carefully considered options for Firefox. If you [decide](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) to use Arkenfox, a [few options](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) are subjectively strict and/or may cause some websites to not work properly - [which you can easily change](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) to suit your needs. We **strongly recommend** reading through their full [wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox only aims to thwart basic or naive tracking scripts through canvas randomization and Firefox's built-in fingerprint resistance configuration settings. It does not aim to make your browser blend in with a large crowd of other Arkenfox users in the same way Mullvad Browser or Tor Browser do, which is the only way to thwart advanced fingerprint tracking scripts. Remember you can always use multiple browsers, for example, you could consider using Firefox+Arkenfox for a few sites that you want to stay logged in on or otherwise trust, and Mullvad Browser for general browsing. @@ -225,23 +225,23 @@ Arkenfox only aims to thwart basic or naive tracking scripts through canvas rand ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ These options can be found in :material-menu: → **Settings**. ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields' options can be downgraded on a per-site basis as needed, but by default we recommend setting the following: @@ -290,14 +290,14 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. ##### Privacy and security
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) use the [Tor Browser](tor.md#tor-browser). +1. Brave is **not** as resistant to fingerprinting as the Tor Browser and far fewer people use Brave with Tor, so you will stand out. Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -343,7 +343,7 @@ Brave's Web3 features can potentially add to your browser fingerprint and attack #### Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### Brave Rewards and Wallet @@ -371,7 +371,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -408,7 +408,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -447,14 +447,14 @@ uBlock Origin Lite only receives block list updates whenever the extension is up - Available on Linux, macOS, and Windows. - Any changes required to make the browser more privacy-respecting should not negatively impact user experience. - Blocks third-party cookies by default. -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### Best-Case Our best-case criteria represents what we would like to see from the perfect project in this category. Our recommendations may not include any or all of this functionality, but those which do may rank higher than others on this page. - Includes built-in content blocking functionality. -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - Does not include add-on functionality (bloatware) that does not impact user privacy. - Does not collect telemetry by default. @@ -467,4 +467,4 @@ Our best-case criteria represents what we would like to see from the perfect pro - Must directly impact user privacy, i.e. must not simply provide information. [^1]: uBlock Origin Lite *itself* will consume no resources, because it uses newer APIs which make the browser process the filter lists natively, instead of running JavaScript code within the extension to handle the filtering. However, this resource advantage is only [theoretical](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo), because it's possible that standard uBlock Origin's filtering code is more efficient than your browser's native filtering code. This has not yet been benchmarked. -[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/vi/desktop.md b/i18n/vi/desktop.md index 8371111a..b0d8f058 100644 --- a/i18n/vi/desktop.md +++ b/i18n/vi/desktop.md @@ -17,17 +17,17 @@ Linux distributions are commonly recommended for privacy protection and software ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). These new technologies often come with improvements in security, privacy, and usability in general. -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://www.gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. +Fedora has a semi-rolling release cycle. While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. Each Fedora release is supported for one year, with a new version released every 6 months. ### openSUSE Tumbleweed @@ -37,9 +37,11 @@ Fedora has a semi-rolling release cycle. While some packages like [GNOME](https: **openSUSE Tumbleweed** is a stable rolling release distribution. -openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -55,7 +57,9 @@ Tumbleweed follows a rolling release model where each update is released as a sn **Arch Linux** is a lightweight, do-it-yourself (DIY) distribution meaning that you only get what you install. For more information see their [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions). -[Homepage](https://archlinux.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -79,22 +83,22 @@ A large portion of [Arch Linux’s packages](https://reproducible.archlinux.org) **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -104,7 +108,9 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS is an independent distribution based on the Nix package manager with a focus on reproducibility and reliability. -[Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -130,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. It aims to provide privacy, security, and anonymity on the internet. Whonix is best used in conjunction with [Qubes OS](#qubes-os). -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -141,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -153,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails** is a live operating system based on Debian that routes all communications through Tor, which can boot on on almost any computer from a DVD, USB stick, or SD card installation. It uses [Tor](tor.md) to preserve privacy and anonymity while circumventing censorship, and it leaves no trace of itself on the computer it is used on after it is powered off. -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -172,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## Security-focused Distributions @@ -184,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -209,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. It covers a lot of privacy and hardening recommendations by default. It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/vi/device-integrity.md b/i18n/vi/device-integrity.md index 35377b87..75b6f7ac 100644 --- a/i18n/vi/device-integrity.md +++ b/i18n/vi/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/vi/dns.md b/i18n/vi/dns.md index ab7dd3d1..6c28467b 100644 --- a/i18n/vi/dns.md +++ b/i18n/vi/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## Recommended Providers -| DNS Provider | Chính Sách Bảo Mật | Protocols | Logging | ECS | Filtering | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | +| DNS Provider | Chính Sách Bảo Mật | Protocols | Logging | ECS | Filtering | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------ | -------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | Some[^1] | Yes | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | Some[^2] | No | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^3] | No | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | No[^4] | No | Based on personal configuration. Filter list being used can be found here. [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | Optional[^5] | Optional | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | Some[^6] | Optional | Based on personal configuration, Malware blocking by default. | ### Framadate @@ -55,7 +55,7 @@ After installation of either a configuration profile or an app that uses the DNS #### Signed Profiles -Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/). +Apple does not provide a native interface for creating encrypted DNS profiles. [Secure DNS profile creator](https://dns.notjakob.com/tool.html) is an unofficial tool for creating your own encrypted DNS profiles, however they will not be signed. Signed profiles are preferred; signing validates a profile's origin and helps to ensure the integrity of the profiles. A green "Verified" label is given to signed configuration profiles. For more information on code signing, see [About Code Signing](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html). **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

Info

@@ -79,7 +79,7 @@ Encrypted DNS proxy software provides a local proxy for the [unencrypted DNS](ad [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -130,7 +130,7 @@ A self-hosted DNS solution is useful for providing filtering on controlled platf ![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home features a polished web interface to view insights and manage blocked content. @@ -149,13 +149,13 @@ AdGuard Home features a polished web interface to view insights and manage block ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** is an open-source [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) to block unwanted web content, such as advertisements. +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to such hardware. The software features a friendly web interface to view insights and manage blocked content. -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -164,8 +164,8 @@ Pi-hole is designed to be hosted on a Raspberry Pi, but it is not limited to suc
[^1]: AdGuard stores aggregated performance metrics of their DNS servers, namely the number of complete requests to a particular server, the number of blocked requests, and the speed of processing requests. They also keep and store the database of domains requested in within last 24 hours. "We need this information to identify and block new trackers and threats." "We also log how many times this or that tracker has been blocked. We need this information to remove outdated rules from our filters." [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare collects and stores only the limited DNS query data that is sent to the 1.1.1.1 resolver. The 1.1.1.1 resolver service does not log personal data, and the bulk of the limited non-personally identifiable query data is stored only for 25 hours. [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D only logs for Premium resolvers with custom DNS profiles. Free resolvers do not log data. [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad's DNS service is available to both subscribers and non-subscribers of Mullvad VPN. Their privacy policy explicitly claims they do not log DNS requests in any way. [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. You can choose retention times and log storage locations for any logs you choose to keep. If it's not specifically requested, no data is logged. [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9 collects some data for the purposes of threat monitoring and response. That data may then be remixed and shared, such as for the purpose of security research. Quad9 does not collect or record IP addresses or other data they deem personally identifiable. [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/vi/email-clients.md b/i18n/vi/email-clients.md index d4b8a1ee..53f2ad7c 100644 --- a/i18n/vi/email-clients.md +++ b/i18n/vi/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ These options can be found in :material-menu: → **Settings** → **Privacy & S **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,15 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. [Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } [Chính Sách Bảo Mật](https://www.mailvelope.com/en/privacy-policy){ .md-button } - -??? +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -179,7 +177,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -212,9 +210,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -234,8 +232,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -261,9 +259,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/vi/email.md b/i18n/vi/email.md index 539de938..129d5ad9 100644 --- a/i18n/vi/email.md +++ b/i18n/vi/email.md @@ -55,7 +55,7 @@ OpenPGP also does not support Forward secrecy, which means if either your or the Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail has internal crash reports that they **do not** share with third par #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. +Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -129,7 +129,7 @@ Proton Mail doesn't offer a digital legacy feature. #### :material-check:{ .pg-green } Custom Domains and Aliases -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -137,17 +137,17 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro #### :material-check:{ .pg-green } Account Security -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security -Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } Email Encryption -Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Your account will be set to a restricted user account when your contract ends, a #### :material-information-outline:{ .pg-blue } Additional Functionality -You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. -All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Framadate @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **Minimum to Qualify:** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/vi/encryption.md b/i18n/vi/encryption.md index 0948273d..b35a8ce0 100644 --- a/i18n/vi/encryption.md +++ b/i18n/vi/encryption.md @@ -22,15 +22,15 @@ The options listed here are multi-platform and great for creating encrypted back [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator uses AES-256 encryption to encrypt both files and filenames. Cryptom Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -92,15 +92,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -122,15 +122,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -147,7 +147,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -196,7 +196,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -242,20 +242,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -269,9 +269,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } - -??? +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -281,12 +282,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -300,7 +301,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -379,11 +380,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/vi/file-sharing.md b/i18n/vi/file-sharing.md index 4977cead..1a05141c 100644 --- a/i18n/vi/file-sharing.md +++ b/i18n/vi/file-sharing.md @@ -15,9 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. [Homepage](https://onionshare.org){ .md-button .md-button--primary } [:pg-tor:](http://lldan5gahapx5k7iafb3s4ikijc4ni7gx5iywdflkba5y2ezyg6sjgyd.onion){ .md-button } - -??? You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -90,7 +88,7 @@ ffsend upload --host https://send.vis.ee/ FILE [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -108,9 +106,9 @@ ffsend upload --host https://send.vis.ee/ FILE [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -146,16 +144,16 @@ ffsend upload --host https://send.vis.ee/ FILE [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/vi/financial-services.md b/i18n/vi/financial-services.md index 09bb0ca2..91b06aba 100644 --- a/i18n/vi/financial-services.md +++ b/i18n/vi/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -88,9 +88,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/vi/frontends.md b/i18n/vi/frontends.md index 5f07e4fd..2913953d 100644 --- a/i18n/vi/frontends.md +++ b/i18n/vi/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

Warning

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

Warning

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

Warning

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/vi/index.md b/i18n/vi/index.md index 98e689b9..46089e0c 100644 --- a/i18n/vi/index.md +++ b/i18n/vi/index.md @@ -62,7 +62,7 @@ Trying to protect all your data from everyone all the time is impractical, expen ## We need you! Here's how to get involved: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } [:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } [:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } [:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } diff --git a/i18n/vi/kb-archive.md b/i18n/vi/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/vi/kb-archive.md +++ b/i18n/vi/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/vi/meta/admonitions.md b/i18n/vi/meta/admonitions.md index 54741c4e..d47127e0 100644 --- a/i18n/vi/meta/admonitions.md +++ b/i18n/vi/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/vi/meta/translations.md b/i18n/vi/meta/translations.md index ce4e1da3..fc77bab4 100644 --- a/i18n/vi/meta/translations.md +++ b/i18n/vi/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/vi/meta/uploading-images.md b/i18n/vi/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/vi/meta/uploading-images.md +++ b/i18n/vi/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/vi/meta/writing-style.md b/i18n/vi/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/vi/meta/writing-style.md +++ b/i18n/vi/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/vi/mobile-browsers.md b/i18n/vi/mobile-browsers.md index 001a79e7..14c2e897 100644 --- a/i18n/vi/mobile-browsers.md +++ b/i18n/vi/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ These are our currently recommended mobile web browsers and configurations for s ## Android -On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview/), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ On Android, Firefox is still less secure than Chromium-based alternatives: Mozil ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features/), many of which are enabled by default. +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave is built upon the Chromium web browser project, so it should feel familiar and have minimal website compatibility issues. -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ These options can be found in :material-menu: → **Settings** → **Brave Shiel ##### Shields -Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) feature. We suggest configuring these options [globally](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) across all pages that you visit. +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave -1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave Sync -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/vi/multi-factor-authentication.md b/i18n/vi/multi-factor-authentication.md index b74bf1db..e977bd2a 100644 --- a/i18n/vi/multi-factor-authentication.md +++ b/i18n/vi/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -132,7 +132,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -152,7 +152,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/vi/news-aggregators.md b/i18n/vi/news-aggregators.md index d08e75b6..478e8ac1 100644 --- a/i18n/vi/news-aggregators.md +++ b/i18n/vi/news-aggregators.md @@ -23,7 +23,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -85,7 +85,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -123,15 +123,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -185,7 +185,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -200,7 +200,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/vi/notebooks.md b/i18n/vi/notebooks.md index e47f5610..4cc97773 100644 --- a/i18n/vi/notebooks.md +++ b/i18n/vi/notebooks.md @@ -34,7 +34,7 @@ Standard Notes là một ứng dụng ghi chú đơn giản và riêng tư giúp - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ Standard Notes là một ứng dụng ghi chú đơn giản và riêng tư giúp ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ Standard Notes là một ứng dụng ghi chú đơn giản và riêng tư giúp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** là một ứng dụng ghi chú và việc cần làm miễn phí, mã nguồn mở và đầy đủ tính năng có thể xử lý một số lượng lớn các ghi chú đánh dấu được sắp xếp thành sổ ghi chép và thẻ. Nó cung cấp E2EE và có thể đồng bộ hóa thông qua Nextcloud, Dropbox, v.v. Nó cũng cung cấp khả năng nhập dễ dàng từ Evernote và ghi chú văn bản thuần túy. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -136,7 +136,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/vi/os/android-overview.md b/i18n/vi/os/android-overview.md index 1ffa3cdc..f866b6cb 100644 --- a/i18n/vi/os/android-overview.md +++ b/i18n/vi/os/android-overview.md @@ -60,7 +60,7 @@ Many OEMs also have broken implementation of Verified Boot that you have to be a Firmware updates are critical for maintaining security and without them your device cannot be secure. OEMs have support agreements with their partners to provide the closed-source components for a limited support period. These are detailed in the monthly [Android Security Bulletins](https://source.android.com/security/bulletin). -As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +As the components of the phone, such as the processor and radio technologies rely on closed-source components, the updates must be provided by the respective manufacturers. Therefore, it is important that you purchase a device within an active support cycle. [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. EOL devices which are no longer supported by the SoC manufacturer cannot receive firmware updates from OEM vendors or after market Android distributors. This means that security issues with those devices will remain unfixed. @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

Warning

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ If you are using a device with Google services, either your stock operating syst ### Advanced Protection Program -If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection/). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). It is available at no cost to anyone with two or more hardware security keys with [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) support. The Advanced Protection Program provides enhanced threat monitoring and enables: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - Only Google and verified third-party apps can access account data - Scanning of incoming emails on Gmail accounts for [phishing](https://en.wikipedia.org/wiki/Phishing#Email_phishing) attempts -- Stricter [safe browser scanning](https://www.google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - Stricter recovery process for accounts with lost credentials - If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949?hl=en) such as: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - Warning you about unverified applications ### Google Play System Updates @@ -169,7 +169,7 @@ If you have an EOL device shipped with Android 10 or above and are unable to run ### Advertising ID -All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) used for targeted advertising. Disable this feature to limit the data collected about you. +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. Disable this feature to limit the data collected about you. On Android distributions with [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), go to :gear: **Settings** → **Apps** → **Sandboxed Google Play** → **Google Settings** → **Ads**, and select *Delete advertising ID*. diff --git a/i18n/vi/os/ios-overview.md b/i18n/vi/os/ios-overview.md index 949d360e..d2744bad 100644 --- a/i18n/vi/os/ios-overview.md +++ b/i18n/vi/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/vi/os/linux-overview.md b/i18n/vi/os/linux-overview.md index da9fa962..56db7195 100644 --- a/i18n/vi/os/linux-overview.md +++ b/i18n/vi/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - Avoid telemetry that often comes with proprietary operating systems -- Maintain [software freedom](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## Choosing your distribution @@ -42,9 +42,9 @@ Not all Linux distributions are created equal. Our [Linux recommendation page](. We highly recommend that you choose distributions which stay close to the stable upstream software releases, often referred to as rolling release distributions. This is because frozen release cycle distributions often don’t update package versions and fall behind on security updates. -For frozen distributions such as [Debian](https://www.debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. As a result minor security fixes are sometimes held back until the next major release. -We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme/) has a presentation about this: +We don’t believe holding packages back and applying interim patches is a good idea, as it diverges from the way the developer might have intended the software to work. [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re For a secure system, you are also expected to have sufficient Linux knowledge to properly set up security for their system such as adopting a [mandatory access control](https://en.wikipedia.org/wiki/Mandatory_access_control) system, setting up [kernel module](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) blacklists, hardening boot parameters, manipulating [sysctl](https://en.wikipedia.org/wiki/Sysctl) parameters, and knowing what components they need such as [Polkit](https://en.wikipedia.org/wiki/Polkit). -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/). +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. Similar warnings apply to use third-party Personal Package Archives (PPAs) on Debian based distributions or Community Projects (COPR) on Fedora. @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: This distribution holds packages back for 2 weeks to make sure that their own changes don’t break, not to make sure that upstream is stable. When AUR packages are used, they are often built against the latest [libraries](https://en.wikipedia.org/wiki/Library_(computing)) from Arch’s repositories. -- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx/) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. There is no verification process to make sure that the AUR packages don’t suffer from supply chain attacks. ### Linux-libre kernel and “Libre” distributions -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## General Recommendations @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit Most Linux distributions have an option within its installer for enabling [LUKS](../encryption.md#linux-unified-key-setup) FDE. If this option isn’t set at installation time, you will have to backup your data and re-install, as encryption is applied after [disk partitioning](https://en.wikipedia.org/wiki/Disk_partitioning), but before [file systems](https://en.wikipedia.org/wiki/File_system) are formatted. We also suggest securely erasing your storage device: -- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [Secure Data Erasure :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). If you’re using one of those environments it is as easy as selecting the “Wayland” session at the desktop display manager ([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)). We recommend **against** using desktop environments or window managers that do not have Wayland support, such as Cinnamon (default on Linux Mint), Pantheon (default on Elementary OS), MATE, Xfce, and i3. ### Proprietary Firmware (Microcode Updates) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora and openSUSE both have the microcode updates applied by default. @@ -131,11 +131,11 @@ Additionally, some distributions will not download firmware updates automaticall Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm/) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. This provides a bit more privacy on Wi-Fi networks as it makes it harder to track specific devices on the network you’re connected to. It does [**not**](https://papers.mathyvanhoef.com/wisec2016.pdf) make you anonymous. -We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm/). +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). Randomizing Wi-Fi MAC addresses depends on support from the Wi-Fi’s firmware. @@ -151,6 +151,6 @@ There are other system identifiers which you may wish to be careful about. You s The Fedora Project [counts](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) how many unique systems access its mirrors by using a [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) variable instead of a unique ID. Fedora does this to determine load and provision better servers for updates where necessary. -This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) timer. +This [option](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) is currently off by default. We recommend adding `countme=false` to `/etc/dnf/dnf.conf` just in case it is enabled in the future. On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE also uses a [unique ID](https://en.opensuse.org/openSUSE:Statistics) to count systems, which can be disabled by deleting the `/var/lib/zypp/AnonymousUniqueId` file. diff --git a/i18n/vi/os/macos-overview.md b/i18n/vi/os/macos-overview.md index 584d1acc..aa5541ea 100644 --- a/i18n/vi/os/macos-overview.md +++ b/i18n/vi/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## Recommended Configuration Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/vi/os/qubes-overview.md b/i18n/vi/os/qubes-overview.md index 590ec180..c5d24dd6 100644 --- a/i18n/vi/os/qubes-overview.md +++ b/i18n/vi/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: pg/qubes-os description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## How does Qubes OS work? -Qubes uses [compartmentalization](https://www.qubes-os.org/intro/) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes are created from templates, the defaults being for Fedora, Debian and [Whonix](../desktop.md#whonix). Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes architecture](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. You could, for example, use a specific color for your banking browser, while using a different color for a general untrusted browser. ![Colored border](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes window borders, Credit: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### Copying and Pasting Text -You can [copy and paste text](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) using `qvm-copy-to-vm` or the below instructions: +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,13 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. When doing so the changes aren't immediately made and can be easily undone in case of an accident. When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### Inter-VM Interactions -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://www.qubes-os.org/news/2020/06/22/new-qrexec-policy-system/). +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -73,9 +73,9 @@ Your qubes should be configured in a manner similar to this: ## Additional Resources -For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://www.qubes-os.org/doc/). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). Offline copies can be downloaded from the Qubes OS [documentation repository](https://github.com/QubesOS/qubes-doc). -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/vi/passwords.md b/i18n/vi/passwords.md index e5778681..cff8f6bf 100644 --- a/i18n/vi/passwords.md +++ b/i18n/vi/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: Password Manager operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: Password Manager operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: Password Manager operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: Password Manager operatingSystem: - Windows @@ -137,7 +137,7 @@ tải xuống - [:pg-flathub: Flatpak](https://flathub.org/apps/details/org.keepassxc.KeePassXC) - [:fontawesome-brands-firefox: Firefox](https://addons.mozilla.org/firefox/addon/keepassxc-browser) - [:fontawesome-brands-chrome: Chrome](https://chrome.google.com/webstore/detail/keepassxc-browser/oboonakemofpalcgghocfoadofidjkkk) - - [:fontawesome-brands-github: Mã nguồn](https://github.com/keepassxreboot/keepassxc) Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. + - [:fontawesome-brands-github: Mã nguồn](https://github.com/keepassxreboot/keepassxc) Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -155,14 +155,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -175,7 +175,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -193,20 +193,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -235,7 +235,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -291,9 +291,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -319,10 +319,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -340,24 +340,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -371,7 +371,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -379,10 +379,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/vi/photo-management.md b/i18n/vi/photo-management.md index b89ff77e..91a001cd 100644 --- a/i18n/vi/photo-management.md +++ b/i18n/vi/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/vi/productivity.md b/i18n/vi/productivity.md index 18f070d8..c9624825 100644 --- a/i18n/vi/productivity.md +++ b/i18n/vi/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -57,8 +57,8 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac **Framadate** là một dịch vụ trực tuyến mã nguồn mở miễn phí để lên kế hoạch cho một cuộc hẹn hoặc đưa ra quyết định một cách nhanh chóng và dễ dàng. Không cần đăng ký. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -108,20 +108,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -136,7 +136,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -146,9 +146,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -190,7 +190,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/vi/real-time-communication.md b/i18n/vi/real-time-communication.md index 0d143eec..54b70993 100644 --- a/i18n/vi/real-time-communication.md +++ b/i18n/vi/real-time-communication.md @@ -22,18 +22,18 @@ These messengers are great for securing your sensitive communications. **Signal** is a mobile app developed by Signal Messenger LLC. The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender/) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. Personal profiles are also encrypted and only shared with contacts you chat with. Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. The sender address is encrypted along with the message body, and only the recipient address is visible to the server. Sealed Sender is only enabled for people in your contacts list, but can be enabled for all recipients with the increased risk of receiving spam. -The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs/). +The protocol was independently [audited](https://eprint.iacr.org/2016/1013.pdf) in 2016. The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). We have some additional tips on configuring and hardening your Signal installation: -[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal Configuration and Hardening :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ We have some additional tips on configuring and hardening your Signal installati Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/vi/router.md b/i18n/vi/router.md index 4ca9d3e5..da674309 100644 --- a/i18n/vi/router.md +++ b/i18n/vi/router.md @@ -34,7 +34,10 @@ Bạn có thể tham khảo OpenWrt's [table of hardware](https://openwrt.org/to **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. Nó được cài đặt trên máy tính để làm tường lửa/bộ định tuyến chuyên dụng cho mạng và được chú ý về độ tin cậy và cung cấp các tính năng thường chỉ có trong các tường lửa thương mại đắt tiền. -pfSense thường được triển khai dưới dạng tường lửa vành đai, bộ định tuyến, điểm truy cập không dây, máy chủ DHCP, máy chủ DNS và điểm cuối VPN. +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/vi/search-engines.md b/i18n/vi/search-engines.md index 607564c4..56b80b5a 100644 --- a/i18n/vi/search-engines.md +++ b/i18n/vi/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). [Website](https://www.startpage.com){ .md-button .md-button--primary } [Chính Sách Bảo Mật](https://www.startpage.com/en/privacy-policy){ .md-button } +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -66,7 +66,9 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). -[Website](https://www.mojeek.com){ .md-button .md-button--primary } [Chính Sách Bảo Mật](https://www.mojeek.com/about/privacy){ .md-button } +[:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} +[:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -85,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -102,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Framadate diff --git a/i18n/vi/tools.md b/i18n/vi/tools.md index 0287bf94..bcb0ee29 100644 --- a/i18n/vi/tools.md +++ b/i18n/vi/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin If you're looking for a specific solution to something, these are the hardware and software tools we recommend in a variety of categories. Our recommended privacy tools are primarily chosen based on security features, with additional emphasis on decentralized and open-source tools. They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! For more details about each project, why they were chosen, and additional tips or tricks we recommend, click the "Learn more" link in each section, or click on the recommendation itself to be taken to that specific section of the page. @@ -89,7 +89,7 @@ For more details about each project, why they were chosen, and additional tips o #### DNS Providers -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [Learn more :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/vi/tor.md b/i18n/vi/tor.md index bcb99a12..5af0adc3 100644 --- a/i18n/vi/tor.md +++ b/i18n/vi/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: The **Tor** network is a group of volunteer-operated servers that allows you to connect for free and improve your privacy and security on the Internet. Individuals and organizations can also share information over the Tor network with ".onion hidden services" without compromising their privacy. Because Tor traffic is difficult to block and trace, Tor is an effective censorship circumvention tool. -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor works by routing your internet traffic through those volunteer-operated servers, instead of making a direct connection to the site you're trying to visit. This obfuscates where the traffic is coming from, and no server in the connection path is able to see the full path of where the traffic is coming from and going to, meaning even the servers you are using to connect cannot break your anonymity. @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b **Tor Browser** is the choice if you need anonymity, as it provides you with access to the Tor network and bridges, and it includes default settings and extensions that are automatically configured by the default security levels: *Standard*, *Safer* and *Safest*. -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -92,7 +92,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a -The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). +The Tor Browser is designed to prevent fingerprinting, or identifying you based on your browser configuration. Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -104,7 +104,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -114,7 +114,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -140,7 +140,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -170,10 +170,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -187,4 +187,4 @@ Snowflake does not increase your privacy in any way, nor is it used to connect t Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/vi/vpn.md b/i18n/vi/vpn.md index 00126e05..8c3e0849 100644 --- a/i18n/vi/vpn.md +++ b/i18n/vi/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. If you're looking for added **security**, you should always ensure you're connecting to websites using HTTPS. A VPN is not a replacement for good security practices. -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ Our recommended providers use encryption, accept Monero, support WireGuard & Ope **Proton VPN** is a strong contender in the VPN space, and they have been in operation since 2016. Proton AG is based in Switzerland and offers a limited free tier, as well as a more featured premium option. -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +As of January 2020, Proton VPN has undergone an independent audit by SEC Consult. SEC Consult found some medium and low risk vulnerabilities in Proton VPN's Windows, Android, and iOS applications, all of which were "properly fixed" by Proton VPN before the reports were published. None of the issues identified would have provided an attacker remote access to your device or traffic. You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Proton VPN mostly supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN** is another premium VPN provider, and they have been in operation since 2009. IVPN is based in Gibraltar. -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. This is because of a shorter route (fewer hops) to the destination. { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). Additionally, WireGuard aims to be simpler and more performant. +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). Additionally, WireGuard aims to be simpler and more performant. -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Framadate diff --git a/i18n/zh-Hant/CODE_OF_CONDUCT.md b/i18n/zh-Hant/CODE_OF_CONDUCT.md index 2a00096e..451e470b 100644 --- a/i18n/zh-Hant/CODE_OF_CONDUCT.md +++ b/i18n/zh-Hant/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **舉止要積極正向** diff --git a/i18n/zh-Hant/about/index.md b/i18n/zh-Hant/about/index.md index 26d202b2..4aa0eee4 100644 --- a/i18n/zh-Hant/about/index.md +++ b/i18n/zh-Hant/about/index.md @@ -21,19 +21,19 @@ schema: 隱私權指南是一個社會導向的網站,提供資訊以保護您的資料安全和隱私。 我們的使命是告知公眾數位隱私的價值,以及全球政府監控線上活動的行徑。 我們是非營利合作,完全由志願者 [團隊成員](https://discuss.privacyguides.net/g/team) 和貢獻者經營。 我們的網站沒有廣告,與任何列出的供應商也沒有商務往來。 -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > 要查找[以隱私為中心的替代] 應用程式,請查看 Good Reports 和 **Privacy Guides**等網站,這些網站列出了各種類型的以隱私為中心的應用程式,特別包括非大型科技公司運營的電子郵件提供商(通常是付費計劃)。 -— [紐約時報](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > 如果您只需一家新 VPN ,可以去任何播客找到折扣代碼。 如果您要找的是 **優質** VPN ,則需要專業幫助。 電子郵件客戶端、瀏覽器、作業系統和密碼管理器也是如此。 您如何知道哪些是最佳、最適合隱私的選擇? 為此,有 **Privacy Guides**,平臺裏許多志願者每天都在尋找網際網路隱私友好的最佳工具。 — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [翻譯自荷蘭語] -同樣出現在: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)] , [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt)和 [Wired](https://www.wired.com/story/firefox-mozilla-2022/)。 +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## 歷史 @@ -41,7 +41,7 @@ Privacy Guides 於2021年9月推出,是 [已解散的](privacytools.md) "Priva 2022年,我們使用 `mkdocs-material` 文件軟體,完成了主要網站框架從 Jekyll 到 MkDocs 的過渡。 此一變化使網站的開源貢獻對外部人更為容易,不需要知道複雜的語法就可有效地撰寫文章,貢獻現在就像撰寫標準 Markdown文件一樣簡單。 -我們還推出新的討論論壇[discuss.privacyguides.net](https://discuss.privacyguides.net/) ,作為一個社區平臺分享想法並詢問有關我們使命的問題。 這擴大了我們 Matrix 現有社羣,並取代了以前的 GitHub 討論平臺,減少對商業討論平臺的依賴。 +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. 這擴大了我們 Matrix 現有社羣,並取代了以前的 GitHub 討論平臺,減少對商業討論平臺的依賴。 到2023年目前為止,我們已經推出了網站的國際翻譯 [法語](/fr/), [希伯來語](/he/)和 [荷蘭語](/nl/),更多的語言正在進行中,由優秀的翻譯團隊在 [Crowdin](https://crowdin.com/project/privacyguides)上進行。 我們計劃繼續推進外展和教育使命,並尋找方法更清楚地突出現代數位時代缺乏隱私意識的危險,以及整個技術行業安全漏洞的漫延和危害。 diff --git a/i18n/zh-Hant/about/notices.md b/i18n/zh-Hant/about/notices.md index 98962467..5abf5ca5 100644 --- a/i18n/zh-Hant/about/notices.md +++ b/i18n/zh-Hant/about/notices.md @@ -29,7 +29,7 @@ Privacy Guides 是一個開放原始碼專案,貢獻有授權保護,包括 這意味著您可以根據 Creative Commons Attribution-NoDerivatives 4.0 國際公共許可證文本中概述的條款,將此存儲庫中的人類可讀內容用於自己的項目。 您可以依合理的方式這樣做,但不能以任何方式暗示 Privacy Guides 認可您或您的使用。 未經本專案明確同意,**不得**在任何專案中使用 Privacy Guides 品牌。 Privacy Guides 品牌商標包括 "Privacy Guides" 文字商標和盾牌標誌。 -我們認為,從第三方供應商`資產` 取得的標誌和圖像不是公有領域,就是**合理使用**。 簡而言之,法律 [合理使用原則](https://www.copyright.gov/fair-use/more-info.html) 允許使用受版權保護的圖像來識別主題以供公眾評論。 但是,這些標誌和圖像可能仍受一個或多個司法管轄區的商標法約束。 在使用此內容之前,請確保其用於識別擁有商標的實體或組織,並確保您有權根據適用所預期情況下的法律。 *從本網站複製內容時,您自行負責確保您不會侵犯他人的商標或版權。* +我們認為,從第三方供應商`資產` 取得的標誌和圖像不是公有領域,就是**合理使用**。 In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. 但是,這些標誌和圖像可能仍受一個或多個司法管轄區的商標法約束。 在使用此內容之前,請確保其用於識別擁有商標的實體或組織,並確保您有權根據適用所預期情況下的法律。 *從本網站複製內容時,您自行負責確保您不會侵犯他人的商標或版權。* 當您對我們的網站作出貢獻時,您是根據上述許可,並且您授予 Privacy Guides 永久全球性、非排他、可轉讓、免版稅、不可撤銷的許可,Privacy Guides 有權通過多個層級的轉授權人再許可這些權利,以複製,修改,顯示,執行和分發您的貢獻作為項目的一部分。 @@ -47,4 +47,4 @@ Privacy Guides 是一個開放原始碼專案,貢獻有授權保護,包括 --- -*此通知本身的部分內容來自GitHub上的 [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) 。 該資源和此頁面本身依 [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/)授權發布。* +*此通知本身的部分內容來自GitHub上的 [opensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) 。 That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/zh-Hant/about/privacytools.md b/i18n/zh-Hant/about/privacytools.md index a3b57e62..4f5422dd 100644 --- a/i18n/zh-Hant/about/privacytools.md +++ b/i18n/zh-Hant/about/privacytools.md @@ -14,13 +14,13 @@ PrivacyTools.io 建立了一個信譽良好的網站和一系列服務後,這 PrivacyTools 由 BurungHantu 於 2015年創建,在斯諾登洩密事件後,他希望建立一個隱私資源的有用工具。 該網站成長為一個蓬勃發展的開源專案,有 [許多貢獻者](https://github.com/privacytools/privacytools.io/graphs/contributors),某些最終賦予各種組織職責,例如運營 Matrix 和 Mastodon 等線上服務,管理和審查 GitHub網站變更,為項目尋找贊助商,撰寫部落格文章和運營 Twitter 等社交媒體外展平臺等。 -從2019年開始, BurungHantu 與網站和社區的積極發展越來越疏遠,並開始推遲運營服務器的相關付款。 為避免本站系統管理員自掏腰包支付網站的伺服器成本,我們自[2019年10月31日起變動](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/)了網頁上的捐款方式,從過去 BurungHantu 私人的 l PayPal 與加密貨幣帳戶改成 OpenCollective 帳戶。 這有額外的好處,使財務完全透明,這是我們堅信的價值,並且在美國可以免稅,因為它們由 Open Collective Foundation 501 (c) 3 持有。 這一變化得到了團隊的一致同意,沒有爭議。 +從2019年開始, BurungHantu 與網站和社區的積極發展越來越疏遠,並開始推遲運營服務器的相關付款。 To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). 這有額外的好處,使財務完全透明,這是我們堅信的價值,並且在美國可以免稅,因為它們由 Open Collective Foundation 501 (c) 3 持有。 這一變化得到了團隊的一致同意,沒有爭議。 ## 為什麼我們要繼續前進 2020年, BurungHantu的缺席更加明顯。 有一次,我們要求將網域的名稱伺服器更改為由系統管理員控制的名稱伺服器,以避免未來中斷,但在提出請求後一個多月後都未能完成此更改。 他在 Matrix 公開聊天室和私人團隊聊天室中消失幾個月,偶爾會突然進來提供一些小反饋或承諾,然後再次消失。 -2020 年10月, PrivacyTools 系統管理員 (Jonah) 因為這些困難,[離開](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) 本專案,將控制權移交給其它長期投入者。 Jonah 經營幾乎所有的 PrivacyTools 服務,並在 BurungHantu 缺席時擔任網站開發的 *實質* 項目負責人,因此他的離開對該組織來說是一個重大變化。 由於這些重大的組織變化, BurungHantu 當時向留下的團隊承諾他將回來接管接下來的專案。 ==在接下來的幾個月裡, PrivacyTools 團隊通過幾種溝通方式聯繫,但沒有收到任何回應。== +In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah 經營幾乎所有的 PrivacyTools 服務,並在 BurungHantu 缺席時擔任網站開發的 *實質* 項目負責人,因此他的離開對該組織來說是一個重大變化。 由於這些重大的組織變化, BurungHantu 當時向留下的團隊承諾他將回來接管接下來的專案。 ==在接下來的幾個月裡, PrivacyTools 團隊通過幾種溝通方式聯繫,但沒有收到任何回應。== ## 域名可靠性 @@ -34,25 +34,25 @@ PrivacyTools 由 BurungHantu 於 2015年創建,在斯諾登洩密事件後, ## 社區行動呼籲 -2021年7月底,我們 [通知](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) PrivacyTools 社區打算搬移到新域名繼續專案,並於[2022 年8月2日選出新域名](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw)。 最後選中 Privacy Guides , Jonah 從2020年開始擁有`privacyguides.org` 網域原打算作為未開發的副項目。 +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. 最後選中 Privacy Guides , Jonah 從2020年開始擁有`privacyguides.org` 網域原打算作為未開發的副項目。 ## 控制r/privacytoolsIO -與privacytools.io持續的網站問題同時, r/privacytoolsIO審核團隊在管理subreddit方面面臨挑戰。 Subreddit 一直以來獨立於網站的開發運作,而 BurungHantu 也是 subreddit 主要主持人,他擁有唯一“完全控制”的主持權限。 u/trai_dep 是當時唯一的活躍版主, [2021年6月28日向 Reddit 管理員發出請求](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) ,要求授予主要版主職位和完全控制權限,以便對 Subreddit 進行必要更改。 +與privacytools.io持續的網站問題同時, r/privacytoolsIO審核團隊在管理subreddit方面面臨挑戰。 Subreddit 一直以來獨立於網站的開發運作,而 BurungHantu 也是 subreddit 主要主持人,他擁有唯一“完全控制”的主持權限。 u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit要求 subreddit 有活躍的版主。 如果主要主持人長期不活躍(例如一年) ,則可以重新任命下一位主要主持人。 為了讓這個請求獲得批準, BurungHantu 必須很長一段時間內消失在 Reddit 所有活動中,這與他在其他平臺上的行為一致。 > 如果通過 Reddit 請求而被取消 subreddit 版主職位,那是因為版主缺乏回應與活動讓 subreddit 有資格進行r/redditrequest 轉移。 > -> r/redditrequest 是Reddit 確保社區擁有活躍版主和 [版主行為準則](https://www.redditinc.com/policies/moderator-code-of-conduct)的一部分方式。 +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## 開始過渡 -2021 年9月14日,我們 [宣佈](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) 開始搬移至新域名: +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] 我們認為有必要儘早轉換,以確保人們很快就會發現這個過渡的變化。 這給我們足夠的時間來轉換網域名稱,它目前正在重定向到www.privacyguides.org ,並希望它能給每個人足夠的時間來注意變化,更新書籤和網站等。 -此更改 [包含:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - 重定向 www.privacytools.io 到 [www.privacyguides.org](https://www.privacyguides.org)。 - 在GitHub上存檔源代碼,以保存我們過去的工作和問題跟蹤器,我們繼續使用這個網站未來幾個月的開發。 @@ -63,11 +63,11 @@ Reddit要求 subreddit 有活躍的版主。 如果主要主持人長期不活 ## 後續事件 -過渡約一周後, BurungHantu 近一年內再次出現,但由於他過去不可靠的記錄,團隊中沒有人願意回到 PrivacyTools。 他沒有為長期缺席道歉,而是立即發起攻勢,將向過渡至 Privacy Guides 定位為對他個人和他的項目之攻擊。 隨後當社區指出他缺席並放棄此專案時, [刪除](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) 許多這類發文。 +過渡約一周後, BurungHantu 近一年內再次出現,但由於他過去不可靠的記錄,團隊中沒有人願意回到 PrivacyTools。 他沒有為長期缺席道歉,而是立即發起攻勢,將向過渡至 Privacy Guides 定位為對他個人和他的項目之攻擊。 He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. 此時, BurungHantu 聲稱他會繼續開發 privacytools.io ,並要求我們取消把 www.privacytools.io 重定向到 [www.privacyguides.org](https://www.privacyguides.org)。 我們答應了他的請求,並要求他保持 Matrix , Mastodon 和PeerTube 的子域名活躍,讓我們社區可維持幾個月的公共服務,以便這些平臺上的用戶輕鬆遷移到其他帳戶。 由於我們提供服務的聯邦性質,它們與特定的域名相關聯,因此很難遷移(在某些情況下是不可能的)。 -不幸的是,由於r/privacytoolsIO subreddit的控制權沒有依BurungHantu 的要求歸還給他(詳細信息如下),這些子域名在10月初被 [切斷](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) ,扼阻了仍在使用這些服務的用戶的遷移。 +Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. 接下來 BurungHantu 不實指控 Jonah 從該專案竊取捐款。 直到 Privacy Guides遷移後,BurungHantu 才讓人知道而他指控的事件已發生了一年多。 團隊 [和社區](https://twitter.com/TommyTran732/status/1526153536962281474)一再要求 BurungHantu 提出證據並由對他過往的沉默發表評論,但他從未回應。 @@ -77,11 +77,11 @@ BurungHantu 還發布一篇 [推特帖子](https://twitter.com/privacytoolsIO/st 截至 2022年9月25日,我們看到 BurungHantu 全部的打算都出現在privacytools.io ,因此我們決定創建這個解釋頁面。 他經營的網站似乎是重度 SEO 優化版本,以推薦工具來換取經濟補償。 最近 IVPN 和 Mullvad,這兩家受到隱私社群近乎一致[推薦](../vpn.md)的 VPN 供應商,因長期反對推薦人優惠回扣而受瞩目,卻遭到 PrivacyTools 的刪除。 在他们的位置上? NordVPN、Surfshark、ExpressVPN 和 hide.me ;不值得信任的平臺和商業實踐的巨型 VPN 公司,以積極的營銷和推廣折扣而臭名昭著。 -==**PrivacyTools 已成為我們 [過去 2019年 PrivacyTools 部落格所警告](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) 的網站類型。**== 自過渡以來 PrivacyGuides 一直試圖與 PrivacyTools 保持距離,但他們對我們項目持續騷擾,現在他們荒謬地濫用原品牌在6年來獲得的可信度開源貢獻,這實在非常令人不安。 我們這些為隱私而戰的人並不是在互相爭鬥,也沒有從出價最高者那裡取得建議。 +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. 我們這些為隱私而戰的人並不是在互相爭鬥,也沒有從出價最高者那裡取得建議。 ## r/privacytoolsIO Now -在推出 [r/PrivacyGuides ](https://www.reddit.com/r/privacyguides)之後, u/trai_dep 繼續主持兩個 subreddits 是不切實際的,隨著社區進入過渡時期, r/privacytoolsIO 在2021年11月1日發文將 [ subreddits 改成限制狀態](https://www.reddit.com/r/privacytoolsIO/comments/qk7qrj/a_new_era_why_rptio_is_now_a_restricted_sub/) : +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] Sub 的發展是 PrivacyGuides.org 團隊多年來付出巨大努力的結果。 以你們每一個人, > @@ -89,7 +89,7 @@ BurungHantu 還發布一篇 [推特帖子](https://twitter.com/privacytoolsIO/st Subreddit不屬於任何人,尤其不屬於品牌持有者。 他們屬於他們的社區,社區及其主持人決定支持轉移到r/PrivacyGuides。 -此後幾個月裏,BurungHantu 一直威乞並濟地希望取回 subreddit 控制權,這已 [違反](https://www.reddit.com/r/redditrequest/wiki/top_mod_removal/) Reddit 規定: +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > 不允許任何版主對刪除申請進行報復。 @@ -107,12 +107,12 @@ Subreddit不屬於任何人,尤其不屬於品牌持有者。 他們屬於他 這個主題已經在我們社區的各個地方進行廣泛討論,似乎大多數閱讀此頁面的人都已經熟悉了導致轉向 Privacy Guides 的事件。 之前關於此事的一些文章可能有額外的細節,為了簡潔起見,我們在這裡省略。 為完整起見,原文的鏈結收錄在下方。 -- [2021年6月28日要求可控制r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [2021年7月27日在團隊撰寫的部落格宣佈打算要搬移PrivacyTools](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [2021年9月13日宣布開始從r/privacytoolsIO 過渡到 Privacy Guides](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [2021年6月28日要求可控制r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [2021年7月27日在團隊撰寫的部落格宣佈打算要搬移PrivacyTools](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [2021年9月13日宣布開始從r/privacytoolsIO 過渡到 Privacy Guides](https://reddit.com/pnql46) - [2021年9月17日Jonah 在 OpenCollective 發出公告](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [2021年9月30日Twitter 主題,詳細說明此頁面上描述的大多數事件](https://twitter.com/privacy_guides/status/1443633412800225280) -- [2021年10月1日u/dng99 發文指出子網域失敗](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [2022年4月2日u/dng99 回應對 PrivacyTools 的指責文章](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [2021年10月1日u/dng99 發文指出子網域失敗](https://reddit.com/comments/pymthv/comment/hexwrps) +- [2022年4月2日u/dng99 回應對 PrivacyTools 的指責文章](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [2022年5月16日@ TommyTran732 在Twitter 的回應](https://twitter.com/TommyTran732/status/1526153497984618496) - [2022年9月3日 @dngray 在Techlore 論壇的發文](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/zh-Hant/advanced/communication-network-types.md b/i18n/zh-Hant/advanced/communication-network-types.md index 53f78636..bc50f3b4 100644 --- a/i18n/zh-Hant/advanced/communication-network-types.md +++ b/i18n/zh-Hant/advanced/communication-network-types.md @@ -28,7 +28,7 @@ description: 簡介常見的即時通訊應用程式網路架構。 - [限制控制或存取](https://drewdevault.com/2018/08/08/Signal.html)。 可能包括以下內容: - 集中型網路 [禁封了](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165)可以提供更靈活自定與更佳使用體驗的第三方客戶端。 通常定義在使用條款和條件。 - 對於第三方開發人員來說,文件記錄很糟。 -- 由單一實體控制服務時,其 [所有權](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/)、隱私政策和服務操作可輕易改變,甚致危及服務。 +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - 自我託管需要精力和設置服務的知識。 ## 聯邦式網絡 @@ -60,7 +60,7 @@ description: 簡介常見的即時通訊應用程式網路架構。 P2P 軟體連接到 [分佈式網路](https://en.wikipedia.org/wiki/Distributed_networking) 中的節點,在沒有第三方伺服器的情況下將訊息傳遞給收件人。 -客戶端(對等軟體)通常通過 [分布式計算](https://en.wikipedia.org/wiki/Distributed_computing) 網絡找到彼此。 例如, [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT)被 [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) 和 [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) 使用。 另一種方法是鄰近的網絡,通過WiFi或藍牙建立連接(例如, Briar 或 [Scuttlebutt](https://www.scuttlebutt.nz) 社交網絡協議)。 +客戶端(對等軟體)通常通過 [分布式計算](https://en.wikipedia.org/wiki/Distributed_computing) 網絡找到彼此。 例如, [Distributed Hash Tables](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT)被 [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) 和 [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) 使用。 Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). 一旦對等體通過任何這些方法找到通往其聯繫的路徑,它們之間就會建立直接連接。 通常訊息內容會加密,但觀察者仍然可以推斷發件人和收件人的位置和身份。 diff --git a/i18n/zh-Hant/advanced/dns-overview.md b/i18n/zh-Hant/advanced/dns-overview.md index 7b59e99f..f7a936b8 100644 --- a/i18n/zh-Hant/advanced/dns-overview.md +++ b/i18n/zh-Hant/advanced/dns-overview.md @@ -18,7 +18,7 @@ DNS 從網際網路的 [早期](https://en.wikipedia.org/wiki/Domain_Name_System ### 未加密的 DNS -1. 使用 [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) ( [Wireshark](https://en.wikipedia.org/wiki/Wireshark) 項目的一部分) ,我們可以監控和記錄網路封包的傳輸。 此命令記錄符合指定規則的封包: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. 此命令記錄符合指定規則的封包: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ DNS 從網際網路的 [早期](https://en.wikipedia.org/wiki/Domain_Name_System nslookup privacyguides.org 8.8.8.8 ``` -3. 接下來我們要[分析](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) 結果: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ DNS 從網際網路的 [早期](https://en.wikipedia.org/wiki/Domain_Name_System ### 通過 TLS 的 DNS) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) 是另一種加密 DNS 通訊方式,其定義於 [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858)。 支持首先在Android 9 , iOS 14和Linux的 [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) 版本237中實現。 近年來,業界偏好已經從 DoT 轉移到 DoH ,因為 DoT 協議[複雜](https://dnscrypt.info/faq/) ,並且在實現中對RFC 的遵照狀況各不相同。 DoT 還在專用端口 853 上運行,但很容易被限制性防火牆阻止。 +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) 是另一種加密 DNS 通訊方式,其定義於 [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858)。 Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT 還在專用端口 853 上運行,但很容易被限制性防火牆阻止。 ### 通過 HTTPS 的 DNS) @@ -106,7 +106,7 @@ DoH 原生執行出現在 iOS 14, macOS 11, Microsoft Windows, 與 Android 13 ( wireshark -r /tmp/dns_doh.pcap ``` -[連接建立](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) 在加密連接時會進行 [TLS 握手](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) 。 當查看隨後的“應用程序數據”封包時,都不包含所請求的域名或它的 IP 地址。 +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. 當查看隨後的“應用程序數據”封包時,都不包含所請求的域名或它的 IP 地址。 ## 什麼時候 **不該** 使用加密的 DNS ? @@ -158,9 +158,9 @@ DoH 原生執行出現在 iOS 14, macOS 11, Microsoft Windows, 與 Android 13 ( tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -即便使用「加密 DNS」伺服器,網域也可能會透過 SNI 披露。 [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) 協議帶來了 [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello/),可以防止這種洩漏。 +即便使用「加密 DNS」伺服器,網域也可能會透過 SNI 披露。 The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. -政府,特別是 [中國](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) 和 [俄羅斯](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/),已經[開始封鎖](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) ,或者有些表示將這樣做。 近來俄羅斯 +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. 近來俄羅斯 開始屏蔽使用 [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3)的外國網站。 這是因為作為HTTP/3的一部分的 [QUIC](https://en.wikipedia.org/wiki/QUIC) 協議要求 `ClientHello` 也被加密。

@@ -333,7 +333,7 @@ DNSSEC 簽署過程類似於無法仿製的個人獨特簽名於法律文件, DNSSEC 在所有 DNS 層中實施分級數位簽名政策。 例如,查詢 `privacyguides.org` ,根 DNS 伺服器將簽署尾綴 `.org` 伺服器密鑰,然後 `.org` 伺服器再簽署 `privacyguides.org`的授權名稱伺服器的密鑰。 -改編自 Google [DNS Security Extensions (DNSSEC) overview] (https://cloud.google.com/dns/docs/dnssec)和 Cloudflare [DNSSEC: An Introduction] (https://blog.cloudflare.com/dnssec-an-introduction/) ,兩者均根據[CC BY 4.0] (https://creativecommons.org/licenses/by/4 .0/)授權。 +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). diff --git a/i18n/zh-Hant/advanced/payments.md b/i18n/zh-Hant/advanced/payments.md index 2b16a58c..31962ee0 100644 --- a/i18n/zh-Hant/advanced/payments.md +++ b/i18n/zh-Hant/advanced/payments.md @@ -9,7 +9,7 @@ icon: material/hand-coin 幾個世紀以來, **現金** 一直是私人支付的主要形式。 在大多數情況下,現金具有優秀的隱私性,在大多數國家被廣泛接受,並且是 **可替代的**,這意味著它是非唯一的,完全可互換。 -現金支付法因國家而異。 在美國,10,000美元以上交易需在 [8300表格中](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000)對美國國稅局披露。 收款業必須驗證收款人的姓名、地址、職業、出生日期、社會安全號碼或其他TIN (部分例外)。 少於 3,000 美元交換和匯款,就無須身份證明。 現金鈔票有序號。 商家很少追蹤序號,但執法部門可以在針對性調查中用到它們。 +現金支付法因國家而異。 In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). 收款業必須驗證收款人的姓名、地址、職業、出生日期、社會安全號碼或其他TIN (部分例外)。 少於 3,000 美元交換和匯款,就無須身份證明。 現金鈔票有序號。 商家很少追蹤序號,但執法部門可以在針對性調查中用到它們。 儘管如此,現金仍是最好的選擇。 @@ -60,7 +60,7 @@ icon: material/hand-coin - [推薦的加密貨幣 :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -隱私硬幣受到政府機構日益嚴格的監管。 2020年[美國稅務局 IRS 發表 $625,000 賞金](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc),來徵求工具破解 Bitcoin Lightning Network 和 Monero 交易隱私。 最後由 [二家公司](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) 共同獲得 $1250000 美元,但外界並不知道所開發的工具是用在哪一種加密貨幣網路。 由於這些工具的保密性,追蹤加密貨幣的方法都未得到獨立的證實。隱私硬幣交易很可能被運用在針對性地調查,而大規模監控則無法阻止。 +隱私硬幣受到政府機構日益嚴格的監管。 In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. 最後由 [二家公司](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) 共同獲得 $1250000 美元,但外界並不知道所開發的工具是用在哪一種加密貨幣網路。 由於這些工具的保密性,追蹤加密貨幣的方法都未得到獨立的證實。隱私硬幣交易很可能被運用在針對性地調查,而大規模監控則無法阻止。 ### 其他貨幣(比特幣、以太坊等) @@ -76,7 +76,7 @@ icon: material/hand-coin ### 取得 -私下購買 [加密貨幣](../cryptocurrency.md) ,如Monero 可能很困難。 P2P 市場如 [LocalMonero](https://localmonero.co/),為促進人群交易的平台,也是個可考慮的選擇。 如果使用需要 KYC的交易所是您可接受的風險(只要隨後的交易無法追蹤)。一個更容易的方式是從 [Kraken](https://kraken.com/)等交易所購買 Monero ,或者從 KYC 交易所購買比特幣/萊特幣,然後兌換為 Monero。 然後,您可以將購入的 Monero 提取到自己的非保管錢包,以便 日後私下使用。 +私下購買 [加密貨幣](../cryptocurrency.md) ,如Monero 可能很困難。 P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. 然後,您可以將購入的 Monero 提取到自己的非保管錢包,以便 日後私下使用。 如果您選擇這條路線,請確保以不同的時間和額度購買與用掉Monero 。 如果你在交易所購買 5000 美元的 Monero ,並在一個小時後花掉這筆錢,外部觀察者會將這些行為作關聯,無關 Monero 走的是通道。 驚人的購買和提前購買大量的Monero 以支應之後小額交易,可以避免這種陷阱。 diff --git a/i18n/zh-Hant/advanced/tor-overview.md b/i18n/zh-Hant/advanced/tor-overview.md index c357a8b1..25470c3e 100644 --- a/i18n/zh-Hant/advanced/tor-overview.md +++ b/i18n/zh-Hant/advanced/tor-overview.md @@ -23,7 +23,7 @@ Tor 是一個免費使用的去中心化網路,其讓用戶在使用網際網 由於各種原因,我們已[一般建議](../basics/vpn-overview.md)絕大多數人使用值得信賴的VPN 提供商,以下有關透過 VPN 連接到Tor的建議可能適用。 在連接到 Tor 之前無需停用 VPN,某些線上資源讓您相信這一點。 -直接連接到 Tor 將使您的連接在任何本地網路管理員或 ISP 面前脫穎突出。 網路管理員過去已[偵測並將此類流量作關聯性](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/),以識別網路上的特定 Tor 使用者並對其進行去匿名化。 另一方面,連接 VPN 並不會太可疑,因為日常消費者使用商業 VPN 服務來執行各種日常任務例如繞過地理限制,即使在網路限制嚴格的國家也是如此。 +直接連接到 Tor 將使您的連接在任何本地網路管理員或 ISP 面前脫穎突出。 Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. 另一方面,連接 VPN 並不會太可疑,因為日常消費者使用商業 VPN 服務來執行各種日常任務例如繞過地理限制,即使在網路限制嚴格的國家也是如此。 所以應在**在**連接到 Tor 網路之前盡力隱藏自己的 IP 位址。 只需連接到VPN(透過電腦上安裝的客戶端),然後正常存取[Tor](../tor.md)(例如透過Tor 瀏覽器)即可做到這一點。 這將建立一個連接鏈,例如: @@ -84,7 +84,7 @@ Tor 網路並非在任何情況下都是完美的隱私保護工具,其存在 ### Tor usage is not undetectable -**即便使用橋接器和可插拔傳輸,**Tor 專案並未提供任何工具來對ISP 隱藏正在使用 Tor 的事實。 即使使用模糊的「可插拔傳輸」或非公共橋接器也不能隱藏正在使用私人通訊通道的事實。 最受歡迎的可插拔傳輸,例如obfs4(將流量混淆為「看起來沒什麼」)和meek(使用網域前置來偽裝流量)可以是[使用相當標準的流量分析技術檢測](https://www.hackerfactor.com/blog/ index.php?/archives/889-Tor-0day-Burning-Bridges.html)。 Snowflake 也有類似的問題,< em x-id="3">在 Tor 連線建立前,[很容易偵測到](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) 。 +**即便使用橋接器和可插拔傳輸,**Tor 專案並未提供任何工具來對ISP 隱藏正在使用 Tor 的事實。 即使使用模糊的「可插拔傳輸」或非公共橋接器也不能隱藏正在使用私人通訊通道的事實。 The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. 還有這三種以外的可插拔傳輸,但通常依賴透過隱蔽性來逃避偵測的安全性。 它們不是不可能被檢測,只是使用者太少,以至於不值得為它們建立檢測器。 如果特別遭受監控,則不應依賴它們。 @@ -226,7 +226,7 @@ ISP 肯定不會截取所有資料包級資料與將其永久存儲,他們*無 [^1]: - 迴路中的第一個節點被稱為“入口守衛”或“守衛”。 它是一個快速和穩定的中繼站,作迴路中的第一個入口通常會維持 2~3個月,以防止已知的匿名破壞攻擊。 其餘的迴路則會依每次訪問網站而變化,這些中繼節點共同提供Tor 完整隱私保護。 了解更多關於守衛中繼的運作,請參考 [部落格文章](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) 和 [入口守衛論文paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf)。 ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) + 迴路中的第一個節點被稱為“入口守衛”或“守衛”。 它是一個快速和穩定的中繼站,作迴路中的第一個入口通常會維持 2~3個月,以防止已知的匿名破壞攻擊。 其餘的迴路則會依每次訪問網站而變化,這些中繼節點共同提供Tor 完整隱私保護。 了解更多關於守衛中繼的運作,請參考 [部落格文章](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) 和 [入口守衛論文paper](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf)。 ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) diff --git a/i18n/zh-Hant/android.md b/i18n/zh-Hant/android.md index c9a8d28e..afe23472 100644 --- a/i18n/zh-Hant/android.md +++ b/i18n/zh-Hant/android.md @@ -83,9 +83,9 @@ schema: **安卓開源項目** 是一個由谷歌領導的開源移動操作系統,為世界上大多數移動設備提供動力。 大多數 Android 系統的手機都經過修改,包括侵入性整合與應用程式,如 Google Play 服務,所以使用無這類侵入性功能的 Android 系統版本取代手機原本預設的安裝,可改善行動設備上的隱私。 -[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } [:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" } +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } 這些是我們推薦 Android 作業系統、設備和應用程式,最大程度地提高行動設備的安全和隱私。 了解更多 Android 資訊: @@ -113,7 +113,7 @@ schema: GrapheneOS 提供額外的 [安全加固](https://en.wikipedia.org/wiki/Hardening_(computing)) 與隱私改善。 它有 [加固的記憶體分配器](https://github.com/GrapheneOS/hardened_malloc)、網路、感應許可與各類[安全功能](https://grapheneos.org/features). GrapheneOS 還帶有完整的軔體更新與已簽名的建置版本,因此完全支援 verified boot。 -[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } @@ -121,11 +121,11 @@ GrapheneOS 提供額外的 [安全加固](https://en.wikipedia.org/wiki/Hardenin -GrapheneOS 支援 [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), 它可以像其它普通應用一樣在沙盒中執行[Google Play 服務](https://en.wikipedia.org/wiki/Google_Play_Services) 。 這意味著您將可以利用大多數 Google Play 服務,如 [推送通知](https://firebase.google.com/docs/cloud-messaging/),完全控制其權限和訪問,同時將其包含所選的特定 [工作設定檔](os/android-overview.md#work-profile) 或 [用戶設定檔](os/android-overview.md#user-profiles)。 +GrapheneOS 支援 [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), 它可以像其它普通應用一樣在沙盒中執行[Google Play 服務](https://en.wikipedia.org/wiki/Google_Play_Services) 。 This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel 手機是目前唯一符合 GrapheneOS [硬體安全要求](https://grapheneos.org/faq#device-support)的設備。 -[為何我們推薦 GrapheneOS 而非 CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[為何我們推薦 GrapheneOS 而非 CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS @@ -133,7 +133,7 @@ Google Pixel 手機是目前唯一符合 GrapheneOS [硬體安全要求](https:/ ![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS** 是 [LineageOS](https://lineageos.org/)的分支。 +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS 從 LineageOS 繼承了許多[支援的設備](https://divestos.org/index.php?page=devices&base=LineageOS)。 它具有簽名的建置,因此可在某些非 Pixel 設備上執行 [verified boot](https://source.android.com/security/verifiedboot)。 [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS 從 LineageOS 繼承了許多[支援的設備](https://divestos.org/ind -DivestOS 有自動內核弱點 ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [補丁](https://gitlab.com/divested-mobile/cve_checker)、更少的商業專用 blobs 與自定的 [hosts](https://divested.dev/index.php?page=dnsbl) 檔案。 其加固的 WebView, [Mulch](https://gitlab.com/divested-mobile/mulch),能使 [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) 用在所有架構和 [網路狀態分區](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning),且接收額外更新。 DivestOS 還包括來自GrapheneOS 內核補丁,並通過 [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758),開啟所有可用的內核安全功能。 3.4 版之後更新的內核都包括全頁[淨化](https://lwn.net/Articles/334747/) ,所有 ~22 Clang 編譯的內核都啟用了 [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471)。 +DivestOS 有自動內核弱點 ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [補丁](https://gitlab.com/divested-mobile/cve_checker)、更少的商業專用 blobs 與自定的 [hosts](https://divested.dev/index.php?page=dnsbl) 檔案。 Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS 還包括來自GrapheneOS 內核補丁,並通過 [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758),開啟所有可用的內核安全功能。 All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS 實現了一些最初為 GrapheneOS 開發的系統加固補丁。 DivestOS 16.0以上版本實現了 GrapheneOS [`網際網路`](https://developer.android.com/training/basics/network-ops/connecting) 和感應權限切換, [固化記憶體分配器](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)),以及部分 [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) 固化補丁集。 17.1 之後的 GrapheneOS 支援完整 [MAC 隨機化](https://en.wikipedia.org/wiki/MAC_address#Randomization) 選項, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) 控制,以及自動重啟/Wi-Fi/藍牙 [超時選項](https://grapheneos.org/features)。 +DivestOS 實現了一些最初為 GrapheneOS 開發的系統加固補丁。 DivestOS 16.0以上版本實現了 GrapheneOS [`網際網路`](https://developer.android.com/training/basics/network-ops/connecting) 和感應權限切換, [固化記憶體分配器](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)),以及部分 [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) 固化補丁集。 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS 以 F-Droid 為預設的應用下載服務。 通常建議 [少用 F-Droid](#f-droid),然而這對 DivestOS 卻不可行,開發者透過 ([DivestOS 官方](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) 與 [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2))的 F-Droid 存取庫來更新他們的應用程式。 我們建議禁用官方 F-Droid 應用,並使用 [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **,啟用DivestOS 存取庫,以保持這些組件為最新。 至於其它應用,我們建議的獲取方式仍適用。

+DivestOS 以 F-Droid 為預設的應用下載服務。 通常建議 [少用 F-Droid](#f-droid),然而這對 DivestOS 卻不可行,開發者透過 ([DivestOS 官方](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) 與 [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2))的 F-Droid 存取庫來更新他們的應用程式。 We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. 至於其它應用,我們建議的獲取方式仍適用。

Warning "警告"

@@ -166,13 +166,13 @@ DivestOS 軔體更新 [status](https://gitlab.com/divested-mobile/firmware-empty 避免從電信行動營運商購置手機。 它們往往 **鎖定 bootloader** 也不支援 [OEM 解鎖](https://source.android.com/devices/bootloader/locking_unlocking)。 這類手機變體阻止安裝任何替代的 Android 發行版。 -從網路市集購買二手手機必須要非常**小心**。 請檢查賣家的信譽 如果設備被盜,它有可能被輸入到 [IMEI 資料庫](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database)。 前一位持有者的活動發生關係也將有風險。 +從網路市集購買二手手機必須要非常**小心**。 請檢查賣家的信譽 If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). 前一位持有者的活動發生關係也將有風險。 對於 Android 設備與作業系統相容有一些提示: - 不要購買已經達到或接近其支援壽命的設備,額外的軔體更新必須由製造商提供。 - 不要購買預裝 LineageOS 或/e/OS 或是無適當 [Verified Boot](https://source.android.com/security/verifiedboot) 支持和軔體更新的 Android 手機。 這些設備沒辦檢查是否曾遭篡改。 -- 簡而言之,如果這裏沒列出某設備或 Android 發行版,都是有原因的。 請查看 [本站論壇 ](https://discuss.privacyguides.net/) 了解詳情! +- 簡而言之,如果這裏沒列出某設備或 Android 發行版,都是有原因的。 Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Titan M2 這類安全元件比大多數其他手機處理器的可信執行環 Google Pixel 手機使用名為Trusty 的 TEE 作業系統,它是 [開源](https://source.android.com/security/trusty#whyTrusty),與其他許多手機不同。 -Pixel 手機很容易安裝 GrapheneOS 只需依其 [網頁安裝程式](https://grapheneos.org/install/web)即可。 如果不敢自行安裝願意多花一點錢,可以看看 [NitroPhone](https://shop.nitrokey.com/shop) ,它們預裝 GrapheneOS,來自著名的 [Nitrokey](https://www.nitrokey.com/about) 公司。 +Pixel 手機很容易安裝 GrapheneOS 只需依其 [網頁安裝程式](https://grapheneos.org/install/web)即可。 If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. 購買 Google Pixel 的一些提醒: @@ -220,14 +220,14 @@ Shelter 阻止聯繫人利用默認檔案管理器([DocumentsUI](https://source. [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

Warning "警告"

-推薦使用 Shelter 取代 [Insular](https://secure-system.gitlab.io/Insular/)和 [Island](https://github.com/oasisfeng/island),因為 Shelter 支持[聯繫人搜索屏蔽](https://secure-system.gitlab.io/Insular/faq.html)。 +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). 當使用 Shelter 時,將信任置於其開發者,Shelter 作為[設備管理員](https://developer.android.com/guide/topics/admin/device-admin)來創建工作設定檔,它有大量權限訪問存儲在工作設定檔的資料。 @@ -322,11 +322,11 @@ Shelter 阻止聯繫人利用默認檔案管理器([DocumentsUI](https://source.
-Obtainium 可以從不同來源下載 APK 安裝檔,由使用者自行判斷其來源與應用是否可靠合法。 例如使用 Obtainium 從 [Signal APK 登錄頁 ](https://signal.org/android/apk/) 來下載安裝 Signal 應該沒問題,但如果透過第三方 APK 儲放庫如 Aptoide o 或 APKPure 則可能有其它風險。 安裝惡意*更新*的風險較低,因為 Android 自身會在安裝之前驗證所有應用程式更新是否由與手機上現有應用程式為相同開發人員所簽署。 +Obtainium 可以從不同來源下載 APK 安裝檔,由使用者自行判斷其來源與應用是否可靠合法。 For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. 安裝惡意*更新*的風險較低,因為 Android 自身會在安裝之前驗證所有應用程式更新是否由與手機上現有應用程式為相同開發人員所簽署。 ### GrapheneOS App Store -GrapheneOS 應用商店可在 [GitHub](https://github.com/GrapheneOS/Apps/releases)找到。 它支持Android 12 以上版本,並且能夠自行更新。 該應用商店有 GrapheneOS 專案的獨立應用建制,如 [Auditor](https://attestation.app/)、[Camera](https://github.com/GrapheneOS/Camera)、 [PDF Viewer](https://github.com/GrapheneOS/PdfViewer)。 如果正在尋找這些應用程式,強烈建議從 GrapheneOS 應用程式商店而不是 Google Play 商店獲得,因為 GrapheneOS 會對自家商店的應用程式簽署 Google 無法訪問的簽名。 +GrapheneOS 應用商店可在 [GitHub](https://github.com/GrapheneOS/Apps/releases)找到。 它支持Android 12 以上版本,並且能夠自行更新。 The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). 如果正在尋找這些應用程式,強烈建議從 GrapheneOS 應用程式商店而不是 Google Play 商店獲得,因為 GrapheneOS 會對自家商店的應用程式簽署 Google 無法訪問的簽名。 ### Aurora Store @@ -338,7 +338,7 @@ Google Play商店需要登錄 Google 帳戶,這對隱私來說不是很好。 **Aurora Store** 為 Google Play Store 客戶端,其無須 Google 帳戶 或 microG 即可下戴應用。 -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ Aurora Store不允許其匿名帳戶下載付費應用程式。 您可以選擇 如果想下載 APK 檔案進行手動安裝,可用 [`apksigner`](https://developer.android.com/studio/command-line/apksigner) 工具驗證其簽名,這是 Android [build-tools](https://developer.android.com/studio/releases/build-tools)的一部分。 -1. 安裝 [Java JDK](https://www.oracle.com/java/technologies/downloads/)。 +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. 下載 [Android Studio 命令列工具](https://developer.android.com/studio#command-tools). @@ -393,7 +393,7 @@ Aurora Store不允許其匿名帳戶下載付費應用程式。 您可以選擇 ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. 產生的雜湊結果可與另一個來源進行比對。 某些開發者例如 Signal 在會其官網顥示其[指紋碼](https://signal.org/android/apk/)。 +5. 產生的雜湊結果可與另一個來源進行比對。 Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ Aurora Store不允許其匿名帳戶下載付費應用程式。 您可以選擇 ![F-Droid 圖標](assets/img/android/f-droid.svg){ align=right width=120px } -==我們只建議用 F-Droid 來獲取無法在上述管道取得的應用程式。== F-Droid 經常被推薦為 Google Play 替代品,特別是隱私社區。 可添加第三方資源庫的選項與不被局限在 Google 圍牆花園,導致了它的流行。 F-Droid 另外還有 [可複制建構](https://f-droid.org/en/docs/Reproducible_Builds/) ,用於一些應用程式,並致力於自由和開源軟體。 不過F-Droid 建置、簽署和交付包的方式存在一些安全缺失: +==我們只建議用 F-Droid 來獲取無法在上述管道取得的應用程式。== F-Droid 經常被推薦為 Google Play 替代品,特別是隱私社區。 可添加第三方資源庫的選項與不被局限在 Google 圍牆花園,導致了它的流行。 F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. 不過F-Droid 建置、簽署和交付包的方式存在一些安全缺失: 由於其構制應用程式的程序,F-Droid 官方資源庫中的應用程式經常在更新上落後。 F-Droid 維護者在用自己的密鑰簽署應用程式時也會重複使用套件 ID,此作法並不理想,因為這給予 F-Droid 團隊終極信任。 此外,應用程式納入官方 F-Droid 儲存庫中的要求不如 Google Play 等其他應用程式商店嚴格,這意味著 F-Droid 往往會託管更多較舊、未維護或不符合[現代安全標準](https://developer.android.com/google/play/requirements/target-sdk)的應用程式。 -其他流行的第三方資源庫,如 [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) ,緩解一些擔憂。 IzzyOnDroid 存儲庫直接從 GitHub 拉取構建,是開發者自己存儲庫的下一個最好的東西。 然而,這不是我們所推薦的,當應用程式進入 F-droid 主倉庫時,通常 [就會從該倉庫刪除](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446)。 雖然可以理解(因為該特定倉庫的作用是應用程式在為 F-Droid 主倉庫接受之前託管工作),它可能會讓所安裝的應用程式不再收到更新。 +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. IzzyOnDroid 存儲庫直接從 GitHub 拉取構建,是開發者自己存儲庫的下一個最好的東西。 然而,這不是我們所推薦的,當應用程式進入 F-droid 主倉庫時,通常 [就會從該倉庫刪除](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446)。 雖然可以理解(因為該特定倉庫的作用是應用程式在為 F-Droid 主倉庫接受之前託管工作),它可能會讓所安裝的應用程式不再收到更新。 -也就是說, [F-droid](https://f-droid.org/en/packages/) 和 [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) 存取庫有無數應用程式,所以它們成為搜索和發現開源應用程式的有用工具,然後通過 Play Store、Aurora Store 或直接從開發者獲得 APK 下載。 透過此方法尋找新應用程式時,應該做出最佳判斷,並密切注意應用程式的更新頻率。 過時的應用程式可能依賴不支援的程式庫,從而帶來潛在的安全風險。 +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. 透過此方法尋找新應用程式時,應該做出最佳判斷,並密切注意應用程式的更新頻率。 過時的應用程式可能依賴不支援的程式庫,從而帶來潛在的安全風險。

F-Droid Basic

-在某些罕見情況下,應用程式開發者將只通過 F-droid 發布([Gadgetbridge](https://gadgetbridge.org/)就是一例。) 如果真需要這樣的應用程式,建議使用 [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) ,而不是從官方的 F-droid 應用程式來獲得。 F-Droid Basic 可以進行無需特權或 root 的更新,且具降低的功能集(限制攻擊面)。 +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic 可以進行無需特權或 root 的更新,且具降低的功能集(限制攻擊面)。
diff --git a/i18n/zh-Hant/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/zh-Hant/assets/img/how-tor-works/tor-encryption-dark.svg index fa8c8935..0f1e0716 100644 --- a/i18n/zh-Hant/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/zh-Hant/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 您的 - - 設備 - - - - 傳送資料到網站 - - - - - 從網站收取資料 - - - - - 您的 - - 設備 - - - - 入口 - - - - - 中間 - - - - - 出口 - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - 入口 - - - - - 中間 - - - - - 出口 - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/zh-Hant/assets/img/how-tor-works/tor-encryption.svg b/i18n/zh-Hant/assets/img/how-tor-works/tor-encryption.svg index 55f148f4..f954fb0f 100644 --- a/i18n/zh-Hant/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/zh-Hant/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 您的 - - 設備 - - - - 傳送資料到網站 - - - - - 從網站收取資料 - - - - - 您的 - - 設備 - - - - 進入 - - - - - 中間 - - - - - 出口 - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - 入口 - - - - - 中間 - - - - - 出口 - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/zh-Hant/assets/img/how-tor-works/tor-path-dark.svg b/i18n/zh-Hant/assets/img/how-tor-works/tor-path-dark.svg index e1e2aed5..7e99b945 100644 --- a/i18n/zh-Hant/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/zh-Hant/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - 您的 - 設備 - - - - 進入 - - - - - 中間 - - - - - 出口 - - - - - PrivacyGuides.org - - - - - - - - + + + + 您的 + 設備 + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/zh-Hant/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/zh-Hant/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index 77050be0..ce51beee 100644 --- a/i18n/zh-Hant/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/zh-Hant/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 您的 - - - 設備 - - - - - - 守衛 - - - 中繼 - - - 中繼 - - - - - 隱藏...洋蔥 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 會合 - - - 中繼 - - - - - 入口 - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/zh-Hant/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/zh-Hant/assets/img/how-tor-works/tor-path-hidden-service.svg index 507b2495..8d008447 100644 --- a/i18n/zh-Hant/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/zh-Hant/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 您的 - - - 設備 - - - - - - 守衛 - - - 中繼 - - - 中繼 - - - - - 隱藏...洋蔥 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 會合 - - - 中繼 - - - - - 入口 - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/zh-Hant/assets/img/how-tor-works/tor-path.svg b/i18n/zh-Hant/assets/img/how-tor-works/tor-path.svg index 73853486..701607c2 100644 --- a/i18n/zh-Hant/assets/img/how-tor-works/tor-path.svg +++ b/i18n/zh-Hant/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + @@ -24,22 +24,22 @@ - 您的 - 設備 + 您的 + 設備 - 進入 + 進入 - 中間 + 中間 - 出口 + 出口 diff --git a/i18n/zh-Hant/basics/account-deletion.md b/i18n/zh-Hant/basics/account-deletion.md index f170c336..bf67e4f9 100644 --- a/i18n/zh-Hant/basics/account-deletion.md +++ b/i18n/zh-Hant/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: 'material/account-remove' description: 一般人很容易累積大量的網路服務帳戶,這裏有一些如何順理這些資料的小訣竅。 --- -隨著時間的推移,一般人很容易地積累一些網路帳戶,但可能其中有不少早已不再使用。 刪除這些未使用的帳戶是收回隱私的重要一步,因為休眠帳戶容易受到數據洩露的影響。 資料外洩是指服務的安全性受到破壞,受保護的資訊被未經授權的行為者檢視、傳輸或竊取。 不幸的是近來資料外洩事件 [已見怪不怪](https://haveibeenpwned.com/PwnedWebsites) ,保持良好的數位清潔才能減輕資料外洩對個人生活的衝擊。 本指南的目標是幫助您通過令人討厭的帳戶刪除過程----通常由 [欺騙性設計](https://www.deceptive.design/)讓刪除困難,以改善您的網路現身。 +隨著時間的推移,一般人很容易地積累一些網路帳戶,但可能其中有不少早已不再使用。 刪除這些未使用的帳戶是收回隱私的重要一步,因為休眠帳戶容易受到數據洩露的影響。 資料外洩是指服務的安全性受到破壞,受保護的資訊被未經授權的行為者檢視、傳輸或竊取。 不幸的是近來資料外洩事件 [已見怪不怪](https://haveibeenpwned.com/PwnedWebsites) ,保持良好的數位清潔才能減輕資料外洩對個人生活的衝擊。 The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## 查找舊帳戶 ### 密碼管理器。 -如果您使用一個貫穿整個數位生活的密碼管理器,這部分將非常容易。 通常,它們包括內置功能,用於檢測您的憑證是否在資料洩露中暴露-例如Bitwarden的 [資料洩露報告](https://bitwarden.com/blog/have-you-been-pwned/)。 +如果您使用一個貫穿整個數位生活的密碼管理器,這部分將非常容易。 Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's 資料外洩報告特色](../assets/img/account-deletion/exposed_passwords.png)
-即使您之前沒有明確使用過密碼管理器,但可能在無意中早已透過瀏覽器或手機中使用了密碼管理器。 例如: [Firefox 密碼管理器](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins)、 [Google 密碼管理器](https://passwords.google.com/intro) 和 [Edge 密碼管理器](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336)。 +即使您之前沒有明確使用過密碼管理器,但可能在無意中早已透過瀏覽器或手機中使用了密碼管理器。 For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). 桌面平臺通常還有一個密碼管理器,可以幫助您恢復忘記的密碼: -- Windows [憑證管理器r](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [密碼](https://support.apple.com/en-us/HT211145) -- iOS [密碼](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux, Gnome Keyring, 可透過 [Seahorse](https://wiki.gnome.org/Apps/Seahorse) 或 [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager)來取用。 ### 電子郵件 @@ -39,7 +39,7 @@ description: 一般人很容易累積大量的網路服務帳戶,這裏有一 ### GDPR (僅限歐洲經濟區居民) -歐盟居民在資料刪除上享有額外權利,其詳見於 GDPR [第 17 條](https://www.gdpr.org/regulation/article-17.html)規定。 如果適用於您,請閱讀任何特定服務的隱私權政策,以查找有關如何行使刪除權利的資訊。 閱讀隱私政策可能很重要,因為某些服務的「刪除帳戶」選項,實際上只是停用您的帳戶,若要真正刪除,您必須採取額外行動。 有時,刪除過程中可能需填寫調查、向服務商的資料保護人員發送電子郵件,甚至提出您為歐盟居民的證明。 如果您打算這樣做,請 **不要** 覆寫帳戶資訊-可能需要歐盟居民身份。 請注意,服務的位置並不重要; GDPR 適用於為歐盟用戶服務的任何人。 若服務商不願尊重您請求刪除的權利,可聯絡所在國的[官方資料保護機關](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en),您可能有權請求金錢賠償。 +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. 如果適用於您,請閱讀任何特定服務的隱私權政策,以查找有關如何行使刪除權利的資訊。 閱讀隱私政策可能很重要,因為某些服務的「刪除帳戶」選項,實際上只是停用您的帳戶,若要真正刪除,您必須採取額外行動。 有時,刪除過程中可能需填寫調查、向服務商的資料保護人員發送電子郵件,甚至提出您為歐盟居民的證明。 如果您打算這樣做,請 **不要** 覆寫帳戶資訊-可能需要歐盟居民身份。 請注意,服務的位置並不重要; GDPR 適用於為歐盟用戶服務的任何人。 若服務商不願尊重您請求刪除的權利,可聯絡所在國的[官方資料保護機關](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en),您可能有權請求金錢賠償。 ### 覆寫帳戶資訊 @@ -59,4 +59,4 @@ description: 一般人很容易累積大量的網路服務帳戶,這裏有一 ## 避免註冊新帳戶 -俗話說:「預防更勝治療。」 每當你覺得想要註冊一個新帳戶時,問問自己:「我真的需要註冊這個嗎? 有不需要註冊的替代方案嗎?」 刪除一個帳戶通常比創建一個帳戶要困難得多。 即使刪除或更改帳戶上的資訊,也可能有來自第三方的緩存版本,例如 [Internet Archive](https://archive.org/)。 如果可能的話,不要隨便註冊帳號-未來的你會感謝你現在的決定! +俗話說:「預防更勝治療。」 每當你覺得想要註冊一個新帳戶時,問問自己:「我真的需要註冊這個嗎? 有不需要註冊的替代方案嗎?」 刪除一個帳戶通常比創建一個帳戶要困難得多。 And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). 如果可能的話,不要隨便註冊帳號-未來的你會感謝你現在的決定! diff --git a/i18n/zh-Hant/basics/common-misconceptions.md b/i18n/zh-Hant/basics/common-misconceptions.md index 95ee7899..d77add96 100644 --- a/i18n/zh-Hant/basics/common-misconceptions.md +++ b/i18n/zh-Hant/basics/common-misconceptions.md @@ -88,7 +88,7 @@ We don't suggest using a VPN or Tor for any of these things, as your identity is 2. **未知身份** - 未知身份可能是您經常使用的穩定假名。 它已不算匿名了,因為不會變動。 如果您是線上社群的一員,您可能希望保留其他人知道的角色。 這個假名不是匿名的,因為如果監控時間足夠長,關於所有者的詳細信息可以透露更多信息,例如他們的寫作方式,他們對感興趣主題的一般知識等。 -您可能希望使用 VPN 來隱藏您的 IP 地址。 金融交易更難掩蓋:您可以考慮使用匿名加密貨幣,例如 [Monero](https://www.getmonero.org/)。 採用山寨幣轉移也可能有助於偽裝您的貨幣來源。 通常情況下,交易所需要完成 KYC (了解您的客戶) ,然後才能將法定貨幣兌換為任何類型的加密貨幣。 線下操作也可能是一個解決方案;然而,這些往往更昂貴,有時也需要 KYC。 +您可能希望使用 VPN 來隱藏您的 IP 地址。 Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). 採用山寨幣轉移也可能有助於偽裝您的貨幣來源。 通常情況下,交易所需要完成 KYC (了解您的客戶) ,然後才能將法定貨幣兌換為任何類型的加密貨幣。 線下操作也可能是一個解決方案;然而,這些往往更昂貴,有時也需要 KYC。 3. **匿名身份** - 即使有經驗的專家,也很難長時間保持一個帳號的匿名性。 它們應該是短期和短暫的身份,定期輪流。 diff --git a/i18n/zh-Hant/basics/common-threats.md b/i18n/zh-Hant/basics/common-threats.md index 25f7fc29..55ea60a6 100644 --- a/i18n/zh-Hant/basics/common-threats.md +++ b/i18n/zh-Hant/basics/common-threats.md @@ -55,7 +55,7 @@ description: 您的威脅模型雖說是個人的事,但它也是本站許多 -若您特別擔心 **物理攻擊**,就應選用具安全驗證開機的作業系統,例如 Android, iOS, macOS, 或[Windows (帶 TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process)。 應確保您的驅動器是加密的,並且操作系統使用 TPM或 Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) 或 [Element](https://developers.google.com/android/security/android-ready-se) 來限制輸入加密密碼的嘗試率。 您應該避免與不信任的人共享您的電腦,因為大多數桌面作業系統不會單獨加密每個用戶的數據。 +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). 應確保您的驅動器是加密的,並且操作系統使用 TPM或 Secure [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) 或 [Element](https://developers.google.com/android/security/android-ready-se) 來限制輸入加密密碼的嘗試率。 您應該避免與不信任的人共享您的電腦,因為大多數桌面作業系統不會單獨加密每個用戶的數據。 ## 服務供應商的隱私權 @@ -89,16 +89,16 @@ description: 您的威脅模型雖說是個人的事,但它也是本站許多

Atlas of Surveillance

-如果您想進一步了解監控方法及其在您所在城市的實施方式,您也可以查看[電子前鋒基金會 Eff](https://www.eff.org/)的[監控地圖集](https://atlasofsurveillance.org/)。 +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
政府常認為大規模監控計劃是打擊恐怖主義和預防犯罪的必要手段。 然而,少數羣體和政治異見人士最常遭受不成比例地人權侵害。
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

面對[愛德華·斯諾登(Edward Snowden)披露的 [PRISM]( https://en.wikipedia.org/wiki/PRISM )和 [Upstream]( https://en.wikipedia.org/wiki/Upstream_collection )]等政府計劃,情報官員承認,國家安全局多年來一直祕密地收集每個美國人電話的記錄—誰在打電話,何時打電話,以及通話時間多久。 當 NSA 日復一日地收集這類資訊時,就可以揭示人們生活相關聯的敏感細節,例如他們是否打電話給牧師、墮胎提供者、成癮顧問或自殺熱線。 @@ -144,7 +144,7 @@ In France you can take a look at the [Technopolice website](https://technopolice 網口審查包括由極權主義政府、網路管理員和服務提供商等所進行的行為(在不同程度上)。 這些試圖控制通訊與限縮資料取用的作為,往往不見容於意見自由的基本人權。[^5] -對企業平臺的審查越來越普遍,如Twitter 和 Facebook 等平臺屈服於公眾需求、市場和政府機構的壓力。 政府對企業的施壓可能是隱蔽的,例如白宮私下 [要求拿掉](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) 某個勯動的 Youtube 影片,或是公開者如中國政府命令企業要遵循嚴厲的審查制度。 +對企業平臺的審查越來越普遍,如Twitter 和 Facebook 等平臺屈服於公眾需求、市場和政府機構的壓力。 Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. 關注審查威脅的人可以使用像 [Tor](../advanced/tor-overview.md) 這樣的技術來規避它,並支持像 [Matrix](../real-time-communication.md#element)這樣的抗審查通信平臺,該平臺沒有可以任意關閉帳戶的集中帳戶權限。 @@ -162,5 +162,5 @@ In France you can take a look at the [Technopolice website](https://technopolice [^1]: 維基百科: [*大型監控*](https://en.wikipedia.org/wiki/Mass_surveillance) 與 [*監控*](https://en.wikipedia.org/wiki/Surveillance). [^2]: 美國隱私和公民自由監督委員會: [*根據第 215 條進行的電話記錄計劃的報告*](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^3]: 維基百科: [*監控資本主義*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: “[枚舉壞處](https://www.ranum.com/security/computer_security/editorials/dumb/)” (或“列出所知的全部壞事” ),未能充分保護您免受新的和未知的威脅,因為許多內容攔截程式和防病毒程式尚未被添加到過濾器列表。 您還應採用其他緩解技術。 +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. 您還應採用其他緩解技術。 [^5]: 聯合國: [*《世界人權宣言》*](https://www.un.org/en/about-us/universal-declaration-of-human-rights). diff --git a/i18n/zh-Hant/basics/email-security.md b/i18n/zh-Hant/basics/email-security.md index 2288b67e..a44b8e82 100644 --- a/i18n/zh-Hant/basics/email-security.md +++ b/i18n/zh-Hant/basics/email-security.md @@ -13,7 +13,7 @@ description: 從許多方面來看電子郵件本質上是不安全的,這也 將 E2EE 添加到不同電子郵件提供商之間的電子郵件的標準方法是使用 OpenPGP。 OpenPGP 標準有不同的實現,最常見的是 [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) 和 [OpenPGP.js](https://openpgpjs.org)。 -還有另一種標準被稱為 [S/MIME](https://en.wikipedia.org/wiki/S/MIME),但它需要由 [憑證機構](https://en.wikipedia.org/wiki/Certificate_authority) 頒發的憑證(並非所有憑證都發行S/MIME憑證)。 它支持 [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) 和 [Outlook for Web或Exchange Server 2016 , 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480)。 +還有另一種標準被稱為 [S/MIME](https://en.wikipedia.org/wiki/S/MIME),但它需要由 [憑證機構](https://en.wikipedia.org/wiki/Certificate_authority) 頒發的憑證(並非所有憑證都發行S/MIME憑證)。 It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). 即使您使用OpenPGP ,它也不支持 [向前保密](https://en.wikipedia.org/wiki/Forward_secrecy),這意味著如果您或收件人的私鑰被盜,所有先前加密的消息都將被曝光。 這就是為什麼我們建議 [即時通訊](../real-time-communication.md) ,只要有可能,就實現電子郵件的前向保密性,以進行個人對個人的通信。 @@ -23,7 +23,7 @@ description: 從許多方面來看電子郵件本質上是不安全的,這也 除了我們推薦的[電子郵件用戶端](../email-clients.md)支援 WKD外,一些網頁郵件供應商也支援 WKD。 *自己的*金鑰是否發佈到 WKD 供其他人使用取決於網域配置。 如果使用支援 WKD 的[電子郵件提供者](../email.md#openpgp-known-services),例如 Proton Mail 或 Mailbox.org,他們可以在其網站上發布您網域名所準備的 OpenPGP 金鑰。 -如果使用自訂網域,則需另外設定 WKD。 如果你可控制自定域名,則無論電子郵件提供者為何,都可以設定 WKD。 一個簡單的方法是使用[ 「keys.openpgp.org WKD 即服務」](https://keys.openpgp.org/about/usage#wkd-as-a-service)功能,透過指向`wkd.keys.openpgp.org` 網域的`openpgpkey` 子網域來設定CNAME 記錄,然後將金鑰上傳到[keys.openpgp.org](https ://keys.openpgp.org/)。 或者你可以 [在自己的 Web 伺服器搭建 WKD r](https://wiki.gnupg.org/WKDHosting) 。 +如果使用自訂網域,則需另外設定 WKD。 如果你可控制自定域名,則無論電子郵件提供者為何,都可以設定 WKD。 One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). 或者你可以 [在自己的 Web 伺服器搭建 WKD r](https://wiki.gnupg.org/WKDHosting) 。 如使用不支援 WKD 供應商的共用網域(例如 @gmail.com),則無法透過此方法與其他人共用你的 OpenPGP 密鑰。 @@ -33,7 +33,7 @@ description: 從許多方面來看電子郵件本質上是不安全的,這也 ### 我要怎樣保護自己的私密鑰匙? -智慧鑰卡(例如 [Yubikey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) 或 [Nitrokey](https://www.nitrokey.com))的工作原理是從用戶端的設備(手機,平板電腦,電腦等)接收加密的電子郵件消息。 安全鑰卡會解密該訊息再把解開的內容傳到設備。 +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. 安全鑰卡會解密該訊息再把解開的內容傳到設備。 在智慧卡上進行解密的優點是可避免將私鑰暴露在某個遭破壞的裝置。 diff --git a/i18n/zh-Hant/basics/multi-factor-authentication.md b/i18n/zh-Hant/basics/multi-factor-authentication.md index 1a35be77..f85c9fb5 100644 --- a/i18n/zh-Hant/basics/multi-factor-authentication.md +++ b/i18n/zh-Hant/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP 是最常見的 MFA 形式之一。 當您設置TOTP時,您通常需要 然後,時間限制代碼從共享機密和當前時間衍生出來。 由於代碼僅在短時間內有效,無法訪問共享機密,因此對手無法生成新代碼。 -如果您擁有支援 TOTP 的硬體安全金鑰(例如具有 [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)的YubiKey ) ,我們建議您將「共享機密」儲存在硬體上。 像 YubiKey 這類硬體就是為了讓“共享祕密”難以提取、複製而開發的工具。 YubiKey 也不會連接到網際網路,不像使用 TOTP 應用程式的手機。 +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. 像 YubiKey 這類硬體就是為了讓“共享祕密”難以提取、複製而開發的工具。 YubiKey 也不會連接到網際網路,不像使用 TOTP 應用程式的手機。 與 [WebAuthn](#fido-fast-identity-online)不同, TOTP 無法應對 [網絡釣魚](https://en.wikipedia.org/wiki/Phishing) 或重複使用攻擊。 如果對手從您身上取得有效的登錄碼,他們可以隨意多次使用它,直到過期(通常是60秒)。 @@ -122,13 +122,13 @@ WebAuthn是最安全、最私密的第二要素驗證形式。 雖然驗證體 ### Windows 作業系統 -Yubico 有專門的 [憑證提供者](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) ,為本地 Windows 帳戶在登錄流程添加了Challenge-Response 驗證。 如果您擁有具 Challenge-Response 驗證支援的 YubiKey ,請查看 [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide),該指南將協助您在 Windows 電腦上設置MFA。 +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### macOS macOS 具有 [原生支援](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) 用於使用智慧卡(PIV)進行驗證。 如果您有支援 PIV 介面的智慧卡或硬體安全金鑰(例如 YubiKey) ,建議您遵循智慧卡/硬體安全供應商的文件,為您的macOS 電腦設定第二要素驗證。 -Yubico 指南 [在macOS](https://support.yubico.com/hc/en-us/articles/360016649059) 中使用 YubiKey 作為智慧卡,可幫助您在 macOS 設置 YubiKey。 +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. 設定智慧卡/安全金鑰後,我們建議您在終端機中執行此命令: @@ -147,22 +147,22 @@ sudo defaults write /Library/Preferences/com.apple.loginwindow DisableFDEAutoLog
-Linux 上的 `pam_u2f` 模組可以提供雙因素驗證,以便在最流行的 Linux 發行版上登錄。 如果您有支援 U2F 的硬體安全金鑰,可以為您的登入設定 MFA 驗證。 Yubico有一個 [Ubuntu Linux 登錄指南- U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) ,應該適用於任何發行版。 軟體包管理器指令(例如 `apt-get`)和軟體包名稱可能不同。 本指南 **不適用於** Qubes OS. +Linux 上的 `pam_u2f` 模組可以提供雙因素驗證,以便在最流行的 Linux 發行版上登錄。 如果您有支援 U2F 的硬體安全金鑰,可以為您的登入設定 MFA 驗證。 Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. 軟體包管理器指令(例如 `apt-get`)和軟體包名稱可能不同。 本指南 **不適用於** Qubes OS. ### Qubes OS -Qubes OS 支援 YubiKeys 進行 Challenge-Response 驗證。 如果您擁有具 Challenge-Response 驗證支援的 YubiKey ,請查看 Qubes OS [YubiKey 文檔](https://www.qubes-os.org/doc/yubikey/) ,以在Qubes OS 設置 MFA。 +Qubes OS 支援 YubiKeys 進行 Challenge-Response 驗證。 If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### 硬件安全金鑰 -SSH MFA 可以使用多種不同的身份驗證方法進行設置,這些方法在硬體安全金鑰中很受歡迎。 建議您查看 Yubico [文件檔](https://developers.yubico.com/SSH/) ,了解如何設置此功能。 +SSH MFA 可以使用多種不同的身份驗證方法進行設置,這些方法在硬體安全金鑰中很受歡迎。 We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### 暫時性的一次性密碼 (TOTP) -SSH MFA 也可以使用 TOTP 設定。 DigitalOcean 提供教學 [如何在 Ubuntu 20.04](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04) 為 SSH 設置多因素身份驗證。 無論是哪一個發行版本,大多數操作方式都相同,但是軟體包管理器命令-例如 `apt-get`-和軟體包名稱可能不同。 +SSH MFA 也可以使用 TOTP 設定。 DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). 無論是哪一個發行版本,大多數操作方式都相同,但是軟體包管理器命令-例如 `apt-get`-和軟體包名稱可能不同。 ### KeePass (和KeePassXC ) -KeePass 和 KeePassXC 資料庫可以使用 Challenge-Response 或 HOTP 作為第二要素驗證進行密碼保護。 Yubico 提供了一份 KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) 文件, [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) 網站上也有一份。 +KeePass 和 KeePassXC 資料庫可以使用 Challenge-Response 或 HOTP 作為第二要素驗證進行密碼保護。 Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/zh-Hant/basics/passwords-overview.md b/i18n/zh-Hant/basics/passwords-overview.md index 290f3ad1..e87fb4d2 100644 --- a/i18n/zh-Hant/basics/passwords-overview.md +++ b/i18n/zh-Hant/basics/passwords-overview.md @@ -54,13 +54,13 @@ Diceware 是一種創建密碼短語的方法,這些密短口令易於記憶

Note

-這裏的說明假設您正使用 [EFF的大型單詞清單](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) 來生成密語,每個單詞需要骰子滾動五次。 其他單詞列表的單詞其骰子滾動次數不一,且可能需要不同單詞數量來達成相同的熵。 +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. 其他單詞列表的單詞其骰子滾動次數不一,且可能需要不同單詞數量來達成相同的熵。
1. 將1~6 骰子滾動五次,記下每次出現的數字。 -2. 例如,假設您滾動了 `2-5-2-6-6`。 查看 [EFF 的大型單詞清單](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) ,找出對應於 `25266` 的單詞。 +2. 例如,假設您滾動了 `2-5-2-6-6`。 Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. 你會得到單詞 `encrypt`。 把這個詞寫下來。 @@ -75,20 +75,20 @@ Diceware 是一種創建密碼短語的方法,這些密短口令易於記憶 如果您手邊沒有或不想使用真正的骰子,可利用密碼管理器內建密碼生成器,因為大多數密碼生成器除了普通密碼之外還可以選擇生成 diceware 口令密語。 -我們建議使用 [EFF 的大型單詞清單](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) 來生成您的diceware 口令密語,因為它提供與原始列表完全相同的安全性,同時更容易記憶的單詞。 如果不想要使用英文密語,也有 [其他語言的單詞清單](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline)。 +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. 如果不想要使用英文密語,也有 [其他語言的單詞清單](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline)。
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. 判斷 diceware 口令密語強度的衡量標準是確定它有多少熵。 Diceware 口令密語中的個別單詞的熵為 $\text{log}_2(\text{WordsInList})$ 而整組密語的熵總量為 $\text{log}_2(\text{WordsInList}^\text{WordsInPhrase}). 因此,上述列表中的每個單詞都會產生~ 12.9 位熵(($\text{log}_2 (7776) $) ,而其中取得七個單詞組成的口令密語就具有~ 90.47位熵 ($\text{log}_2 (7776 ^ 7) $ )。 -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. 要計算可能的口令密語數量,所要做的就是 $\text{WordsInList}^\text{WordsInPhrase}$ ,或者依我們的情況, $ 7776 ^ 7 $。 +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. 要計算可能的口令密語數量,所要做的就是 $\text{WordsInList}^\text{WordsInPhrase}$ ,或者依我們的情況, $ 7776 ^ 7 $。 -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. 平均而言,至少要嘗試所有可能組合的一半來猜測您的密語。 考慮到這一點,即使對手每秒能夠猜測~ 1,000,000,000,000 次,他們仍然需要~ 27,255,689 年來猜出您的密語。 即使以下情況屬實,也是如此: diff --git a/i18n/zh-Hant/basics/vpn-overview.md b/i18n/zh-Hant/basics/vpn-overview.md index c86b750d..20e303c1 100644 --- a/i18n/zh-Hant/basics/vpn-overview.md +++ b/i18n/zh-Hant/basics/vpn-overview.md @@ -69,13 +69,13 @@ VPN 無法加密裝置與 VPN 伺服器之間連線以外的資料。 VPN 服務 不應該使用該功能:使用 Tor 的主要優點是不信任 VPN 提供者,當使用 VPN 託管的 Tor 節點而不是從電腦直接連接到 Tor 時,這一點就被否定了。 -目前Tor 僅支援 TCP 協定。 UDP(由 [WebRTC](https://en.wikipedia.org/wiki/WebRTC) 使用,[HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) 和其他協定)、[ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) 和其他資料封包將被丟棄。 為了彌補這一點, VPN 提供商通常會引導全部的non-TCP 封包通過他們的 VPN 伺服器(您的第一個跳)。 [ProtonVPN ](https://protonvpn.com/support/tor-vpn/)的情況就是如此。 此外,使用此 Tor over VPN 設定時,您無法控制 Tor 其他重要的功能,例如 [隔離目標位址](https://www.whonix.org/wiki/Stream_Isolation) (為您訪問不同網域使用不同的Tor 迴路)。 +目前Tor 僅支援 TCP 協定。 UDP(由 [WebRTC](https://en.wikipedia.org/wiki/WebRTC) 使用,[HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3) 和其他協定)、[ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol) 和其他資料封包將被丟棄。 為了彌補這一點, VPN 提供商通常會引導全部的non-TCP 封包通過他們的 VPN 伺服器(您的第一個跳)。 This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). 此功能應被視為*便捷*訪問 Tor 隱藏服務的方式,而不是保持匿名。 為了獲得妥適的匿名性,請使用 [Tor 瀏覽器](../tor.md)。 ## 商業 VPN 所有權 -大多數 VPN 服務由[少數的同一家公司](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/)擁有。 這些可疑的公司運行許多小型 VPN 服務,製造出一種擁有比實際更多選擇的假象,來實現利潤最大化。 通常這些為空殼公司提供服務的供應商都有糟糕的隱私權政策,不應信任。 請非常嚴格地決定使用哪個提供者。 +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). 這些可疑的公司運行許多小型 VPN 服務,製造出一種擁有比實際更多選擇的假象,來實現利潤最大化。 通常這些為空殼公司提供服務的供應商都有糟糕的隱私權政策,不應信任。 請非常嚴格地決定使用哪個提供者。 還應警惕:許多 VPN 評論網站只是向最高出價者開放的廣告工具。 == Privacy Guides 不會透過推薦外部產品賺錢,且從不使用推廣方案。== @@ -111,8 +111,8 @@ MPR 試圖解決 VPN 固有的問題:用戶必須完全信任它們。 他們 ## VPN 相關資訊 -- [VPN 問題和隱私評論網站](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [免費 VPN 應用程式調查](https://www.top10vpn.com/free-vpn-app-investigation/) -- [揭露隱身的 VPN 擁有者:由 23 家公司運營101款 VPN 產品](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [這家中國公司祕密支持24個尋求危險權限的流行應用程序](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN - a Very Precarious Narrative](https://schub.io/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert +- [VPN 問題和隱私評論網站](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [免費 VPN 應用程式調查](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [揭露隱身的 VPN 擁有者:由 23 家公司運營101款 VPN 產品](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [這家中國公司祕密支持24個尋求危險權限的流行應用程序](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/zh-Hant/basics/why-privacy-matters.md b/i18n/zh-Hant/basics/why-privacy-matters.md index cd5584ce..721947a1 100644 --- a/i18n/zh-Hant/basics/why-privacy-matters.md +++ b/i18n/zh-Hant/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ icon: 'material/shield-account' ## 來源 -- [Why Privacy Matters](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) by Neil Richards -- [新石油l: 為何隱私 & 安全重要](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [新石油l: 為何隱私 & 安全重要](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants 有關"匿名" vs "隱私" vs "安全"](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/zh-Hant/calendar.md b/i18n/zh-Hant/calendar.md index a3c4d209..5c45ccb9 100644 --- a/i18n/zh-Hant/calendar.md +++ b/i18n/zh-Hant/calendar.md @@ -13,7 +13,7 @@ cover: calendar.webp ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** 在其支援平台上提供免費加密的行事曆。 功能包括:所有數據的自動E2EE ,共享功能,匯入/匯出功能,多因素驗證和 [more](https://tuta.com/calendar-app-comparison/)。 +**Tuta** 在其支援平台上提供免費加密的行事曆。 Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). 多個行事曆和擴展共享功能僅限於付費訂閱者。 @@ -21,18 +21,18 @@ cover: calendar.webp [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
-Downloads "下載" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -52,10 +52,10 @@ cover: calendar.webp [:octicons-code-16:](https://github.com/ProtonMail/WebClients){ .card-link title="Source Code" }
-Downloads "下載" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/zh-Hant/cloud.md b/i18n/zh-Hant/cloud.md index 80cbc2fc..33402e57 100644 --- a/i18n/zh-Hant/cloud.md +++ b/i18n/zh-Hant/cloud.md @@ -56,15 +56,15 @@ Proton Drive 全新移動客戶端軟體尚未經過第三方公開審核。 **Tresorit** 為 2011年創辦於瑞士- 匃牙利的加密雲端儲存供應商。 Tresorit 由瑞士郵政擁有,瑞士郵政是瑞士的國家郵政服務。 -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
-downloads "下載" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive 全新移動客戶端軟體尚未經過第三方公開審核。 Tresorit 已獲得多項獨立安全稽核: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001: 2013[^1] 符合性 [認證](https://www.certipedia.com/quality_marks/9108644476) TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Computest 的滲透測試 +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - 該檢查評估了Tresorit 網頁用戶端、Android 應用程式、Windows 應用程式和相關基礎設施的安全性。 - Computest 發現了兩個已解決的漏洞。 -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Ernst & Young 的滲透測試。 +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - 該檢測分析了 Tresorit 完整源代碼,並驗證了落實 Tresorit [白皮書](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf)中描述的概念。 - Ernst & Young 還測試了網絡、行動和桌面客戶端: “測試結果發現沒有偏離 Tresorit 的資料機密性聲明。 -他們還獲得了數位信任標籤,這是 [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) 的認證,該認證要求通過與安全性,隱私和可靠性相關的 [35標準](https://digitaltrust-label.swiss/criteria/) 。 +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## 標準 diff --git a/i18n/zh-Hant/cryptocurrency.md b/i18n/zh-Hant/cryptocurrency.md index ff566a61..c208ee19 100644 --- a/i18n/zh-Hant/cryptocurrency.md +++ b/i18n/zh-Hant/cryptocurrency.md @@ -24,10 +24,10 @@ cover: cryptocurrency.webp **Monero** 使用增強隱私技術的區塊鏈,混淆交易以實現匿名性。 每筆 Monero 交易都隱藏了交易金額、發送和接收地址以及資金來源,使其成為加密貨幣新手的理想選擇。 -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ cover: cryptocurrency.webp 為了獲得最佳的隱私,請務必使用非保管錢包,讓查看密鑰保留在設備上。 這意味著只有您能夠花費資金並查看交易進出。 若使用託管錢包,則服務商可看到**全部活動** ;如果用的是"輕量"錢包,則服務商保存了您的私鑰並看到您全部的交易活動。 一些非保管錢包包括: - [官方Monero客戶端](https://getmonero.org/downloads) (桌面) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet 支援多種加密貨幣。 僅限 Monero 的 Cake Wallet 版本可在 [Monero.com](https://monero.com/) 上找到。 -- [Feather Wallet](https://featherwallet.org/) (桌面版) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet 支援多種加密貨幣。 A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) 為了獲得最大的隱私(即便使用非保管錢包),您應該運行自己的 Monero 節點。 使用別人的節點會暴露一些信息,例如您從中連接到它的IP位址,同步錢包的時間戳記以及您從錢包發送的交易(儘管沒有關於這些交易的其他細節)。 或者,您可以通過Tor或i2p連接到其他人的Monero節點。 -2021 年8 月 CipherTrace [宣佈](https://ciphertrace.com/enhanced-monero-tracing/) 為政府機構提供強化的Monero 追蹤效能。 公開貼文顯示,美國財政部金融犯罪執法網絡 [在2022年底授權](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace 的 “Monero 模塊”。 +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. 公開貼文顯示,美國財政部金融犯罪執法網絡 [在2022年底授權](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace 的 “Monero 模塊”。 -Monero 交易圖隱私受到其相對較小的環形簽名的限制,特別是抵抗針對性的攻擊。 Monero's 隱私功能也曾被某些資安研究人員 [質疑](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) ,過去已發現一些弱點與補丁,因此如 CipherTrace 的宣稱並非不可能。 雖然 Monero 大規模監控工具不太可能像比特幣和其他工具一樣存在,但可以肯定的是,追蹤工具有助於進行針對性的調查。 +Monero 交易圖隱私受到其相對較小的環形簽名的限制,特別是抵抗針對性的攻擊。 Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. 雖然 Monero 大規模監控工具不太可能像比特幣和其他工具一樣存在,但可以肯定的是,追蹤工具有助於進行針對性的調查。 Monero 是隱私友好的加密貨幣中最強大的競爭者,但它的隱私聲稱**尚未**被任何方式證明 。 需要更多的時間和研究來評估 Monero 是否足夠抵禦攻擊來提供足夠的隱私。 diff --git a/i18n/zh-Hant/data-redaction.md b/i18n/zh-Hant/data-redaction.md index b81abaff..27ab7625 100644 --- a/i18n/zh-Hant/data-redaction.md +++ b/i18n/zh-Hant/data-redaction.md @@ -88,12 +88,12 @@ Linux 有MAT2 提供支持的第三方圖形界面工具 [Metadata Cleaner](http **Metapho** 是一個簡單清晰的相片中繼資料檢視器,例如日期、檔案名稱、大小、相機型號、快門速度和位置。 [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ Linux 有MAT2 提供支持的第三方圖形界面工具 [Metadata Cleaner](http **PrivacyBlur** 是一個免費應用程式,在線上分享前先模糊圖片的敏感部分。 -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ Linux 有MAT2 提供支持的第三方圖形界面工具 [Metadata Cleaner](http Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106)
diff --git a/i18n/zh-Hant/desktop-browsers.md b/i18n/zh-Hant/desktop-browsers.md index aa9075e1..cfb4a743 100644 --- a/i18n/zh-Hant/desktop-browsers.md +++ b/i18n/zh-Hant/desktop-browsers.md @@ -70,8 +70,8 @@ schema: **Mullvad 瀏覽器** 是移除 Tor 網路整合的[Tor 瀏覽器](tor.md#tor-browser)版本,旨在為 VPN 用戶提供Tor 瀏覽器的反指紋辨識瀏覽器技術。 它由 Tor Porject 開發並由 [Mullvad](vpn.md#mullvad)發佈,且不需要使用 Mullvad 的 VPN。 [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ schema: -與 [Tor 瀏覽器](tor.md)一樣, Mullvad 瀏覽器旨在把 Mullvad 瀏覽器用戶的識別指紋弄得一樣,來防止指紋識別,它還包含預設安全級別自動配置的設置和擴展: *標準*, *更安全* 和 *最安全*。 因此,除了調整預設的 [安全等級](https://tb-manual.torproject.org/security-settings/)之外,您絕對不要修改瀏覽器。 其他修改將使您的指紋獨一無二,破壞使用此瀏覽器的目的。 如果您想重度配置瀏覽器,並且指紋不是問題,則建議使用 [Firefox](#firefox) 。 +與 [Tor 瀏覽器](tor.md)一樣, Mullvad 瀏覽器旨在把 Mullvad 瀏覽器用戶的識別指紋弄得一樣,來防止指紋識別,它還包含預設安全級別自動配置的設置和擴展: *標準*, *更安全* 和 *最安全*。 Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). 其他修改將使您的指紋獨一無二,破壞使用此瀏覽器的目的。 如果您想重度配置瀏覽器,並且指紋不是問題,則建議使用 [Firefox](#firefox) 。 ### 防指印辨識 @@ -116,17 +116,17 @@ Mullvad Browser 將DuckDuckGo 設置為預設的 [搜索引擎](search-engines.m **Firefox** 提供強大的隱私設定,例如[Enhanced Tracking Protection](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop) ,可以幫助阻止各種[類型的追蹤](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks)。 [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
-Downloads "下載" +Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad Browser 將DuckDuckGo 設置為預設的 [搜索引擎](search-engines.m

Warning "警告"

-Firefox 在 Mozilla 網站的下載中包含一個獨特的[下載令牌](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0),並使用 Firefox 中的遙測技術傳送令牌。 [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/)的更新**不**包含該令牌。 +Firefox 在 Mozilla 網站的下載中包含一個獨特的[下載令牌](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0),並使用 Firefox 中的遙測技術傳送令牌。 The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Firefox 在 Mozilla 網站的下載中包含一個獨特的[下載令牌](https: ##### Firefox建議(僅限美國) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) 功能只限美國地區,其類似於搜尋建議。 我們建議停用此功能的原因與我們建議停用搜尋建議的原因相同。 如果您在 **地址欄** 標題下沒有看到這些選項,則表示您沒有新的體驗,可以忽略這些變更。 +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. 我們建議停用此功能的原因與我們建議停用搜尋建議的原因相同。 如果您在 **地址欄** 標題下沒有看到這些選項,則表示您沒有新的體驗,可以忽略這些變更。 - [ ] 取消勾選 **提供搜尋建議** - [ ] 取消勾選 **贊助商的建議** @@ -183,7 +183,7 @@ Firefox 在 Mozilla 網站的下載中包含一個獨特的[下載令牌](https: > Firefox 會傳送有關 Firefox 版本和語言的資料;裝置作業系統和硬體配置;記憶體、有關崩潰和錯誤的基本資訊;更新、安全瀏覽和啟動等自動化程序的結果。 當 Firefox 將資料傳送給我們時,您的IP位址會作為伺服器記錄的一部分暫時收集。 -此外, Firefox帳戶服務會收集 [一些技術資料](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts)。 如果有使用 Firefox 帳戶,可選擇退出: +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). 如果有使用 Firefox 帳戶,可選擇退出: 1. 在 accounts.firefox.com 開啟您的 [個人資料設定](https://accounts.firefox.com/settings#data-collection) 2. 取消勾選 **資料收集和使用** > **協助改善Firefox帳戶** @@ -204,7 +204,7 @@ Max Protection 強制使用 HTTPS 上的 DNS,如果 Firefox 無法連線到安 #### 同步 -[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) 可以在不同設備之間 E2EE 地傳輸同步瀏覽資料(訪問記錄與書籤等)。 +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. ### Arkenfox (進階) @@ -215,7 +215,7 @@ Max Protection 強制使用 HTTPS 上的 DNS,如果 Firefox 無法連線到安 -[Arkenfox 專案](https://github.com/arkenfox/user.js) 為 Firefox 提供一套完整的考量選項。 如果您 [決定](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) 使用Arkenfox ,則 [有幾個選項](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) 在主觀上嚴格而且可能導致某些網站無法正常運作- [可以輕鬆更改](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) 以滿足需求。 **強列建議**仔細看過他們完整的[維基頁wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox還支持 [容器](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users) 。 +[Arkenfox 專案](https://github.com/arkenfox/user.js) 為 Firefox 提供一套完整的考量選項。 如果您 [決定](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) 使用Arkenfox ,則 [有幾個選項](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) 在主觀上嚴格而且可能導致某些網站無法正常運作- [可以輕鬆更改](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) 以滿足需求。 **強列建議**仔細看過他們完整的[維基頁wiki](https://github.com/arkenfox/user.js/wiki). Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox的目標只是通過Canvas隨機化和Firefox內置的指紋阻力配置設置來阻止基本或天真的跟蹤腳本。 它並不打算讓您的瀏覽器與其他 Arkenfox 用戶的大量混在一起,那是 Mullvad 瀏覽器或 Tor瀏覽器的作法,也是阻止進階指紋跟蹤腳本的唯一方法。 請記住,您可以隨時使用多個瀏覽器,例如,您可以考慮將Firefox + Arkenfox 用於希望保持登錄或可以信任的幾個網站,而 Mullvad 瀏覽器則用於一般瀏覽。 @@ -225,23 +225,23 @@ Arkenfox的目標只是通過Canvas隨機化和Firefox內置的指紋阻力配 ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** 內建內容封鎖程式和[隱私權功能](https://brave.com/privacy-features/) ,其中許多功能預設已啟用。 +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave 建立在 Chromium 瀏覽器專案,因此令人感到熟悉並且具有最小的網站兼容性問題。 -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
-Downloads "下載" +Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -266,7 +266,7 @@ Brave 在官網的下載檔案中新增了 "[推廣碼](https://github.com/brave ##### Shields -Brave [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) 功能包含一些防指紋識別措施。 我們建議您在所有瀏覽的網頁上設定這些選項 [全局](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) 。 +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields 可以選擇根據需要依各網站情況降級,但我們建議預設以下內容: @@ -289,25 +289,23 @@ Brave 可在內部 `brave://adblock`頁面中選擇其他內容過濾器。 我 -1. 此選項提供的功能類似uBlock Origin 進階 [封鎖模式](https://github.com/gorhill/uBlock/wiki/Blocking-mode) 或 [NoScript](https://noscript.net/) 擴展。 +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. 若想在經常造訪的特定站點保持登入,則可以透過網址列中的盾牌圖示來為每個站點設定例外。 ##### 隐私和安全
-- [x] 選取 **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) -- [ ] 取消選取 **使用 Google 服務來推送訊息** -- [ ] 取消選取 **同意隱私防護的產品分析 (P3A)** -- [ ] 取消選取 **自動發送每日使用呼叫至 Brave** -- [ ] 取消選取 **自動傳送診斷報告** -- [ ] 取消選取 **使用 Tor 的私密視窗** (1) - - !!! +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Use Google services for push messaging** +- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** +- [ ] Uncheck **Automatically send daily usage ping to Brave** +- [ ] Uncheck **Automatically send diagnostic reports** +- [ ] Uncheck **Private window with Tor** (1)
-1. Brave在瀏覽器指紋識別的抵抗力是 **不如** Tor 瀏覽器,且BraveTor 使用者少,容易被突出。 如果需要 [強大的匿名性](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) ,請使用 [Tor瀏覽器](tor.md#tor-browser)。 +1. Brave在瀏覽器指紋識別的抵抗力是 **不如** Tor 瀏覽器,且BraveTor 使用者少,容易被突出。 Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

關閉時消毒

@@ -344,7 +342,7 @@ Brave Web3 功能可能會增加瀏覽器指紋和攻擊面。 除非有用到 #### 同步 -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) 允許您在不同設備上訪問瀏覽數據(歷史記錄,書籤等),而無需帳戶且有 E2EE保護。 +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. #### 勇敢獎勵與錢包 @@ -370,9 +368,9 @@ Brave Web3 功能可能會增加瀏覽器指紋和攻擊面。 除非有用到 [:octicons-code-16:](https://github.com/gorhill/uBlock){ .card-link title="Source Code" }
-Downloads "下載" +Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -407,9 +405,9 @@ uBlock Origin 還有一個「Lite」版本,與原始版相比,其功能集 [:octicons-code-16:](https://github.com/gorhill/uBlock/tree/master/platform/mv3){ .card-link title="Source Code" }
-Downloads "下載" +Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -443,14 +441,14 @@ uBlock Origin Lite 僅在擴充功能從瀏覽器的附加元件市場更新時 - 適用於Linux、macOS和Windows。 - 為了使瀏覽器更尊重隱私權而作的任何變動都不應對用戶體驗產生負面影響。 - 預設情況下會封鎖第三方Cookie。 -- 支援 [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) 以降低跨站追蹤[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] ### 最佳案例 最佳案例標準代表了我們希望從這個類別的完美項目應具備的功能。 推薦產品可能沒有此功能,但若有這些功能則會讓排名更為提高。 - 包括內置的內容攔截功能。 -- 支持cookie分割(à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers))。 +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - 支援漸進式網絡應用程式 PWA 可讓您安裝某些網站,就像是電腦上的原生應用程式一樣。 這可能比安裝 Electron 應用程式更有優勢,因為您可以受益於瀏覽器定期安全更新。 - 不包括不影響用戶隱私的附加功能(bloatware)。 - 預設情況下不收集遙測。 @@ -463,4 +461,4 @@ uBlock Origin Lite 僅在擴充功能從瀏覽器的附加元件市場更新時 - 必須直接影響用戶隱私,即不得簡單地提供資訊。 [^1]: uBlock Origin Lite*本身*不會消耗任何資源,因為它使用更新的API,瀏覽器能夠本地處理過濾器列表,而不是在擴充功能中執行JavaScript 程式碼來處理過濾。 然而,這種資源優勢僅止於[理論](https://github.com/uBlockOrigin/uBOL-home/wiki/Frequently-asked-questions-(FAQ)#is-ubol-more-efficient-cpu--and-memory-wise-than-ubo),因為標準uBlock Origin 的過濾程式碼可能比瀏覽器的本機過濾程式碼更有效。 這尚未進行基準測試. -[^2]: Brave 執行細節在 [Brave 隱私政策更新: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). +[^2]: Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/zh-Hant/desktop.md b/i18n/zh-Hant/desktop.md index e94d2b35..cf55a9ea 100644 --- a/i18n/zh-Hant/desktop.md +++ b/i18n/zh-Hant/desktop.md @@ -17,17 +17,17 @@ cover: desktop.webp ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** 是我們推薦給Linux新手的發行版。 Fedora 通常較其他發行版更早採用較新技術,例如 [Wayland](https://wayland.freedesktop.org/) , [PipeWire](https://pipewire.org)。 這些新技術通常會在安全性、隱私性和可用性方面有所改善。 +**Fedora Workstation** 是我們推薦給Linux新手的發行版。 Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). 這些新技術通常會在安全性、隱私性和可用性方面有所改善。 -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora 有一個半滾動的發布週期。 雖然像 [GNOME](https://www.gnome.org) 這樣的套件在下一個Fedora發布之前會被凍結,但大多數套件(包括內核)在該版的整個生命週期中都會頻繁更新。 每個 Fedora 版本支持一年,每6個月發布新版本。 +Fedora 有一個半滾動的發布週期。 While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. 每個 Fedora 版本支持一年,每6個月發布新版本。 ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora 有一個半滾動的發布週期。 雖然像 [GNOME](https://www.gnome. **openSUSE Tumbleweed** 是一個穩定滾動發行版。 -openSUSE Tumbleweed 有一個 [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/)系統,使用 [Btrfs](https://en.wikipedia.org/wiki/Btrfs)和 [Snapper](https://en.opensuse.org/openSUSE: Snapper_Tutorial)來確保快照可以在出現問題時回滾。 +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed/){ .md-button .md-button--primary } -[:octicons-info-16:](https://doc.opensuse.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed 遵循滾動發佈模式,每個更新都是快照發布。 當您 **Arch Linux** 是一個輕量級的、自己動手(DIY)的發行版,意味著只能得到你安裝的東西。 如需更多資訊,請參閱他們的 [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions)。 -[:octicons-home-16: Homepage](https://archlinux.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://wiki.archlinux.org/){ .card-link title=Documentation} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ Arch Linux有一個滾動發佈週期。 沒有固定的發布時間表,套件 **Fedora Atomic Desktops** 是 Fedora 的變體,它使用「rpm-ostree」套件管理器,專注於容器化工作流程和桌面應用程式的 Flatpak。 這些變體版都遵循 Fedora Workstation 同樣的發佈時間表,受益於相同的快速更新並保持非常接近上遊。 -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -[Fedora Atomic Desktop](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) 有多種桌面環境風格可挑選,例如 **Fedora Silverblue**([GNOME](https://www.gnome.org/) 一起提供)、**Fedora Kinoite**(隨[KDE](https://kde.org/) 提供)、**Fedora Sway Atomic** > 或**Fedora Budgie Atomic**。 但不推薦最後一個,因為 Budgie 桌面環境[仍需要 X11](https://buddiesofbudgie.org/blog/wayland)。 +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. 但不推薦最後一個,因為 Budgie 桌面環境[仍需要 X11](https://buddiesofbudgie.org/blog/wayland)。 -這些作業系統與 Fedora Workstation 不同,它們用更高級方式替換了[DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) 套件 管理器,其叫作[`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/)。 `rpm-ostree` 套件管理器的工作原理是下載系統的基本映像,然後將套件覆蓋在類似 [git](https://en.wikipedia.org/wiki/Git)的提交樹中。 當系統更新時,會下載新的基本影像,並將疊加層應用於該新影像。 +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). `rpm-ostree` 套件管理器的工作原理是下載系統的基本映像,然後將套件覆蓋在類似 [git](https://en.wikipedia.org/wiki/Git)的提交樹中。 當系統更新時,會下載新的基本影像,並將疊加層應用於該新影像。 更新完成後,您將重新啟動系統進入新的部署。 `rpm-ostree` 保留系統的兩個部署,以便在新部署中出現故障時可以輕鬆回滾。 還可以根據需要固定更多部署。 -[Flatpak](https://www.flatpak.org) 是這些發行版本的主要套件安裝方式,而 `rpm-ostree` 只用在基礎映像上疊加那些無法留在容器的套件。 +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -作為 Flatpaks 替代品, [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/)可以建立 [Podman](https://podman.io) 容器,與主機系統共用主目與仿傳統 Fedora 環境。挑剔的開發者 [喜歡這個功能](https://containertoolbx.org)。 +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,7 +108,7 @@ Arch Linux有一個滾動發佈週期。 沒有固定的發布時間表,套件 NixOS 是基於 Nix套件管理器的獨立發行版,專注於可重複性和可靠性。 -[:octicons-home-16: Homepage](https://nixos.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } [:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} [:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix是一個基於源的套件管理器;如果二進位快取中沒有預先 **Whonix** 為基於 [Kicksecure](#kicksecure) 專注在安全的 Debian 分支系統。 它旨在提供網際網路的隱私、安全和匿名性。 Whonix 最好與 [Qubes OS](# qubes-os) 配合使用。 -[:octicons-home-16: Homepage](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=Documentation} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix是一個基於源的套件管理器;如果二進位快取中沒有預先 Whonix 運行兩個虛擬機器:一個“工作站”和一個 Tor “閘道”。 來自工作站的所有通訊都必須通過 Tor 閘道。 這意味著,即使工作站受到某種惡意軟體的破壞,真實的IP地址仍然隱藏。 -它的功能包括Tor 串流隔離、[擊鍵匿名](https://www.whonix.org/wiki/Keyrinkle_Deanonymization#Kloak)、[加密交換](https://github. com /Whonix/swap-file-creator),以及強化的記憶體分配器。 Whonix 未來版本可能包括 [完整系統 AppArmor](https://github.com/Whonix/apparmor-profile-everything) 和 [個沙盒應用程式啟動器](https://www.whonix.org/wiki/Sandbox-app-launcher) ,以完全限制系統上的所有進程。 +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix 最好[與 Qubes 結合使用](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers)。 我們 [曾建議](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring in conjunction with a VPN 在 Qubes 底下與 ProxyVM 一起設定 Whonix 以便能對 ISP 隱瞞 Tor 的活動狀況。 +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). 我們 [曾建議](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring in conjunction with a VPN 在 Qubes 底下與 ProxyVM 一起設定 Whonix 以便能對 ISP 隱瞞 Tor 的活動狀況。 ### Tails @@ -159,9 +159,9 @@ Whonix 最好[與 Qubes 結合使用](https://www.whonix.org/wiki/Qubes/Why_use_ **Tails** 是一個基於Debian 的自生作業系統,通過 Tor 路由所有通訊,透過 DVD , USB記憶棒或 SD卡安裝幾乎可在任何電腦上啟動。 它使用 [Tor](tor.md) 來保護隱私和匿名性,同時規避審查制度,並且使用的電腦在關閉電源後不會留下任何痕跡。 -[:octicons-home-16: Homepage](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=Documentation} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails 關閉後[不會抹除](https://gitlab.tails.boum.org/tails/tails/-/issues Tails Tor 瀏覽器預設包含 [uBlock Origin](desktop-browsers.md#ublock-origin) ,這可能會使對手更容易指紋識別 Tails 用戶。 [Whonix](desktop.md#whonix) 虛擬機器可能更為防洩漏may be more leak-proof, however they are not amnesic, ,但它沒有失憶功能,因此資料可以從儲存設備上進行恢復。 -設計上, Tails 每次重新啟動後意謂將完全重置。 加密 [永久存儲](https://tails.boum.org/doc/persistent_storage/index.en.html) 可以配置來存儲一些資料。 +設計上, Tails 每次重新啟動後意謂將完全重置。 Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## 以安全爲重點的發行版 @@ -190,12 +190,12 @@ Tails Tor 瀏覽器預設包含 [uBlock Origin](desktop-browsers.md#ublock-origi **Qubes OS** 是開源作業系統,利用安全的虛擬器為桌面運算提供更強的安全性 (或稱"qubes"). Qubes 基於 Xen, X Window 系統與 Linux。 大多數 Linux 應用它都可以執行且適用 Linux 驅動。 -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ Qubes OS 作業系統將子系統(例如網絡、USB等)和應用程式隔 **Kicksecure**—其簡化的介紹—可以說是一組腳本、置配與套件的組合,可大幅減少 Debian 的攻擊面。 它預設覆蓋了大量的隱私和加固建議。 它也是 [Whonix](#whonix) 的基礎作業系統。 -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/zh-Hant/device-integrity.md b/i18n/zh-Hant/device-integrity.md index 4184bc97..cf128e4e 100644 --- a/i18n/zh-Hant/device-integrity.md +++ b/i18n/zh-Hant/device-integrity.md @@ -26,7 +26,7 @@ These tools may provide utility for certain individuals. 它們提供了多數 如果以下任何工具表明可能有 Pegasus、Predator 或 KingsPawn 等間諜軟體危害,建議聯絡: -- 如果您是人權捍衛者、記者或來自民間團體:[國際特赦組織安全實驗室](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - 如果企業或政府設備受到威脅:請聯絡企業、部門或機構的相應安全聯絡員 - 本地執法單位 @@ -54,7 +54,7 @@ These tools may provide utility for certain individuals. 它們提供了多數 可靠且全面的數位鑑識支援和分類需要存取非公開指標、研究和威脅情報。 -可透過 [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) 或 [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/) 取得公民社會的此類支援。 +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools may provide utility for certain individuals. 它們提供了多數 ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) 是一組實用程式,可簡化和自動化掃描移動設備的過程,查找已知間諜軟體活動的潛在目標或感染痕跡。 MVT 由國際特赦組織開發,於 2021 年在 [Pegasus 專案](https://forbiddenstories.org/about-the-pegasus-project/) 背景下發布。 +**Mobile Verification Toolkit** (**MVT**) 是一組實用程式,可簡化和自動化掃描移動設備的過程,查找已知間諜軟體活動的潛在目標或感染痕跡。 MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads "下載" -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT 對掃描 iOS 裝置「最」有用。 Android 儲存可用於分類潛在 **iMazing** 為 iOS 裝置提供免費的間諜軟體分析工具,充當 [MVT](#mobile-verification-toolkit) 的圖形介面包裝器。 相比 MVT ,它更容易運行,前者是專為技術人員和法醫調查人員設計的命令列工具。 -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor 不像本頁的其他某些掃描/分析工具,而是使用裝置的 審核員使用**兩個**設備執行證明和入侵檢測,即一個_被審核者_(正在驗證的設備)和一個_審核員_(執行驗證的設備)。 審核者可以是任何Android 10+ 裝置(或由[GrapheneOS](android.md#grapheneos) 運行的遠端Web 服務),而受審核者必須是專門的[支援的裝置](https\://attestation.app /about #device-support)。 Auditor 適用於: -- 在_審核員_和_被審核者_之間使用 [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) 模式,雙方在兩人在[硬體支援的金鑰庫](https://source.android.com/security/keystore/)the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/)中建立 _審計員_私鑰。 +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - _審核員_可以是審核員應用程式的另一個實例,也可以是[遠端憑證服務](https://attestation.app)。 - _審計者_ 記錄 _審計對象_ 當前的狀態和配置。 - 如果在配對完成後發生篡改 審計對象的作業系統 ,審計人員將意識到設備狀態和配置的變化。 @@ -207,13 +207,13 @@ Auditor 不像本頁的其他某些掃描/分析工具,而是使用裝置的
Downloads "下載" -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia 特別擅長偵測常見的追蹤軟體:如果懷疑自己是追蹤軟體的受害者,請[造訪此頁面](https://stopstalkerware.org/information-for-survivors/) 尋求建議。 +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia 特別擅長偵測常見的追蹤軟體:如果懷疑自己是追蹤軟 **iVerify** 是一款 iOS 應用程式,會自動掃描裝置檢查配置設定、修補程式等級和其他安全性領域。 它還會檢查裝置是否有被越獄工具或間諜軟體(例如 Pegasus)入侵的跡象。 -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads "下載" -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/zh-Hant/dns.md b/i18n/zh-Hant/dns.md index 57cbab9b..4dbc10b9 100644 --- a/i18n/zh-Hant/dns.md +++ b/i18n/zh-Hant/dns.md @@ -11,14 +11,14 @@ cover: dns.webp ## 推薦的 DNS 提供商 -| DNS 提供者 | 隐私政策 | 協議 | 日誌記錄 | ECS | 篩選 | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------- | ------ | --- | ------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | 明文
DoH/3
DoT
DoQ
DNSCrypt | 一些[^1] | 是 | 根據個人配置。 使用的過濾器列表可以在這裡找到。 [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | 明文
DoH/3
DoT | 一些[^2] | 不是 | 根據個人配置。 | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | 明文
DoH/3
DoT
DoQ | 可選[^3] | 不是 | 根據個人配置。 | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | 否[^4] | 不是 | 根據個人配置。 正在使用的過濾器列表可以在這裡找到。 [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | 明文
DoH/3
DoT
DoQ | 可選[^5] | 可選的 | 根據個人配置。 | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | 明文
DoH
DoT
DNSCrypt | 一些[^6] | 可選的 | 根據個人設定,預設會封鎖惡意軟體。 | +| DNS 提供者 | 隐私政策 | 協議 | 日誌記錄 | ECS | 篩選 | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------- | ------ | --- | ------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | 明文
DoH/3
DoT
DoQ
DNSCrypt | 一些[^1] | 是 | 根據個人配置。 使用的過濾器列表可以在這裡找到。 [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | 明文
DoH/3
DoT | 一些[^2] | 不是 | 根據個人配置。 | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | 明文
DoH/3
DoT
DoQ | 可選[^3] | 不是 | 根據個人配置。 | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | 否[^4] | 不是 | 根據個人配置。 正在使用的過濾器列表可以在這裡找到。 [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | 明文
DoH/3
DoT
DoQ | 可選[^5] | 可選的 | 根據個人配置。 | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | 明文
DoH
DoT
DNSCrypt | 一些[^6] | 可選的 | 根據個人設定,預設會封鎖惡意軟體。 | ### 標準 @@ -50,7 +50,7 @@ Android 9 以上版本支持 DoT (DNS over TLS)。 設定方式可以在以下 #### 已簽署的設定檔 -Apple不提供用於建立加密DNS設定檔的原生介面。 [Secure DNS profile creator](https://dns.notjakob.com/tool.html) 是一款非正式工具用以建立您自己的加密 DNS 設定檔。不過這個軟體並未得到簽署。 最好是簽署過個人資設定檔;簽署會驗證個人資料的來源,並有助於確保個人資料的完整性。 綠色的「已驗證」標籤會提供給已簽署的配置文件。 代碼簽名的詳細資訊,請參閱 [關於代碼簽名](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html)。 由 [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html)、 [NextDNS](https://apple.nextdns.io)和 [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/)提供的**簽名設定檔** 。 +Apple不提供用於建立加密DNS設定檔的原生介面。 [Secure DNS profile creator](https://dns.notjakob.com/tool.html) 是一款非正式工具用以建立您自己的加密 DNS 設定檔。不過這個軟體並未得到簽署。 最好是簽署過個人資設定檔;簽署會驗證個人資料的來源,並有助於確保個人資料的完整性。 綠色的「已驗證」標籤會提供給已簽署的配置文件。 代碼簽名的詳細資訊,請參閱 [關於代碼簽名](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html)。 **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

資訊

@@ -74,7 +74,7 @@ Apple不提供用於建立加密DNS設定檔的原生介面。 [Secure DNS profi [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -123,9 +123,9 @@ Apple不提供用於建立加密DNS設定檔的原生介面。 [Secure DNS profi
-![AdGuard 首頁標誌](assets/img/dns/adguard-home.svg){ align=right } +![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard** 是一個開源的 [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) ,使用[DNS 過濾](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/) 來封鎖不需要的網頁內容,例如廣告。 +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard 首頁提供精美的網頁介面,可查看有用資訊並管理被封鎖的內容。 @@ -144,13 +144,13 @@ AdGuard 首頁提供精美的網頁介面,可查看有用資訊並管理被封 ![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole** 是一個開源的 [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole) ,它使用 [DNS 篩選](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/)來阻止不需要的網頁內容,例如廣告。 +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole 設計應用在 Raspberry Pi ,但它不限於這種硬體。 該軟體良好的 Web 界面,可查看有用資訊和管理被阻止的內容。 -[:octicons-home-16: Homepage](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } [:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute } @@ -159,8 +159,8 @@ Pi-hole 設計應用在 Raspberry Pi ,但它不限於這種硬體。 該軟體
[^1]: AdGuard 儲存其 DNS 伺服器的總和效能指標,即對特定伺服器的全部請求數量、被封鎖的請求數量,以及處理請求的速度。 他們還會保存和儲存過去24小時內所請求的網域資料庫。 我們需要這些資訊來識別和阻止新的追蹤器和威脅。 我們還記錄了這些追蹤器被封鎖的次數。 我們需要這些資訊以便在過濾器中刪除過時的規則。 [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare 僅收集並儲存發送至 1.1.1.1解析器的有限 DNS 查詢資料。 1.1.1.1解析器服務不會記錄個人資料,且大部分有限的非個人識別查詢資料僅存儲25小時。 [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare 僅收集並儲存發送至 1.1.1.1解析器的有限 DNS 查詢資料。 1.1.1.1解析器服務不會記錄個人資料,且大部分有限的非個人識別查詢資料僅存儲25小時。 [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D 只有記錄使用自定義 DNS 配置的高級解析器。 免費解析器不記錄數據。 [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad 的 DNS 服務可供 Mullvad VPN 的訂閱者和非訂閱者使用。 他們的隱私政策明確聲稱他們不會以任何方式記錄 DNS 請求。 [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad 的 DNS 服務可供 Mullvad VPN 的訂閱者和非訂閱者使用。 他們的隱私政策明確聲稱他們不會以任何方式記錄 DNS 請求。 [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. 您可以選擇保留的任何日誌選擇時間長短和日誌儲存位置。 如果沒有特別要求,則不會記錄任何數據。 [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9會收集一些資料,以進行威脅監控和回應。 然後這些資料會被重新混合與共享,例如用於安全研究。 Quad9 不會收集或記錄 IP 位址或其他他們認為可識別個人身份的資料。 [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9會收集一些資料,以進行威脅監控和回應。 然後這些資料會被重新混合與共享,例如用於安全研究。 Quad9 不會收集或記錄 IP 位址或其他他們認為可識別個人身份的資料。 [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/zh-Hant/email-clients.md b/i18n/zh-Hant/email-clients.md index 297c241a..1cd98a0d 100644 --- a/i18n/zh-Hant/email-clients.md +++ b/i18n/zh-Hant/email-clients.md @@ -28,17 +28,17 @@ OpenPGP 也不支援[前向保密](https://en.wikipedia.org/wiki/Forward_secrecy **Thunderbird** 是一個免費、開源、跨平臺的電子郵件、新聞組、新聞提要和聊天(XMPP、IRC、Matrix)客戶端,由Thunderbird 社區開發,之前由 Mozilla 基金會開發。 -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
-Downloads "下載" +Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ OpenPGP 也不支援[前向保密](https://en.wikipedia.org/wiki/Forward_secrecy **Apple Mail** 包含在 macOS,並可利用[GPG Suite](encryption.md#gpg-suite)擴展支援 OpenPGP,增加了發送PGP 加密電子郵件的能力。 [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation}
@@ -94,7 +94,7 @@ OpenPGP 也不支援[前向保密](https://en.wikipedia.org/wiki/Forward_secrecy [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads "下載" @@ -128,7 +128,7 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客 [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads "下載" @@ -146,13 +146,13 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客 ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** 是個人資訊管理應用程式,提供綜合郵件、行事曆和聯絡簿功能。 Evolution有廣泛的 [文檔](https://help.gnome.org/users/evolution/stable/)來幫助您開始。 +**Evolution** 是個人資訊管理應用程式,提供綜合郵件、行事曆和聯絡簿功能。 Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads "下載" @@ -175,7 +175,7 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客 [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads "下載" @@ -228,8 +228,8 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客 **Mailvelope** 是一個瀏覽器擴充功能,可按照 OpenPGP 加密標準交換加密電子郵件。 -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ Canary Mail 源碼為封閉式。 我們推薦它,因為 iOS 電子郵件客 NeoMutt 是一個文字指令的客戶端,具有陡峭的學習曲線。 然而,它有高度自制的特色。 [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads "下載" diff --git a/i18n/zh-Hant/email.md b/i18n/zh-Hant/email.md index 82045248..ac894834 100644 --- a/i18n/zh-Hant/email.md +++ b/i18n/zh-Hant/email.md @@ -52,10 +52,10 @@ OpenPGP 也不支持前向保密,這意味著如果你或收件人的私鑰被 [:octicons-code-16:](https://github.com/ProtonMail){ .card-link title="Source Code" }
-Downloads "下載" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ Proton Mail 的內容崩潰報告 **不會**對其它第三方分享。 可以 #### :material-check:{ .pg-green } Custom Domains and Aliases -付費的 Proton Mail 訂閱者可以使用自定網域服務或 [通用電子郵件](https://proton.me/support/catch-all) 功能。 Proton Mail還支持 [子地址](https://proton.me/support/creating-aliases),這對於不想購買網域的人很有用。 +付費的 Proton Mail 訂閱者可以使用自定網域服務或 [通用電子郵件](https://proton.me/support/catch-all) 功能。 Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } 私人付款方式 @@ -129,7 +129,7 @@ Proton Mail不提供數字遺產功能。 #### :material-check:{ .pg-green } Custom Domains and Aliases -Mailbox.org 可以使用自定網域,且支援 [通用電子郵件](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) 地址。 Mailbox.org 也支援 [子地址](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it),如果您不想購買網域,這很有用。 +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } 私人付款方式 @@ -137,17 +137,17 @@ Mailbox.org 不接受任何加密貨幣,因為他們的支付處理商 BitPay #### :material-check:{ .pg-green } 帳戶安全 -Mailbox.org支援 [雙因素驗證](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) ,僅適用於他們的網絡郵件。 您可以通過 [YubiCloud](https://www.yubico.com/products/services-software/yubicloud)使用TOTP或 [YubiKey](https://en.wikipedia.org/wiki/YubiKey) 。 Web 標準如 [WebAuthn ](https://en.wikipedia.org/wiki/WebAuthn) 尚不支援。 +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web 標準如 [WebAuthn ](https://en.wikipedia.org/wiki/WebAuthn) 尚不支援。 #### :material-information-outline:{ .pg-blue } 資料安全 -Mailbox.org 允許使用 [加密郵箱](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox)對傳入郵件進行加密。 收到的新訊息將立即用您的公鑰加密。 +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). 收到的新訊息將立即用您的公鑰加密。 -但是, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange)---- Mailbox.org使用的軟件平臺, [不支持](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) 通訊錄和行事曆加密。 [獨立的選項](calendar.md) 可能更適合該資訊。 +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. [獨立的選項](calendar.md) 可能更適合該資訊。 #### :material-check:{ .pg-green }電子郵件加密 -Mailbox.org在他們的網絡郵件中有 [個集成的加密](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) ,這簡化了向具有公開OpenPGP密鑰的人發送消息。 它們還允許 [遠端收件人解密 Mailbox.org伺服器上的電子郵件](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) 。 當遠端收件人沒有 OpenPGP 無法解密自己郵箱中的電子郵件時,此功能非常有用。 +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. 當遠端收件人沒有 OpenPGP 無法解密自己郵箱中的電子郵件時,此功能非常有用。 Mailbox.org 還支持通過 HTTP 的 [Web密鑰目錄( WKD )](https://wiki.gnupg.org/WKD)發現公鑰。 因此其它人可以輕鬆找到 Mailbox.org 帳戶的 OpenPGP 金鑰,便於跨提供者使用 E2EE。 這僅限於使用 Mailbox.org 自身網域(例如 @mailbox.org) 的電子郵件。 如果使用自定域名,則須另行 [設定WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) 。 @@ -157,9 +157,9 @@ Mailbox.org 還支持通過 HTTP 的 [Web密鑰目錄( WKD )](https://wiki.g #### :material-information-outline:{ .pg-blue } 額外功能 -您可以透過 IMAP/SMTP 使用其 [.onion 服務](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org)存取您的 Mailbox.org 帳戶。 然而,他們的網頁郵件介面無法訪問其 .onion 服務,可能會遇到 TLS 憑證錯誤。 +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). 然而,他們的網頁郵件介面無法訪問其 .onion 服務,可能會遇到 TLS 憑證錯誤。 -所有帳戶都附帶有限、[可以加密](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive)的雲端儲存空間 。 Mailbox.org 還提供別名 [@ secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely),它對郵件伺服器之間的連線強制進行TLS加密,否則根本不會發送訊息。 Mailbox.org 除了支援 IMAP 和 POP3 等標準存取通訊協議外,還支援 [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) 。 +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org 除了支援 IMAP 和 POP3 等標準存取通訊協議外,還支援 [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) 。 Mailbox.org 所有方案都提供了數位遺產功能。 你可以選擇是否要將任何資料傳遞給繼承人,但對方必須提出你的遺囑證明。 或者,您可以通過姓名和地址提出人選。 @@ -185,18 +185,18 @@ Mailbox.org 所有方案都提供了數位遺產功能。 你可以選擇是否 [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
-Downloads "下載" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta 不支援 [ IMAP 協議](https://tuta.com/faq/#imap) 或使用第三方 [ #### :material-check:{ .pg-green } Custom Domains and Aliases -付費的 Tuta 帳戶可使用 15 ~ 30 別名,而 [自定域名](https://tuta.com/faq#custom-domain)帳戶則無上限。 Tuta 不能 [子地址(加號 +定址)](https://tuta.com/faq#plus),但您可以使用自定義域名的 [通用電于郵件](https://tuta.com/howto#settings-global)功能 。 +付費的 Tuta 帳戶可使用 15 ~ 30 別名,而 [自定域名](https://tuta.com/faq#custom-domain)帳戶則無上限。 Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } 私人付款方式 @@ -232,7 +232,7 @@ Tuta [刪除六個月未登入使用的免費帳戶](https://tuta.com/faq#inacti Tuta 向非營利組織提供免費 [商業版本](https://tuta.com/blog/posts/secure-email-for-non-profit) 或大幅折扣。 -Tuta 付費版還有一種 [Secure Connect](https://tuta.com/secure-connect/)功能。 這可以確保客戶的業務聯繫使用 E2EE。 價格爲一年 € 240 歐元。 +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). 這可以確保客戶的業務聯繫使用 E2EE。 價格爲一年 € 240 歐元。 Tuta 不提供數位遺產功能。 @@ -280,18 +280,18 @@ Tuta 不提供數位遺產功能。 [:octicons-heart-16:](https://addy.io/donate){ .card-link title=Contribute }
-Downloads "下載" +Downloads - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-免費帳戶建立共用網域名(像 @addy.io ) 的數量為最多10個,月付1美元則可增加到 50 個別外,月付 4美元(或年繳則以3美元計) 則無數量限制。 付費帳戶可建立無數的標準別名如尾綴為 @[username].addy.io 或是自定域名。不過如前面提過,標準別名電郵並不利於隱私,因為只依據域名就可以簡單地把別名綁定起來。 當共用網域名服務封鎖此功能時,它就派得上用場了。 2023年9月 Securitum [通過addy.io 審查](https://addy.io/blog/addy-io-passes-independent-security-audit/) ,沒[發現重大的弱點缺失](https://addy.io/addy-io-security-audit.pdf)。 +免費帳戶建立共用網域名(像 @addy.io ) 的數量為最多10個,月付1美元則可增加到 50 個別外,月付 4美元(或年繳則以3美元計) 則無數量限制。 付費帳戶可建立無數的標準別名如尾綴為 @[username].addy.io 或是自定域名。不過如前面提過,標準別名電郵並不利於隱私,因為只依據域名就可以簡單地把別名綁定起來。 當共用網域名服務封鎖此功能時,它就派得上用場了。 Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). 值得注意的免費功能: @@ -310,26 +310,26 @@ Tuta 不提供數位遺產功能。 **SimpleLogin** 是一項免費服務,可在各種共享域名上提供電子郵件別名,並可選擇提供無限別名和自訂域名等付費功能。 [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
-Downloads "下載" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin 在 2022年4 月 8 日被 [ Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) 買下。 如果您的主要郵箱使用質子郵件, SimpleLogin是一個不錯的選擇。 由於這兩種產品現在都由同一家公司擁有,您現在只需要信任單一實體。 我們預計 SimpleLogin 未來會與 Proton 產品更緊密地整合。 SimpleLogin 繼續支援轉寄至您所選擇的任何電子郵件供應商。 Securitum [在2022年初審核了](https://simplelogin.io/blog/security-audit/) SimpleLogin ,所有問題 [都已解決](https://simplelogin.io/audit2022/web.pdf)。 +SimpleLogin 在 2022年4 月 8 日被 [ Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) 買下。 如果您的主要郵箱使用質子郵件, SimpleLogin是一個不錯的選擇。 由於這兩種產品現在都由同一家公司擁有,您現在只需要信任單一實體。 我們預計 SimpleLogin 未來會與 Proton 產品更緊密地整合。 SimpleLogin 繼續支援轉寄至您所選擇的任何電子郵件供應商。 Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). 您可以在設定中將您的 SimpleLogin 帳戶與 Proton 帳戶連結。 如果您有 Proton Unlimited 、Business 或 Visionary 計劃,也可免費獲得 SimpleLogin Premium。 @@ -352,9 +352,9 @@ SimpleLogin 在 2022年4 月 8 日被 [ Proton AG](https://proton.me/news/proto **Mailcow** 是一個更先進的郵件伺服器,非常適合有豐富 Linux 經驗者。 它的 Docke r容器中擁有您需要的一切:支援 DKIM 的郵件伺服器、防毒和垃圾郵件監控、具有SOGo 的 Webmail 和 ActiveSync ,以及具有2FA 支援的網頁管理介面。 [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ SimpleLogin 在 2022年4 月 8 日被 [ Proton AG](https://proton.me/news/proto 為了更清楚手動設定方法,我們挑選了這兩篇文章: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## 標準 @@ -386,7 +386,7 @@ SimpleLogin 在 2022年4 月 8 日被 [ Proton AG](https://proton.me/news/proto **最低合格要求:** - 使用零存取加密技術全程加密電子郵件帳戶資料。 -- 匯出功能為 [Mbox](https://en.wikipedia.org/wiki/Mbox) 或滙出符合 [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) 標準的個人.eml 格式。 +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - 允許使用者使用自己的 [網域名稱](https://en.wikipedia.org/wiki/Domain_name)。 自定網域名稱對用戶來說很重要,因為它允許用戶在使用服務時仍維持持自我代理,以防服務變差或被另一家不優先考慮隱私的公司收購。 - 在自有基礎設施上運作,即不建立在第三方電子郵件服務提供商之上。 @@ -397,7 +397,7 @@ SimpleLogin 在 2022年4 月 8 日被 [ Proton AG](https://proton.me/news/proto - 支援 [WKD](https://wiki.gnupg.org/WKD) ,以改善透過HTTP發現公開的OpenPGP金鑰。 GnuPG 使用者可以透過輸入: `gpg --locate-key example_user@example.com` 取得金鑰。 - 支援外部使用者的臨時信箱。 當您想要發送加密的電子郵件時,這非常有用,而無需將實際副本發送給您的收件人。 這些電子郵件通常具有限定時效,之後會被自動刪除。 它們也不需要收件人配置任何像OpenPGP這樣的加密技術。 - 可提供 [onion 服務](https://en.wikipedia.org/wiki/.onion)的電子郵件服務供應商。 -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) 支持. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - 為擁有自己網域的用戶提供通用地址或別名功能。 - 使用標準電子郵件存取協定,例如 IMAP、SMTP 或 [ JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol)。 標準存取協議確保客戶可以輕鬆下載所有電子郵件,一旦他們想切換到其它提供商。 @@ -425,13 +425,13 @@ SimpleLogin 在 2022年4 月 8 日被 [ Proton AG](https://proton.me/news/proto - 使用 2FA 保護網頁郵件,如TOTP。 - 無存取的靜態加密,如零存取加密。 提供者沒有其所持有資料的解密金鑰。 這可以防止流氓員工外洩所存取的資料或遠程對手通過獲得對伺服器的未經授權的訪問來竊取資料。 - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) 支持。 -- 使用 [Hardenize](https://www.hardenize.com/)、 [testssl.sh ](https://testssl.sh/)或 [ Qualys SSL Labs ](https://www.ssllabs.com/ssltest)等工具進行剖繪時,沒有TLS 錯誤或漏洞;這包括與憑證相關的錯誤和弱 DH參數,例如導致 [ Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)) 的錯誤。 +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - 伺服器套件偏好(在TLS v1.3上可選),適用於支持正向保密和已驗證加密的強大密碼套件。 - 有效的 [MTA-STS](https://tools.ietf.org/html/rfc8461) 和[TLS-RPT](https://tools.ietf.org/html/rfc8460) 政策。 - 有效 [ DANE ](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) 紀錄。 - 有效的 [SPF ](https://en.wikipedia.org/wiki/Sender_Policy_Framework) 和 [ DKIM ](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) 記錄。 - 擁有適當的 [DMARC ](https://en.wikipedia.org/wiki/DMARC) 記錄和原則,或使用 [ ARC ](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) 進行驗證。 如果正在使用 DMARC 驗證,則必須將原則設置為 `拒絕` 或 `隔離`。 -- 伺服器套件最好為 TLS 1.2或更高版本以及 [ RFC8996](https://datatracker.ietf.org/doc/rfc8996/)計劃。 +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - 假設使用SMTP,[SMTPS](https://en.wikipedia.org/wiki/SMTPS) 提交。 - 網站安全標準,例如: - [HTTP 嚴格傳輸安全性](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ SimpleLogin 在 2022年4 月 8 日被 [ Proton AG](https://proton.me/news/proto - 漏洞獎勵計劃和/或協調漏洞披露過程。 - 網站安全標準,例如: - [內容安全策略(CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### 信任 diff --git a/i18n/zh-Hant/encryption.md b/i18n/zh-Hant/encryption.md index 86006ba6..89d8ed22 100644 --- a/i18n/zh-Hant/encryption.md +++ b/i18n/zh-Hant/encryption.md @@ -22,15 +22,15 @@ cover: encryption.webp [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
-Downloads "下載" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator 使用 AES-256 加密來加密檔案和檔案名稱。 Cryptomator 一些 Cryptomator 加密程式庫 [已被Cure53審核](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) 。 稽核程式庫的範圍包括: [cryptolib](https://github.com/cryptomator/cryptolib)、 [cryptofs](https://github.com/cryptomator/cryptofs)、 [siv-mode](https://github.com/cryptomator/siv-mode) 和 [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor)。 審計並未包含[cryptolib-swift](https://github.com/cryptomator/cryptolib-swift)它是 Cryptomator 運用在 iOS 程式庫。 -Cryptomator 詳細介紹了其預期的 [安全目標](https://docs.cryptomator.org/en/latest/security/security-target/)、[安全架構](https://docs.cryptomator.org/en/latest/security/architecture/)和 [最佳實踐](https://docs.cryptomator.org/en/latest/security/best-practices/) ,以進一步詳細使用。 +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (檔案) @@ -81,15 +81,15 @@ Cryptomator 詳細介紹了其預期的 [安全目標](https://docs.cryptomator [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
-Downloads "下載" +Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -114,15 +114,15 @@ VeraCrypt< /a> ,因為它們提供了額外的靈活性避免供應商鎖定 ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** 是 Microsoft Windows 捆綁的全磁區加密解決方案。 我們推薦利用它加密開機設備,因為其[使用 TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). 鑑證公司 ElcomSoft 曾撰寫過此功能的相關介紹 [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** 是 Microsoft Windows 捆綁的全磁區加密解決方案。 The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) Windows 專業版、企業版和教育版。 它可以在家庭版上啓用,只要符合先決條件。 +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. 它可以在家庭版上啓用,只要符合先決條件。
Windows Home上啓用BitLocker @@ -145,7 +145,7 @@ BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device ``` -3. 訪問[進階啟動選項](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). 重新啟動時需要在 Windows 啟動前按下F8 鍵,然後進入 *命令提示符* in **疑難排解** → **進階選項** → **命令提示符**。 +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). 重新啟動時需要在 Windows 啟動前按下F8 鍵,然後進入 *命令提示符* in **疑難排解** → **進階選項** → **命令提示符**。 4. 使用管理員帳戶登入並在命令提示符中輸入指令以開始加密: @@ -204,7 +204,7 @@ BitLocker [僅支援](https://support.microsoft.com/en-us/windows/turn-on-device [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -258,20 +258,20 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** 是一個免費的開源文件加密和簽名工具,利用現代安全的加密算法。 它旨在成為更好版本的 [age](https://github.com/FiloSottile/age)和 [Minisign](https://jedisct1.github.io/minisign/),提供一個簡單,更容易的 GPG 替代品。 +**Kryptor** 是一個免費的開源文件加密和簽名工具,利用現代安全的加密算法。 It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
-Downloads "下載" +Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -285,10 +285,10 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im **Tomb** 是 LUKS 的命令行 shell 包裝器。 它通過 [第三方工具](https://github.com/dyne/Tomb#how-does-it-work) 支持隱寫。 -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute } @@ -298,12 +298,16 @@ cryptsetup luksHeaderBackup /dev/device --header-backup-file /mnt/backup/file.im OpenPGP 有時需要執行特定任務,例如數位簽署和加密電子郵件。 PGP具有許多功能,但也有爭議 [複數](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) ,因為它已經存在了很長時間。 對於簽署或加密檔案等任務,我們建議您使用上述選項。 -使用 PGP 加密時,您可以選擇在 `gpg.conf` 檔案中設定不同的選項。 我們建議您繼續使用 [ GnuPG 用戶常見問題集](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf)中指定的標準選項。 +使用 PGP 加密時,您可以選擇在 `gpg.conf` 檔案中設定不同的選項。 We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

在生成金鑰時使用未來的預設值

-[製作金鑰](https://www.gnupg.org/gph/en/manual/c14.html)時,建議使用`future-default` 指令,它將指示 GnuPG 使用現代密碼學,例如[Curve25519]( https://en.wikipedia.org/wiki/Curve25519#History)及[Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): + +```bash +gpg --quick-gen-key alice@example.com future-default +```
@@ -313,7 +317,7 @@ OpenPGP 有時需要執行特定任務,例如數位簽署和加密電子郵件 ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** 是 GPL授權的加密軟體 PGP 替代品。 GnuPG 符合 [RFC 4880](https://tools.ietf.org/html/rfc4880) ,這是目前 OpenPGP 的 IETF 規範。 GnuPG 專案一直致力於 [更新](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) ,試圖現代化OpenPGP。 GnuPG 是自由軟體基金會GNU 軟體項目的一部分,並已收到德國政府的重大 [資助](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html)。 +**GnuPG** 是 GPL授權的加密軟體 PGP 替代品。 GnuPG 符合 [RFC 4880](https://tools.ietf.org/html/rfc4880) ,這是目前 OpenPGP 的 IETF 規範。 The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG 是自由軟體基金會GNU 軟體項目的一部分,並已收到德國政府的重大 [資助](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html)。 [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -392,11 +396,11 @@ OpenPGP 有時需要執行特定任務,例如數位簽署和加密電子郵件 ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** 是 GnuPG 的Android 實作。 郵件客戶端通常需要它,例如 [K-9 Mail](email-clients.md#k-9-mail) 和 [FairEmail](email-clients.md#fairemail) 以及其他 Android 應用程序提供加密支持。 Cure53 於2015年10月完成了 OpenKeychain 3.6 的 [安全審核](https://www.openkeychain.org/openkeychain-3-6)。 審核 OpenKeychain 方案的 [技術細節在此](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015)。 +**OpenKeychain** 是 GnuPG 的Android 實作。 郵件客戶端通常需要它,例如 [K-9 Mail](email-clients.md#k-9-mail) 和 [FairEmail](email-clients.md#fairemail) 以及其他 Android 應用程序提供加密支持。 Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. 審核 OpenKeychain 方案的 [技術細節在此](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015)。 -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/zh-Hant/file-sharing.md b/i18n/zh-Hant/file-sharing.md index c7d7b0ef..8cb493c1 100644 --- a/i18n/zh-Hant/file-sharing.md +++ b/i18n/zh-Hant/file-sharing.md @@ -15,7 +15,7 @@ cover: file-sharing.webp ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** 是分支自 Mozilla 已停止的 Firefox Send服務,它允許您使用鏈接將檔案發送給其他人。 檔案在您的裝置上已加密,因此無法被伺服器讀取,並且它們也可以選擇受密碼保護。 Send 維護者託管 [公共實例](https://send.vis.ee/)。 你可以利用其他公開實例,也可以自行託管 Send。 +**Send** 是分支自 Mozilla 已停止的 Firefox Send服務,它允許您使用鏈接將檔案發送給其他人。 檔案在您的裝置上已加密,因此無法被伺服器讀取,並且它們也可以選擇受密碼保護。 The maintainer of Send hosts a [public instance](https://send.vis.ee). 你可以利用其他公開實例,也可以自行託管 Send。 [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ ffsend upload --host https://send.vis.ee/ FILE [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ ffsend upload --host https://send.vis.ee/ FILE [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads "下載" @@ -137,16 +137,16 @@ ffsend upload --host https://send.vis.ee/ FILE [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
-Downloads "下載" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/zh-Hant/financial-services.md b/i18n/zh-Hant/financial-services.md index b3544a7f..7e34651e 100644 --- a/i18n/zh-Hant/financial-services.md +++ b/i18n/zh-Hant/financial-services.md @@ -30,7 +30,7 @@ cover: financial-services.webp [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com 預設情況下將您購買的商家資訊提供給您的銀行。 **MySudo** 根據您購買的方案最多提供 9張虛擬卡。 付費方案還包括一些有助於私密購物的功能,例如虛擬電話號碼和電子郵件地址,但我們通常建議使用專業 [電子郵件別名提供商](email.md)進行廣泛的別名使用保護。 -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation} @@ -83,9 +83,9 @@ MySudo 虛擬卡目前只能在其 iOS應用上使用。 **CoinCards** (美國和加拿大提供)允許您為各種商家購買禮品卡。 -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation} diff --git a/i18n/zh-Hant/frontends.md b/i18n/zh-Hant/frontends.md index f54ccd29..8497b169 100644 --- a/i18n/zh-Hant/frontends.md +++ b/i18n/zh-Hant/frontends.md @@ -19,7 +19,7 @@ cover: frontends.webp ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** 是 [TikTok](https://www.tiktok.com)網站的開源前端,也可自主託管。 +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T

Warning "警告"

-使用 FreeTube 時,IP 位址可能會被 YouTube、[Invidious](https://instances.invidious.io)或 [SponsorBlock](https://sponsor.ajay.app/) 所知,具體取決於您的設定。 Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T **Yattee** 是一款免費的開源隱私導向影片播放器,適用於iOS、tvOS 和 macOS 觀看 [YouTube](https://youtube.com)。 使用 Yattee 時,訂閱清單和播放列表會儲存在 本地裝置上。 -由於 App Store 限制,您需要採取一些[額外步驟](https://gonzoknows.com/posts/Yattee/) 才能使用 Yattee 觀看YouTube。 +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ ProxiTok is useful if you want to disable JavaScript in your browser, such as [T

Warning "警告"

-使用 Yattee 時,IP位址可能仍會被 YouTube、 [Invidious](https://instances.invidious.io)、 [Piped](https://github.com/TeamPiped/Piped/wiki/Instances)或 [SponsorBlock](https://sponsor.ajay.app/)所知曉,具體取決於您的設定。 Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube 可將訂閱列表和播放列表存儲於 Android 設備,或者存

Warning "警告"

-使用 LibreTube 時,IP 位址會為所用的 [Piped](https://github.com/TeamPiped/Piped/wiki/Instances)實例和 [SponsorBlock](https://sponsor.ajay.app/)看見,具體取決於您的設定。 Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ LibreTube 可將訂閱列表和播放列表存儲於 Android 設備,或者存 ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** 是 [YouTube](https://youtube.com)、 [SoundCloud](https://soundcloud.com)、 [media.ccc.de](https://media.ccc.de)、 [Bandcamp](https://bandcamp.com)和 [PeerTube](https://joinpeertube.org/) (1)的免費開源 Android應用程式。 +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). 訂閱清單和播放列表會儲存在本地的 Android裝置。 [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ LibreTube 可將訂閱列表和播放列表存儲於 Android 設備,或者存 -1. 預設實例為 [FramaTube](https://framatube.org/),但可在 **Settings** → **Content** → **PeerTube instance ** 添加更多實例。 +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

Warning "警告"

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped 需要JavaScript 才能運行,它有許多公共實例。 [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/zh-Hant/index.md b/i18n/zh-Hant/index.md index 53688b82..3a85d72a 100644 --- a/i18n/zh-Hant/index.md +++ b/i18n/zh-Hant/index.md @@ -62,12 +62,12 @@ schema: ## 我们需要你! 參與方式如下: -[:simple-discourse:](https://discuss.privacyguides.net/){title = "加入我們的論壇"} -[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){rel = me title = "關注我們的Mastodon"} -[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){title = "提供貢獻"} -[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){title = "幫助網站翻譯"} -[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){title = "在Matrix上與我們聊天"} -[:material-information-outline:](about/index.md){title = "更了解我們"} -[:material-hand-coin-outline:](about/donate.md){title = "支持本項目"} +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } +[:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } +[:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } +[:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } +[:simple-matrix:](https://matrix.to/#/#privacyguides:matrix.org){ title="Chat with us on Matrix" } +[:material-information-outline:](about/index.md){ title="Learn more about us" } +[:material-hand-coin-outline:](about/donate.md){ title="Support the project" } 像 Privacy Guides 這類網站必須維持最新狀態。 我們需要觀眾留意網站上列出的應用程式的軟體更新,並掌握推薦供應商的最新消息。 跟上互聯網快速變化並不容易,但我們盡力而為。 如果您發現錯誤、認為不應該列出提供商、注意到沒列上的適格提供商、認為瀏覽器附加元件不再是最佳選擇或發現任何其他問題,請告訴我們。 diff --git a/i18n/zh-Hant/kb-archive.md b/i18n/zh-Hant/kb-archive.md index 3acaff43..6722c372 100644 --- a/i18n/zh-Hant/kb-archive.md +++ b/i18n/zh-Hant/kb-archive.md @@ -8,10 +8,10 @@ description: 一些曾經出現在知識庫中的頁面現在可以在我們的 一些曾經出現在知識庫中的頁面現在可以在我們的部落格上找到。 -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/zh-Hant/meta/admonitions.md b/i18n/zh-Hant/meta/admonitions.md index fd0d4de5..1915273b 100644 --- a/i18n/zh-Hant/meta/admonitions.md +++ b/i18n/zh-Hant/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** 是一個管理照片的自架平台。 它支援相簿同步和共享以及各種其他[功能](https://www.photoprism.app/features)。 它不包括 E2EE,因此最好將其託管在信任且能控制的伺服器上。 +**PhotoPrism** 是一個管理照片的自架平台。 It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). 它不包括 E2EE,因此最好將其託管在信任且能控制的伺服器上。 -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads "下載" - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/zh-Hant/meta/translations.md b/i18n/zh-Hant/meta/translations.md index c36b6a80..81985269 100644 --- a/i18n/zh-Hant/meta/translations.md +++ b/i18n/zh-Hant/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/zh-Hant/meta/uploading-images.md b/i18n/zh-Hant/meta/uploading-images.md index e5871745..a2ba5392 100644 --- a/i18n/zh-Hant/meta/uploading-images.md +++ b/i18n/zh-Hant/meta/uploading-images.md @@ -17,7 +17,7 @@ title: 上傳圖片 ### PNG -使用 [OptiPNG](https://sourceforge.net/projects/optipng/) 來優化PNG影像: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/zh-Hant/meta/writing-style.md b/i18n/zh-Hant/meta/writing-style.md index 0020bf42..04ba81af 100644 --- a/i18n/zh-Hant/meta/writing-style.md +++ b/i18n/zh-Hant/meta/writing-style.md @@ -4,11 +4,11 @@ title: 撰寫風格 Privacy Guides 以美式英語書寫,如有疑問,請參閱 [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) 。 -一般而言, [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) 提供了如何寫得清晰簡潔的良好概述。 我們在下方強調這些準則中的幾個重要提示。 +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. 我們在下方強調這些準則中的幾個重要提示。 ## 為我們的觀眾寫作 -Privacy Guides 預設的 [讀者群](https://www.plainlanguage.gov/guidelines/audience/) 為一般普遍程度技術使用的成年人。 不要愚蠢的內容,像是跟中學班級學生說明,不要過度使用一般電腦用戶不熟悉的概念與複雜術語。 +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. 不要愚蠢的內容,像是跟中學班級學生說明,不要過度使用一般電腦用戶不熟悉的概念與複雜術語。 ### 只探討人們想知道的內容 @@ -24,7 +24,7 @@ Privacy Guides 預設的 [讀者群](https://www.plainlanguage.gov/guidelines/au > > 當你用“你”來稱呼用戶時,他們更有可能理解他們的責任是什麼。 -來源: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### 避免“用戶” @@ -37,7 +37,7 @@ Privacy Guides 預設的 [讀者群](https://www.plainlanguage.gov/guidelines/au - 將文件限制在五或六個部分左右。 很長的文件應該分成不同的頁面。 - 用 **粗體** 或 *斜體*來標記重要的想法。 -來源: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### 以主題句開頭 @@ -45,7 +45,7 @@ Privacy Guides 預設的 [讀者群](https://www.plainlanguage.gov/guidelines/au > > 我們常按照自己的想法寫作,先是前提,然後結論。 這可能是發展思想的自然方式,以主題句作為以段落最後的結束。 把它放在前面,讓讀者知道要去哪裡。 進入正題之前,先別讓讀者腦子裝入過多資訊。 -出處: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## 謹選擇用字 @@ -65,7 +65,7 @@ Privacy Guides 預設的 [讀者群](https://www.plainlanguage.gov/guidelines/au > 沒必要的文字將會浪費大家的時間。 好的寫作就像生活對話。 減除讀者無須知道的資訊。 在意主題的專家不容易處理此事,所以若有審計者角度來看待資訊就很重要。 -來源: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## 保持文字像在交談 @@ -77,7 +77,7 @@ Privacy Guides 預設的 [讀者群](https://www.plainlanguage.gov/guidelines/au > 主動語調讓主詞與行動更為明確。 它可減少責任不清的情況 不用被動式,請用主動語氣。 -出處: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### "必須"表示要求 for requirements diff --git a/i18n/zh-Hant/mobile-browsers.md b/i18n/zh-Hant/mobile-browsers.md index a5129810..51f8b445 100644 --- a/i18n/zh-Hant/mobile-browsers.md +++ b/i18n/zh-Hant/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,7 +41,7 @@ schema: ## 安卓 -在安卓系統上, Firefox 仍然不如基於 Chromium 的替代品安全: Mozilla 的引擎 [GeckoView](https://mozilla.github.io/geckoview/)尚未支持 [站點隔離](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) 或啟用 [隔離流程](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196)。 +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave @@ -49,14 +49,14 @@ schema: ![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave Browser** 內建內容封鎖程式和[隱私權功能](https://brave.com/privacy-features/) ,其中許多功能預設已啟用。 +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave 建立在 Chromium 瀏覽器專案,因此令人感到熟悉並且具有最小的網站兼容性問題。 -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ Tor 瀏覽器是真正匿名瀏覽網際網路的唯一途徑。 當您使用Bra ##### Shields -Brave [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) 功能包含一些防指紋識別措施。 我們建議您在所有瀏覽的網頁上設定這些選項 [全局](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-) 。 +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave屏蔽全局默認值 @@ -100,7 +100,7 @@ Brave 可在內部 `brave://adblock`頁面中選擇其他內容過濾器。 我 -1. 此選項提供的功能類似uBlock Origin 進階 [封鎖模式](https://github.com/gorhill/uBlock/wiki/Blocking-mode) 或 [NoScript](https://noscript.net/) 擴展。 +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### 清除瀏覽資料 @@ -114,13 +114,13 @@ Brave 可在內部 `brave://adblock`頁面中選擇其他內容過濾器。 我
-- [x] 選擇 **在[WebRTC IP處理政策](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc)** -- []取消勾選 **允許網站檢查您是否儲存了付款方式** -- []取消勾選 **IPFS閘道** (1) -- [x] 選擇 **關閉出口標籤** -- [ ] 取消勾選**允許隱私保護產品分析(P3A)** -- [ ] 取消勾選 **自動發送診斷報告** -- [ ] 取消勾選 **自動發送每日使用情況給Brave** +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) +- [ ] Uncheck **Allow sites to check if you have payment methods saved** +- [ ] Uncheck **IPFS Gateway** (1) +- [x] Select **Close tabs on exit** +- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** +- [ ] Uncheck **Automatically send diagnostic reports** +- [ ] Uncheck **Automatically send daily usage ping to Brave**
@@ -128,7 +128,7 @@ Brave 可在內部 `brave://adblock`頁面中選擇其他內容過濾器。 我 #### Brave 同步 -[Brave Sync](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) 允許您在不同設備上訪問瀏覽數據(歷史記錄,書籤等),而無需帳戶且有 E2EE保護。 +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -140,10 +140,10 @@ Brave 可在內部 `brave://adblock`頁面中選擇其他內容過濾器。 我 ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** 是iOS 預設瀏覽器。 它包括[隱私功能](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0),例如[預防智慧追蹤](https://webkit .org/blog/7675/intelligent-tracking-prevention/)、隱私權報告、獨立且短暫的私密瀏覽標籤、iCloud 私密中繼、透過隨機化向網站呈現系統配置的簡化版以實現指紋保護,讓更多設備看起來差不多一樣,使用生物識別資訊/PIN 鎖定私人標籤的能力。 它可以使用不同的配置檔來分開瀏覽。 +**Safari** 是iOS 預設瀏覽器。 It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. 它可以使用不同的配置檔來分開瀏覽。 -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -184,7 +184,7 @@ Brave 可在內部 `brave://adblock`頁面中選擇其他內容過濾器。 我 - [ ] 禁用 **隱私保留廣告計量** -廣告點擊測量是過去用來追蹤侵犯用戶隱私的技術。 [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) 是一個 WebKit 功能和提議的網頁標準,旨在允許廣告商在不影響用戶隱私的情況下衡量網站活動的有效性。 +廣告點擊測量是過去用來追蹤侵犯用戶隱私的技術。 [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. 此功能本身沒有什麼隱私疑慮,因此您可以選擇不管它,但我們認為,它在私密瀏覽中自動停用反而顯示出功能被關閉的情況。 @@ -200,9 +200,9 @@ Safari的私人瀏覽模式提供額外的隱私保護。 隱私瀏覽每個標 ##### iCloud 同步 -Safari 歷史記錄、標籤組、iCloud 標籤分頁和保存密碼的同步都是 E2EE。 但默認情況下,書籤[不是](https://support.apple.com/en-us/HT202303)。 Apple可以根據其 [隱私權政策](https://www.apple.com/legal/privacy/en-ww/)解密並存取它們。 +Safari 歷史記錄、標籤組、iCloud 標籤分頁和保存密碼的同步都是 E2EE。 However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -您可以為Safari 書籤和下載啟用 E2EE ,只需啟用 [Advanced Data Protection](https://support.apple.com/en-us/HT212520)即可。 請在 **Apple ID name → iCloud → 進階資料保護**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). 請在 **Apple ID name → iCloud → 進階資料保護**. - [x] 開啟 **進階資料保護** @@ -224,9 +224,9 @@ iOS 版 AdGuard 有一些高級功能;然而,標準Safari 內容封鎖是免 [:octicons-code-16:](https://github.com/AdguardTeam/AdguardForiOS){ .card-link title="Source Code" }
-Downloads "下載" +Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/zh-Hant/multi-factor-authentication.md b/i18n/zh-Hant/multi-factor-authentication.md index 0f5649de..d397ded4 100644 --- a/i18n/zh-Hant/multi-factor-authentication.md +++ b/i18n/zh-Hant/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -**YubiKeys** 是最常用的安全金鑰之一。 有些 YubiKey 型號具廣泛的功能,例如: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor)、[FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online)、[Yubico OTP](basics/multi-factor-authentication.md#yubico-otp)、[Personal Identity Verification (PIV)](https://developers.yubico.com/PIV)、 [OpenPGP](https://developers.yubico.com/PGP/)、[TOTP and HOTP](https://developers.yubico.com/OATH)驗證。 +**YubiKeys** 是最常用的安全金鑰之一。 Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -YubiKey 好處之一是,一支密鑰( 例如 YubiKey 5 )可以滿足對安全密鑰硬體的全部期待。 我們建議您在購買前先 [作個小測驗](https://www.yubico.com/quiz/) ,以確保您做出正確的選擇。 +YubiKey 好處之一是,一支密鑰( 例如 YubiKey 5 )可以滿足對安全密鑰硬體的全部期待。 We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-[比較表](https://www.yubico.com/store/compare/) 顯示了各型號 YubiKeys 功能比較。 我們強烈建議您從YubiKey 5系列中挑選。 +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. 我們強烈建議您從YubiKey 5系列中挑選。 -YubiKeys可以利用 [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) 或 [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/)來收授指令。 若要管理 TOTP 代碼,您可以使用 [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)。 Yubico 所有客戶端軟體都是開源。 +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). Yubico 所有客戶端軟體都是開源。 支持 HOTP 和 TOTP 的機型, OTP 介面中有2個插槽可用於HOTP 和32個插槽來存儲 TOTP 機密。 這些機密經加密後存儲在密鑰上,永遠不會將它們暴露在插入的設備上。 一旦向 Yubico Authenticator 提供種子(共享祕密) ,它將只會給出六位數的代碼,但永遠不會提供種子。 此安全模型有助於限制攻擊者,即便運行 Yubico Authenticator的設備受到破壞,讓受到物理攻擊時 Yubikey 仍具抵抗力。 @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. 如果您想要 **Nitrokey** 能夠 [FIDO2 和 WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online)的安全金鑰,稱為 **Nitrokey FIDO2**。 若要獲得 PGP 支援,您需要購買他們其他鑰匙,例如 **Nitrokey Start**、**Nitrokey Pro 2** 或 **Nitrokey Storage 2**。 -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-[比較表](https://www.nitrokey.com/#comparison) 顯示了各型號 Nitrokey 功能比較。 **Nitrokey 3** 具有組合的功能集。 +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. **Nitrokey 3** 具有組合的功能集。 -可以使用 [Nitrokey 應用程序](https://www.nitrokey.com/download)配置 Nitrokey 模型。 +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). 支持 HOTP 和 TOTP 的型號,有3個 HOTP 插槽,15 個 TOTP 插槽。 有些 Nitrokeys 可以充當密碼管理器。 可以存儲 16 組憑證,並使用與 OpenPGP 接口相同的密碼對憑證加密。 @@ -74,7 +74,7 @@ The firmware of YubiKey is not open source and is not updatable. 如果您想要 -Nitrokey Pro 2、Nitrokey Storage 2 和即將推出的 Nitrokey 3 支持筆記型電腦的 [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) 軔體與系統完整性驗證。 +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. 不同於 YubiKey,Nitrokey 軔體是開源。 NitroKey 型號可( **NitroKey Pro 2**除外)可更新軔體。 @@ -127,7 +127,7 @@ Nitrokey Pro 2、Nitrokey Storage 2 和即將推出的 Nitrokey 3 支持筆記 Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ Nitrokey Pro 2、Nitrokey Storage 2 和即將推出的 Nitrokey 3 支持筆記 [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/zh-Hant/news-aggregators.md b/i18n/zh-Hant/news-aggregators.md index cee87cf7..f07a4b51 100644 --- a/i18n/zh-Hant/news-aggregators.md +++ b/i18n/zh-Hant/news-aggregators.md @@ -21,7 +21,7 @@ cover: news-aggregators.webp [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads "下載" @@ -83,7 +83,7 @@ cover: news-aggregators.webp [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ cover: news-aggregators.webp **NetNewsWire** 是一款免費開源的訊息源閱讀器,適用於macOS 和 iOS ,專注於原生設計和功能集。 它支持典型的Feed 格式與內置支持 Reddit Feed。 -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
-Downloads "下載" +Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit 允許您通過 RSS 訂閱 subreddits。 `[SUBREDDIT]` 替換成所欲訂閱的 subreddit. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -190,10 +190,10 @@ https://www.reddit.com/r/[SUBREDDIT]/new/.rss

Example "例子"

-欲透過 RSS 軟體訂閱 YouTube 頻,首先檢查該頻道的 [頻道代號](https://support.google.com/youtube/answer/6180214). 頻道代號可在其"關於"頁面找到,請到: **關於** > **分享** > **複製頻道 ID**. 替換下方的 `[CHANNEL ID]`: +欲透過 RSS 軟體訂閱 YouTube 頻,首先檢查該頻道的 [頻道代號](https://support.google.com/youtube/answer/6180214). 頻道代號可在其"關於"頁面找到,請到: **關於** > **分享** > **複製頻道 ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ```
diff --git a/i18n/zh-Hant/notebooks.md b/i18n/zh-Hant/notebooks.md index a91f38fb..8ac5c838 100644 --- a/i18n/zh-Hant/notebooks.md +++ b/i18n/zh-Hant/notebooks.md @@ -34,7 +34,7 @@ cover: notebooks.webp - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ cover: notebooks.webp ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. 其跨平台的端對端加密具備強大的同步功能以便輕易地携帶檔案文件。 You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. 其跨平台的端對端加密具備強大的同步功能以便輕易地携帶檔案文件。 You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ cover: notebooks.webp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook 僅允許使用其付費昇級方案使用本地筆記加密[私人保 **Joplin** 是一個免費、開源且功能齊全的筆記和待辦事項應用程式,可以處理大量 Markdown 文件並組織成筆記本和標籤功能。 它提供E2EE ,可以通過Nextcloud , Dropbox等同步。 它也可以輕鬆自 Evernote 和純文本筆記導入。 -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee 免費提供100MB 的儲存空間,如果需要更多容量,則另有 ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** 是GNU Emacs的 [主要模式](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html)。 Org-mode 用於記錄筆記,維護待辦事項列表,規劃項目以及使用快速有效的純文本系統撰寫文件。 可以利用 [檔案同步](file-sharing.md#file-sync) 工具進行同步。 +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode 用於記錄筆記,維護待辦事項列表,規劃項目以及使用快速有效的純文本系統撰寫文件。 可以利用 [檔案同步](file-sharing.md#file-sync) 工具進行同步。 [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/zh-Hant/os/android-overview.md b/i18n/zh-Hant/os/android-overview.md index 2ee63876..41a8e116 100644 --- a/i18n/zh-Hant/os/android-overview.md +++ b/i18n/zh-Hant/os/android-overview.md @@ -60,7 +60,7 @@ Verified Boot確保作業系統檔案的完整性,從而防止具有物理訪 韌體更新對於維護安全性至關重要,沒有它們,您的設備就無法安全。 OEM 與其合作夥伴簽訂了支援協議,在有限的支持期內提供封閉式元件。 詳情請參閱每月 [Android 安全公告](https://source.android.com/security/bulletin)。 -由於手機的元件(例如處理器和無線電技術)依賴於閉源元件,因此更新必須由各自的製造商提供。 因此,您的購買裝置必須在有效的支援週期內。 [高通](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) 和 [三星](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) 設備支援年限為 4年,而較便宜產品的支援週期通常更短。 隨著 [Pixel 6](https://support.google.com/pixelphone/answer/4457705)的推出, Google 現在製造自己的 SoC ,他們將提供至少 5年的支持。 隨著 Pixel 8 系列的推出,Google 將支援期限延長至 7 年。 +由於手機的元件(例如處理器和無線電技術)依賴於閉源元件,因此更新必須由各自的製造商提供。 因此,您的購買裝置必須在有效的支援週期內。 [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. 隨著 [Pixel 6](https://support.google.com/pixelphone/answer/4457705)的推出, Google 現在製造自己的 SoC ,他們將提供至少 5年的支持。 隨著 Pixel 8 系列的推出,Google 將支援期限延長至 7 年。 對於 OEM 供應商或市場經銷商不提供韌體更新的 EOL 裝置,SoC 製造商不再支援。 這意味著這些設備的安全問題將得不到解決。 @@ -100,19 +100,19 @@ Android 13: 應用程式可能會要求獲得特定功能的許可。 例如,任何可以掃描二維碼的應用程式都需要相機權限。 有些應用程式可能會要求超過所需的權限。 -[Exodus](https://exodus-privacy.eu.org/) 在比較具相似目的的應用程式時可能很有用。 如果某應用程式需要大量權限,並且有很多的廣告和分析,這可能是個壞跡象。 建議查看個別跟蹤器與閱讀其描述而不是只有**計算總數**把所列的項目一視同仁。 +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. 如果某應用程式需要大量權限,並且有很多的廣告和分析,這可能是個壞跡象。 建議查看個別跟蹤器與閱讀其描述而不是只有**計算總數**把所列的項目一視同仁。

Warning "警告"

-如果應用程式主要是基於網頁的服務,則跟蹤可能發生在伺服器端。 [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/)顯示「無追蹤器」,但確實會追蹤使用者在網站上的興趣和行為。 應用程式也許無需廣告業的標準代碼庫來逃避檢測,儘管這不太可能。 +如果應用程式主要是基於網頁的服務,則跟蹤可能發生在伺服器端。 [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. 應用程式也許無需廣告業的標準代碼庫來逃避檢測,儘管這不太可能。

Note

-[Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/)等隱私友好型應用程式可能會顯示 [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/)等追蹤程式。 此程式庫包括 [Firebase Cloud Messaging](https://zh.wikipedia.org/wiki/Firebase_Cloud_Messaging) ,可以在應用程式中提供 [推送通知](https://zh.wikipedia.org/wiki/Push_technology)。 這是Bitwarden的 [情況](https://fosstodon.org/ @ bitwarden/109636825700482007)。 這並不意味 Bitwarden 使用 Google Firebase Analytics 提供的所有分析功能。 +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). 此程式庫包括 [Firebase Cloud Messaging](https://zh.wikipedia.org/wiki/Firebase_Cloud_Messaging) ,可以在應用程式中提供 [推送通知](https://zh.wikipedia.org/wiki/Push_technology)。 這是Bitwarden的 [情況](https://fosstodon.org/ @ bitwarden/109636825700482007)。 這並不意味 Bitwarden 使用 Google Firebase Analytics 提供的所有分析功能。
@@ -160,21 +160,21 @@ Android 7以上版本支援VPN kill switch ,無需安裝第三方應用程式 ### 進階保護計劃 -如果有 Google 帳戶,建議註冊 [進階保護計劃](https://landing.google.com/advancedprotection/)。 任何擁有兩個或多個硬體安全金鑰且支援 [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) 都可免費使用。 +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). 任何擁有兩個或多個硬體安全金鑰且支援 [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) 都可免費使用。 進階防護計劃提供強化的威脅監控,並能夠: - 更嚴格的雙因素驗證;例如 **必須**使用 [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) ,禁用 [SMS OTP](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) 和 [OAuth](https://en.wikipedia.org/wiki/OAuth) - 只有Google 和經過驗證的第三方應用程式才能存取帳戶資料 - 掃描Gmail帳戶上的傳入電子郵件進行 [次網絡釣魚](https://en.wikipedia.org/wiki/Phishing#Email_phishing) 次嘗試 -- 使用 Google Chrome 進行更嚴格的 [安全瀏覽器掃描](https://www.google.com/chrome/privacy/whitepaper.html#malware) +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - 丟失憑的證帳戶予以更嚴格的恢復程序 - 如果您使用非沙盒 Google Play 服務(在庫存作業系統上很常見) ,進階保護計劃還附帶 [額外優惠](https://support.google.com/accounts/answer/9764949?hl=en) ,例如: + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - 不允許在Google Play 商店、作業系統供應商的應用程式商店之外安裝應用程式,或透過 [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge)安裝應用程式 -- 強制自動裝置掃描與 [播放保護](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - 警告您未經驗證的應用程式 @@ -189,7 +189,7 @@ Android 7以上版本支援VPN kill switch ,無需安裝第三方應用程式 ### 廣告識別碼 -所有安裝 Google Play 服務的裝置都會自動產生 [廣告ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) ,用於定向廣告。 禁用此功能以限制其收集您的資料。 +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. 禁用此功能以限制其收集您的資料。 在具有 [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play)的Android 版上,前往 :gear: **設定** → **應用程式** → **Sandboxed Google Play** → **Google 設定** → **廣告**,然後選擇 *刪除廣告ID*。 diff --git a/i18n/zh-Hant/os/ios-overview.md b/i18n/zh-Hant/os/ios-overview.md index 0f6acbd1..32ff66cc 100644 --- a/i18n/zh-Hant/os/ios-overview.md +++ b/i18n/zh-Hant/os/ios-overview.md @@ -22,7 +22,7 @@ IOS 上應用的唯一來源是 Apple App Store,需要 Apple ID 才能訪問 ### 侵入式遙測 -蘋果在 iOS 適當匿名遙測上常發生問題。 [2019 年](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings),Apple 被發現將 Siri 錄音(其中一些包含高度機密信息)傳輸回其伺服器,以供第三方承包商進行手動審核。 雖然這種做法被[廣泛報導](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech -microsoft-cortana)後他們暫時停止該計劃,但截至[ 2021 年](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance),此問題仍未完全解決。 +蘋果在 iOS 適當匿名遙測上常發生問題。 [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). 最近,人們發現 Apple [即使禁用分析共享, iOS 也會傳輸分析數據 ](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) ,儘管宣稱已匿名處理,這些數據[似乎](https://twitter.com/mysk_co/status/1594515229915979776)很容易連結到唯一的 iCloud 帳戶標識符。 @@ -54,7 +54,7 @@ Apple 產品的大多數隱私和安全問題與其雲服務有關,而不是 #### Find My -**Find My(尋找我的iPhone)** 是一項服務,可讓您跟踪您的 Apple 設備並與朋友和家人分享您的位置。 若設備遭竊,它可以讓您從遠端進行抺除,從而防止小偷訪問您的資料。 在下述情況,“尋找”功能的[位置資料是 E2EE](https://www.apple.com/legal/privacy/data/en/find-my/): +**Find My(尋找我的iPhone)** 是一項服務,可讓您跟踪您的 Apple 設備並與朋友和家人分享您的位置。 若設備遭竊,它可以讓您從遠端進行抺除,從而防止小偷訪問您的資料。 Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - 您的位置已與家人或朋友共享,並且都使用 iOS 15 或更高版本。 - 設備處於離線狀態,且由Find My 網路找到。 @@ -117,7 +117,7 @@ Apple 產品的大多數隱私和安全問題與其雲服務有關,而不是 在手機上設置強密碼是確保設備物理安全的最重要步驟。 您必須權衡安全性與便利性:每次輸入較長的密碼很麻煩,但較短的密碼或 PIN 碼很容易被猜到。 設置 Face ID 或 Touch ID 以及強密碼可以在可用性和安全性之間實現良好折衷。 -選擇 **打開 Passcode ** 或 **更改 Passcode** > **Passcode 選項** > **自定 字母數字密碼**. 確認有創建一組[安全密碼](https://www.privacyguides.org/basics/passwords-overview/)。 +選擇 **打開 Passcode ** 或 **更改 Passcode** > **Passcode 選項** > **自定 字母數字密碼**. Make sure that you create a [secure password](../basics/passwords-overview.md). 如果想使用 Face ID 或 Touch ID,可以立即進行設置。 您的手機將使用之前設置的密碼作為後備密碼,以防生物識別驗證失敗。 生物識別解鎖方法主要是便利,雖然它們確實可以阻止監控攝像頭或身旁的人看到您所輸入的密碼。 @@ -129,7 +129,7 @@ Apple 產品的大多數隱私和安全問題與其雲服務有關,而不是 - [x] 選擇**開啟保護** -啟用被盜資料保護後,[某些操作](https://support.apple.com/en-us/HT212510)將需要生物識別身份驗證,無需密碼回退(如果駭客准竊盜已獲得您的 PIN),例如使用密碼自動填寫功能就可訪問支付資訊並關閉遺失模式。 它還可以在住處或其他「熟悉位置」以外的地點執行的某些操作增加安全延遲,例如需要 1 小時計時器來重設 Apple ID 密碼或退出 Apple ID。 此延遲是為了有時間啟用遺失模式並在小偷重置設備前保護好您的帳戶。 +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. 它還可以在住處或其他「熟悉位置」以外的地點執行的某些操作增加安全延遲,例如需要 1 小時計時器來重設 Apple ID 密碼或退出 Apple ID。 此延遲是為了有時間啟用遺失模式並在小偷重置設備前保護好您的帳戶。 **鎖定時允許存取** 提供您在手機鎖定時可以允許的選項。 禁用的這些選項越多,沒有密碼者可做的事情就越少,但對您來說也就更不方便。 選擇不希望其他人接觸您的手機後訪問其中哪些內容。 @@ -187,7 +187,7 @@ iPhone 可以抵禦暴力攻擊,在多次嘗試失敗後,需要等待很長 - [x] 選擇 **開啟 App 隱私報告** -[封閉模式](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode)是可以啟用的安全設置使手機更能抵抗攻擊。 請注意,某些應用和功能[將無法正常運作](https://support.apple.com/en-us/HT212650)。 +[封閉模式](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode)是可以啟用的安全設置使手機更能抵抗攻擊。 Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] 選擇 **打開封閉模式** diff --git a/i18n/zh-Hant/os/linux-overview.md b/i18n/zh-Hant/os/linux-overview.md index d0e732b3..4bff06c5 100644 --- a/i18n/zh-Hant/os/linux-overview.md +++ b/i18n/zh-Hant/os/linux-overview.md @@ -15,12 +15,12 @@ description: Linux 為開源、以隱私為中心的桌面作業系統替代選 用戶應考量 一些使用 Linux 須關注的隱私問題。 儘管有這些缺點,對於大多數用戶,桌面 Linux 發行版還是很棒: - 避免商業作業系統經常出現的遙測現象 -- 保持 [軟體自由](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- 有專注隱私保護的作業系統,如 [Whonix](https://www.whonix.org) 或 [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### 開源安全 -人們往往[迷思](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure)認為 Linux 與其它開源軟體本較安全,因為源代碼可以公開取得。 人們期望定期進行社群驗證;然而這種情況 [並不常見](https://seirdy.one/posts/2022/02/02/floss-security/)。 +人們往往[迷思](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure)認為 Linux 與其它開源軟體本較安全,因為源代碼可以公開取得。 There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). 現實中,發行版安全取決於許多因素,例如專案活動、開發人員經驗、用於代碼審查的嚴格程度以及代碼庫 特定部分的關注頻率,這些可能多年未被聞問。 @@ -30,9 +30,9 @@ description: Linux 為開源、以隱私為中心的桌面作業系統替代選 - Linux 的**驗證開機** 不如 Apple 的 [Secure Boot 安全開機](https://support.apple.com/guide/security/secac71d5623/web) 或 Android’s [Verified Boot 驗證開機](https://source.android.com/security/verifiedboot)。 驗證開機可防止惡意軟體的持久篡改和 [evil maid attacks 邪惡女傭攻擊](https://en.wikipedia.org/wiki/Evil_Maid_attack),但其[仍未及於大多數進階的發行版本](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3)。 -- Linux 上的應用程式嚴重缺乏**強大的沙盒**,即使便使用 Flatpaks 等容器化應用程式或 Firejail 等沙盒解決方案還是不足。 Flatpak 是迄今為止最被看好的 Linux 沙盒實用程式,但它仍存在許多缺陷,且允許[不安全的默認設置](https://flatkill.org/2020/),這使得大多數應用程式可輕鬆繞過其沙盒。 +- Linux 上的應用程式嚴重缺乏**強大的沙盒**,即使便使用 Flatpaks 等容器化應用程式或 Firejail 等沙盒解決方案還是不足。 Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -此外,Linux 在實施[漏洞緩解措施](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations)方面落後,這些緩解措施現已成為其他操作系統的標準配置,例如 Windows 上的任意代碼防護或 macOS 上的強化運行時間。 此外,大多數 Linux 程序和 Linux 本身都是用記憶體不安全語言編寫的。 記憶體損壞錯誤是造成[大多數漏洞](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/)已修復並指配了 CVE 。 雖然 Windows 和 macOS 也是如此,但它們在使用記憶體安全語言(例如 Rust 和 Swift)上正在迅速進展,而Linux 方面則沒有這類以 Rust 重寫記憶體安全的投入 。 +此外,Linux 在實施[漏洞緩解措施](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations)方面落後,這些緩解措施現已成為其他操作系統的標準配置,例如 Windows 上的任意代碼防護或 macOS 上的強化運行時間。 此外,大多數 Linux 程序和 Linux 本身都是用記憶體不安全語言編寫的。 Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. 雖然 Windows 和 macOS 也是如此,但它們在使用記憶體安全語言(例如 Rust 和 Swift)上正在迅速進展,而Linux 方面則沒有這類以 Rust 重寫記憶體安全的投入 。 ## 挑選發行版本 @@ -42,11 +42,11 @@ description: Linux 為開源、以隱私為中心的桌面作業系統替代選 強烈建議您選擇與穩定的上遊軟體版本保持接近的發行版,通常稱為滾動發行版。 因為凍結發行週期旳發行版通常不會更新套件版本,並且在安全性更新方面落後。 -像 [Debian](https://www.debian.org/security/faq#handling)這樣的凍結發行版,套件維護人員預計會回移補丁修復漏洞,而不是將軟體提昇到上遊開發人員發布的“下一個版本”。 某些安全修復 +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. 某些安全修復 根本没收到 [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (特别是不流行的軟體),在此種補丁模式不會放入發行版。 因此小型安全修復有時候要等到下次主要發佈時才一起進行。

-我們不認為保留軟體套件和應用臨時補丁是好主意,因為它偏離了開發者計畫讓軟體工作的方式。 [Richard Brown](https://rootco.de/aboutme/) 對此有一份簡報: +我們不認為保留軟體套件和應用臨時補丁是好主意,因為它偏離了開發者計畫讓軟體工作的方式。 [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -78,7 +78,7 @@ description: Linux 為開源、以隱私為中心的桌面作業系統替代選 對於一個安全的系統,還應有足夠的 Linux 知識來作正確安全設置,如採用 [強制性訪問控制](https://en.wikipedia.org/wiki/Mandatory_access_control) 系統,設置 [內核模塊](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) 黑名單,硬化啟動參數,操作 [sysctl](https://en.wikipedia.org/wiki/Sysctl) 參數,並知道需要哪些組件,如 [Polkit](https://en.wikipedia.org/wiki/Polkit)。 -使用 [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository), **者必須** 對該服務下載的 PKGBUILD進行審計。 AUR 軟體套件是社區製作的內容,未經任何審查,很容易受到軟體供應鏈的攻擊, [事實上已發生過這類事件](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/)。 +使用 [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository), **者必須** 對該服務下載的 PKGBUILD進行審計。 AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). 應該少用 AUR,而往往各種網頁有很多不好的建議,指導人們盲目地使用 [AUR 幫助器](https://wiki.archlinux.org/title/AUR_helpers) 卻沒有足夠警告。 類似的警告也適用基於Debian 發行版上使用第三方個人軟體套件檔案(PPAs)或 Fedora使用社區項目(COPR)。 @@ -87,13 +87,13 @@ description: Linux 為開源、以隱私為中心的桌面作業系統替代選 此外,我們特別**反推薦**這兩個 Arch 衍生品: - **Manjaro**: 此發行版將軟體套件保留 2週,以確保不會破壞他們自己的修改,而不是確保上游的穩定。 使用AUR軟體套件時,通常是根據 Arch 軟體庫中最新的 [存放庫構建](https://en.wikipedia.org/wiki/Library_(computing))。 -- **Garuda**: 他們使用 [Chaotic-AUR](https://aur.chaotic.cx/) ,它自動地、盲目地從 AUR 編譯軟件套件。 沒有驗證程序去確保 AUR 套件不會受到供應鏈攻擊。 +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. 沒有驗證程序去確保 AUR 套件不會受到供應鏈攻擊。 ### Linux-libre 內核與 “Libre” 發行版 -我們建議**不要**使用 Linux-libre 內核,它 [刪除了安全緩解措施](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) ,且 [抑制內核對脆弱微碼的警告](https://news.ycombinator.com/item?id=29674846)。 +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. @@ -105,7 +105,7 @@ description: Linux 為開源、以隱私為中心的桌面作業系統替代選 大多數Linux 發行版安裝程序中都有啟用 [LUKS](../encryption.md#linux-unified-key-setup) FDE之選項。 如果在安裝時沒有設置這個選項,就只能重新安裝,因為在 [系統系統](https://en.wikipedia.org/wiki/File_system) 被格式化 [磁碟分區](https://en.wikipedia.org/wiki/Disk_partitioning)後進行加密。 我們還建議安全地刪除儲存設備。 -- [安全資料清除 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [安全資料清除 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) @@ -119,9 +119,9 @@ description: Linux 為開源、以隱私為中心的桌面作業系統替代選 ### Wayland -建議使用支持 [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) 顯示協議的桌面環境,因為它的開發 [考慮到了安全](https://lwn.net/Articles/589147/)。 其前身( [X11](https://en.wikipedia.org/wiki/X_Window_System)),不支持GUI 隔離,允許所有視窗[記錄畫面、日誌和注入其他視窗的輸入](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html),使任何沙盒嘗試都是徒勞。 雖然有一些選項可以做嵌套 X11,比如 [Xpra](https://en.wikipedia.org/wiki/Xpra) 或 [Xephyr](https://en.wikipedia.org/wiki/Xephyr),但它們往往會帶來負面性能,設置也不方便,不如 Wayland 可取。 +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). 其前身( [X11](https://en.wikipedia.org/wiki/X_Window_System)),不支持GUI 隔離,允許所有視窗[記錄畫面、日誌和注入其他視窗的輸入](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html),使任何沙盒嘗試都是徒勞。 雖然有一些選項可以做嵌套 X11,比如 [Xpra](https://en.wikipedia.org/wiki/Xpra) 或 [Xephyr](https://en.wikipedia.org/wiki/Xephyr),但它們往往會帶來負面性能,設置也不方便,不如 Wayland 可取。 -幸好 [wayland 組成](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) 例如包括在[GNOME](https://www.gnome.org) 與[KDE Plasma](https://kde.org) 可以妥善支援 Wayland 與其它使用[wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots)的組件 (例如 [Sway](https://swaywm.org)). 某些發佈版本如 Fedora 和 Tumbleweed 預設使用它,有些則可能在未來也會這樣作在 X11 成為 [硬性維護模式](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly)後。 如果使用以下的桌面環境,就像在桌面顯示管理器中選擇 "Wayland "一樣簡單([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)) 。 +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). 如果使用以下的桌面環境,就像在桌面顯示管理器中選擇 "Wayland "一樣簡單([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)) 。 我們**反對**使用不支援 Wayland 的桌面環境或視窗管理器,如Cinnamon(Linux Mint)、Pantheon(Elementary OS)、MATE、Xfce 和 i3。 @@ -129,7 +129,7 @@ description: Linux 為開源、以隱私為中心的桌面作業系統替代選 ### 商用靭體(Microcode更新) -Linux 發行版,如 [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre) 或 DIY(Arch Linux),不附帶商業專用的 [微碼](https://en.wikipedia.org/wiki/Microcode) 更新,這類更新通常會修補漏洞。 這些漏洞例子包括: [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), 以及其他 [硬體漏洞](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html)。 +Linux 發行版,如 [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre) 或 DIY(Arch Linux),不附帶商業專用的 [微碼](https://en.wikipedia.org/wiki/Microcode) 更新,這類更新通常會修補漏洞。 Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). 我們**強烈建議**安裝微碼更新,因為它們包含重要的 CPU 安全補丁,無法僅僅靠軟體緩解。 Fedora 和 openSUSE 都預設採用微碼更新。 @@ -153,11 +153,11 @@ Linux 發行版,如 [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre) 許多桌面 Linux 發行版(Fedora、openSUSE等)自帶 [網路管理員](https://en.wikipedia.org/wiki/NetworkManager),以配置以太網和 Wi-Fi設置。 -在使用NetworkManager時,可以隨機化 [](https://fedoramagazine.org/randomize-mac-address-nm/) [MAC 地址](https://en.wikipedia.org/wiki/MAC_address)。 這在Wi-Fi 上提供了更多隱私,因為這讓追踪所連網路的特定設備變得更困難。 但這 [**並不是**](https://papers.mathyvanhoef.com/wisec2016.pdf) 讓您匿名。 +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. 這在Wi-Fi 上提供了更多隱私,因為這讓追踪所連網路的特定設備變得更困難。 但這 [**並不是**](https://papers.mathyvanhoef.com/wisec2016.pdf) 讓您匿名。 -將設置改為 **隨機** ,而不是 **穩定**,正如 [這篇文章建議](https://fedoramagazine.org/randomize-mac-address-nm/)。 +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -如使用 [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components),需要設置 [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) ,以啟用 [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=)。 +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC 地址隨機化主要有利於 Wi-Fi 連接。 對以太網連接,隨機化 MAC 地址幾乎沒什麼好處(如果有的話),因為網絡管理員可以通過其他方式輕鬆識別您的設備(例如檢查您在網絡交換機上連接的端口)。 隨機化 Wi-Fi MAC 地址必須有 Wi-Fi 靭體支持。 @@ -177,6 +177,6 @@ MAC 地址隨機化主要有利於 Wi-Fi 連接。 對以太網連接,隨機 Fedora 專案使用[`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) 變量而非獨特 ID 來[計算多少](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting)系統訪問它的鏡像。 Fedora 這樣做是為了確定負載並在必要時為更新提供更好的伺服器。 -這個 [選項](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) ,目前預設為關閉。 我們建議將 `countme=false` 添加到 `/etc/dnf/dnf.conf` ,以備將來啟用。 使用 `rpm-ostree` 的系統,如 Silverblue,通過遮蔽 [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) 計時器來禁用 countme 選項。 +這個 [選項](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) ,目前預設為關閉。 我們建議將 `countme=false` 添加到 `/etc/dnf/dnf.conf` ,以備將來啟用。 On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE 還使用[唯一的 ID](https://en.opensuse.org/openSUSE:Statistics) 來計算系統,可以通過刪除 `/var/lib/zypp/AnonymousUniqueId` 檔來禁用它。 diff --git a/i18n/zh-Hant/os/macos-overview.md b/i18n/zh-Hant/os/macos-overview.md index 51496540..a3821fa6 100644 --- a/i18n/zh-Hant/os/macos-overview.md +++ b/i18n/zh-Hant/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har 蘋果公司使用 Unix 作業系統來開發**macOS** 支援自家的 Mac 電腦。 為提高 macOS 隱私,用戶可關閉遙測功能以強化現有的隱私與安全設置。 -舊款的 Intel-based Macs 與 Hackintoshe 則無法完全支援 macOS 所提供的安全功能。 為提昇資料安全,建議使用帶[Apple silicon](https://support.apple.com/en-us/HT211814)晶片的.較新款 Mac 。 +舊款的 Intel-based Macs 與 Hackintoshe 則無法完全支援 macOS 所提供的安全功能。 To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## 隱私筆記 @@ -22,13 +22,13 @@ description: macOS is Apple's desktop operating system that works with their har 過去這些檢查是通過未加密的 OCSP 協議執行,因此可能會將您運行的應用程式資料洩露到網路上。 Apple 在 2021 年將其 OCSP 服務升級為 HTTPS 加密,並[發布了該服務的日誌記錄政策資訊](https://support.apple.com/HT202491)。 他們還承諾添加一種機制,讓用戶可選擇退出此連線檢查,但截至 2023 年 7 月,該機制尚未添加到 macOS 。 -雖然您[可以](https://electiclight.co/2021/02/23/how-to-run-apps-in-private/)相對輕鬆地手動選擇退出此檢查,但除非您會受到 macOS 執行撤銷檢查的嚴重損害,我們不建議這樣做,因為它們在確保阻止受感染的應用程式運行上發揮著重要作用。 +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## 建議配置 首次設置 Mac 時,您的帳戶將是管理員帳戶,其具有比標準用戶帳戶更高的權限。 macOS 有許多保護措施可以防止惡意軟體和其他程式濫用您的管理員權限,因此使用此帳戶通常是安全的。 -然而,破壞利用 `sudo` 這類的保護效用程式中的漏洞問題,已曾[ 發現過](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/)。 如果想避免運行的程式濫用管理員權限,可以考慮創建第二個標準用戶帳戶用於日常操作。 這樣的另一個好處是,當應用程式需要管理員訪問權限時,它會更加明顯,因為它每次都會提示您輸入憑據。 +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). 如果想避免運行的程式濫用管理員權限,可以考慮創建第二個標準用戶帳戶用於日常操作。 這樣的另一個好處是,當應用程式需要管理員訪問權限時,它會更加明顯,因為它每次都會提示您輸入憑據。 如果您使用第二個帳戶,則不會嚴格要求在 macOS 登入畫面需登錄到原始管理員帳戶。 當以標準用戶身份執行需要管理員權限的操作時,系統會提示進行身份驗證,這時可以作為標準用戶單次性輸入管理員憑據。 如果希望在登錄畫面中只有一個帳戶,Apple 提供了[隱藏管理員帳戶的指南](https://support.apple.com/HT203998)。 @@ -128,7 +128,7 @@ Apple 產品的大多數隱私和安全問題與其*雲服務*有關,而不是 ##### 封閉模式 -[封閉模式](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) 禁用某些功能以提高安全性。 某些應用程式或功能在封閉時將無法正常工作,例如 [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in -time-jit- compilers/) 和[WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) 在封閉模式下會被Safari 關閉。 建議啟用封閉模式看看它是否會顯著影響您的使用,它所做的許多更改都很容易接受。 +[封閉模式](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) 禁用某些功能以提高安全性。 Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. 建議啟用封閉模式看看它是否會顯著影響您的使用,它所做的許多更改都很容易接受。 - [x] 點擊 **開啟** diff --git a/i18n/zh-Hant/os/qubes-overview.md b/i18n/zh-Hant/os/qubes-overview.md index 10d101be..ccc68d1a 100644 --- a/i18n/zh-Hant/os/qubes-overview.md +++ b/i18n/zh-Hant/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes 作業系統利用*qubes* (過去稱"虛擬機器") 來隔離應用程式以提高安全性。 --- -[**Qubes OS**](../desktop.md#qubes-os) 為開源作業系統,其使用 [Xen](https://en.wikipedia.org/wiki/Xen) 管理程序利用 隔離*qubes*(虛擬器)來為桌面運算提供強固的安全。 您可為每一個 *qube* 依其目的指定不同的信賴層級。 Qubes OS 利用隔離作法來提高安全性。 它只允許根據具體情況進行操作,因此與[不良枚舉](https://www.ranum.com/security/computer_security/editorials/dumb/)相反。 +[**Qubes OS**](../desktop.md#qubes-os) 為開源作業系統,其使用 [Xen](https://en.wikipedia.org/wiki/Xen) 管理程序利用 隔離*qubes*(虛擬器)來為桌面運算提供強固的安全。 您可為每一個 *qube* 依其目的指定不同的信賴層級。 Qubes OS 利用隔離作法來提高安全性。 It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## Qubes OS如何工作? -Qubes 使用 [分區化](https://www.qubes-os.org/intro/) 來確保系統安全。 Qubes 從模板創建,預設為 Fedora、Debian 和 [Whonix](../desktop.md#whonix)。 Qubes OS還允許您創建一次性 [一次性](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*。 +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes 從模板創建,預設為 Fedora、Debian 和 [Whonix](../desktop.md#whonix)。 Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Qubes 使用 [分區化](https://www.qubes-os.org/intro/) 來確保系統安全 ![Qubes架構](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes Architecture, Credit: What is Qubes OS Intro
-每個 qubes 都有 [顏色邊框](https://www.qubes-os.org/screenshots/) ,幫助您追蹤它運行的地方。 例如,可以為銀行瀏覽器使用特定的顏色,而一般不信任的瀏覽器則使用不同顏色。 +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. 例如,可以為銀行瀏覽器使用特定的顏色,而一般不信任的瀏覽器則使用不同顏色。 ![顏色邊框](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes 視窗邊框,圖片來源: Qubes Screenshots
@@ -33,7 +33,7 @@ Qubes OS在主機作業系統上 利用 [dom0](https://wiki.xenproject.org/wiki/ ### 復制和黏貼文本 -可利用 `qvm-copy-to-vm` 或以下說明 [複製並貼上文本](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/) : +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. 按 **Ctrl + C** 讓所在的 *qube* 複製某些內容。 2. 按 **Ctrl + Shift + C** 讓 *qube* 將此緩衝區供全局剪貼板使用。 @@ -47,16 +47,13 @@ Qubes OS在主機作業系統上 利用 [dom0](https://wiki.xenproject.org/wiki/
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. 當這樣做時,不會立即進行更改,並且在發生事故時可以輕鬆撤消。 When you run a *qube*, it does not have a persistent filesystem. 您可以創建和刪除檔案,但這些更改是暫時的。 +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. 當這樣做時,不會立即進行更改,並且在發生事故時可以輕鬆撤消。 When you run a *qube*, it does not have a persistent filesystem. 您可以創建和刪除檔案,但這些更改是暫時的。
### 虛擬機之間交互 -[qrexec 框架](https://www.qubes-os.org/doc/qrexec/) 是 Qubes 的核心構成,其可在域之間進行溝通。 它基於 Xen 庫 *vchan*之上,通過策略促進 -隔離。

- - +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## 透過 VPN 連接 Tor @@ -74,14 +71,11 @@ Qubes 設置大概像這樣: | sys-whonix | Whonix Gateway VM | ==sys-proxyvm== | | anon-whonix | Whonix Workstation VM | sys-whonix | - - - ## 其他資源 -如需更多資訊,建議瀏覽[Qubes OS 網站](https://www.qubes-os.org/doc/)上 Qubes OS 文件頁面。 可以從Qubes OS [文件庫](https://github.com/QubesOS/qubes-doc)下載離線副本。 +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). 可以從Qubes OS [文件庫](https://github.com/QubesOS/qubes-doc)下載離線副本。 -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [相關文章](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/zh-Hant/passwords.md b/i18n/zh-Hant/passwords.md index 9934572e..5c8dc48d 100644 --- a/i18n/zh-Hant/passwords.md +++ b/i18n/zh-Hant/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: 密碼管理器。 operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: 密碼管理器。 operatingSystem: Android subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: 密碼管理器。 operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: 密碼管理器。 operatingSystem: - Windows 作業系統 @@ -127,7 +127,7 @@ schema: 瀏覽器和作業系統所內置的密碼管理器常常不如專用密碼管理器軟體。 內建的密碼管理器優點是與原生軟體很好地整合,但它通常非常簡單,並且缺乏獨立產品具有的隱私和安全功能。 -例如,Microsoft Edge 的密碼管理器根本不提供 E2EE。 Google的密碼管理員有 [optional](https://support.google.com/accounts/answer/11350823) 個E2EE ,而 [Apple](https://support.apple.com/en-us/HT202303)預設提供E2EE。 +例如,Microsoft Edge 的密碼管理器根本不提供 E2EE。 Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ schema: [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ schema: -Bitwarden還具有 [Bitwarden Send](https://bitwarden.com/products/send/)功能,允許您使用 [端到端加密](https://bitwarden.com/help/send-encryption)安全地共享文本和檔案。 發送分享鏈接時可以要求帶[分享密碼](https://bitwarden.com/help/send-privacy/#send-passwords) 。 Bitwarden Send 還具[自動刪除功能](https://bitwarden.com/help/send-lifespan)。 +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). 發送分享鏈接時可以要求帶[分享密碼](https://bitwarden.com/help/send-privacy/#send-passwords) 。 Bitwarden Send 還具[自動刪除功能](https://bitwarden.com/help/send-lifespan)。 您需要使用 [高級付費方案](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) 才能共享檔案。 免費方案只允許文字分享。 @@ -183,20 +183,20 @@ Bitwarden 伺服器端代碼是 [開源](https://github.com/bitwarden/server), ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** 是一個密碼管理器,非常注重安全性和易用性,允許您將密碼、信用卡、軟體許可證和任何其他敏感資訊存儲在安全的數位保管庫。 您的保管庫託管在 1Password 伺服器,費用為 [每月收取](https://1password.com/sign-up/)。 1Password 定期 [接受審計](https://support.1password.com/security-assessments/) 並提供卓越的客戶支援。 1Password 是封閉原始碼;但是,產品的安全性已徹底記錄在他們的 [安全白皮書](https://1passwordstatic.com/files/security/1password-white-paper.pdf)。 +**1Password** 是一個密碼管理器,非常注重安全性和易用性,允許您將密碼、信用卡、軟體許可證和任何其他敏感資訊存儲在安全的數位保管庫。 Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password 是封閉原始碼;但是,產品的安全性已徹底記錄在他們的 [安全白皮書](https://1passwordstatic.com/files/security/1password-white-paper.pdf)。 -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ Bitwarden 伺服器端代碼是 [開源](https://github.com/bitwarden/server), Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ Psono為其產品提供廣泛的文檔。 Psono 的網頁用戶端可以自行 [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC 將其匯出數據存儲為 [CSV](https://en.wikipedia.org/wiki/Comma- **KeePassDX** 是 Android 輕量級密碼管理器,允許編輯KeePass 格式文件中的加密資料,與安全填寫密碼表單。 [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) 允許解鎖上妝的內容和非標準協議功能,但更重要的是,它有助於並鼓勵開發。 -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC 將其匯出數據存儲為 [CSV](https://en.wikipedia.org/wiki/Comma- ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** 是 iOS 和 macOS 原生開源密碼管理器。 支援 KeePass 和 Password Safe 格式, Strongbox 可以與其他密碼管理器(如KeePassXC)一起在非 Apple 平臺上使用。 通過採用 [免費增值模式](https://strongboxsafe.com/pricing/) , Strongbox 免費會員等級提供了大多數功能,而更方便的 [功能](https://strongboxsafe.com/comparison/) -例如生物識別驗證-則必須在訂閱或購買永久授權之後才能享受。 +**Strongbox** 是 iOS 和 macOS 原生開源密碼管理器。 支援 KeePass 和 Password Safe 格式, Strongbox 可以與其他密碼管理器(如KeePassXC)一起在非 Apple 平臺上使用。 By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-此外,還有一個僅限離線版本: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638)。 這個版本被剝離許多特色,以試圖減少攻擊面。 +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). 這個版本被剝離許多特色,以試圖減少攻擊面。 ### 命令行 @@ -356,7 +356,7 @@ KeePassXC 將其匯出數據存儲為 [CSV](https://en.wikipedia.org/wiki/Comma- **gopass** 是用Go編寫的命令行的密碼管理器。 它適用於所有主要的桌面和伺服器作業系統(Linux, macOS, BSD, Windows)。 -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ KeePassXC 將其匯出數據存儲為 [CSV](https://en.wikipedia.org/wiki/Comma-
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/zh-Hant/photo-management.md b/i18n/zh-Hant/photo-management.md index 1d01155c..c283a134 100644 --- a/i18n/zh-Hant/photo-management.md +++ b/i18n/zh-Hant/photo-management.md @@ -14,9 +14,9 @@ cover: photo-management.webp ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente**提供端對端加密照片備份服務,支援 iOS 和 Android 的自動備份。 Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente**提供端對端加密照片備份服務,支援 iOS 和 Android 的自動備份。 Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ cover: photo-management.webp **Stingle** 是一款圖庫和相機應用程序,內建端對端加密備份和同步功能,適用於照片和影片。 免費帳戶的雲端儲存空間為 1GB,或者自行託管 Stingle API 伺服器來實現完全獨立。 -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads "下載" - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ cover: photo-management.webp ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** 是一個管理照片的自架平台。 它支援相簿同步和共享以及各種其他[功能](https://www.photoprism.app/features)。 它不包括 E2EE,因此最好將其託管在信任且能控制的伺服器上。 +**PhotoPrism** 是一個管理照片的自架平台。 It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). 它不包括 E2EE,因此最好將其託管在信任且能控制的伺服器上。 -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/zh-Hant/productivity.md b/i18n/zh-Hant/productivity.md index 4664f7ee..107f63bc 100644 --- a/i18n/zh-Hant/productivity.md +++ b/i18n/zh-Hant/productivity.md @@ -19,9 +19,9 @@ cover: productivity.webp [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads "下載" @@ -53,8 +53,8 @@ cover: productivity.webp **CryptPad** 隱私設計可替代流行的辦公工具。 網頁服務上的所有內容都是端到端加密,也可輕鬆與其他用戶共享。 [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ cover: productivity.webp **LibreOffice** 是一個免費且開源的辦公套件,具有廣泛的功能。 -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ cover: productivity.webp **OnlyOffice** 是一個基於雲的免費開源辦公套件,具有廣泛的功能,包括與Nextcloud的整合。 -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ cover: productivity.webp - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ cover: productivity.webp **PrivateBin** 是一個極簡主義的開源網路剪貼板 ,伺服器對黏貼的資料一無所知。 資料在瀏覽器中使用 256位元AES 來加密/解密。 它是 ZeroBin 的改進版本。 [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/zh-Hant/real-time-communication.md b/i18n/zh-Hant/real-time-communication.md index 3dfa70d6..e4d57f57 100644 --- a/i18n/zh-Hant/real-time-communication.md +++ b/i18n/zh-Hant/real-time-communication.md @@ -20,20 +20,20 @@ cover: real-time-communication.webp ![Signal logo](assets/img/messengers/signal.svg){ align=right } -**Signal** 是由Signal Messenger LLC開發的行動應用程式。 這款應用程式透過 Signal 協議來保護即時訊息和通話,它是極其安全的加密協議,支援前向保密[^1] 和洩露後安全性。[^2] +**Signal** 是由Signal Messenger LLC開發的行動應用程式。 The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
-Downloads "下載" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal 需要手機號碼才能註冊,但是您應該建立用戶名,以隱 若想防止已知您手機號碼的人可以找到您的 Signal 帳號或用戶名稱,也可以選擇把 **誰可看見我的號碼** 設置為**無人可見** 。 -連絡人清單會使用您的 Signal PIN 加密,而伺服器無法存取。 個人帳號也會加密,並僅與您聊天的聯絡人分享。 Signal 支援[私密 群組](https://signal.org/blog/signal-private-group-system/),伺服器不會記錄該群組成員資格、群組標題、群組頭像,或群組屬性。 當啓用 [Sealed Sender](https://signal.org/blog/sealed-sender/) 時, Signal具有最小元數據。 發件人地址與訊息內文一起加密,伺服器只可見到收件人地址。 Sealed Sender 功能僅適用於聯絡人清單的成員,但在收訊時也可啟用以防止接收垃圾郵件增加的風險。 +連絡人清單會使用您的 Signal PIN 加密,而伺服器無法存取。 個人帳號也會加密,並僅與您聊天的聯絡人分享。 Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. 發件人地址與訊息內文一起加密,伺服器只可見到收件人地址。 Sealed Sender 功能僅適用於聯絡人清單的成員,但在收訊時也可啟用以防止接收垃圾郵件增加的風險。 -其協議在2016年獨立進行了 [審計](https://eprint.iacr.org/2016/1013.pdf) 。 Signal 協議的規範可以在他們的 [文檔](https://signal.org/docs/)中找到。 +其協議在2016年獨立進行了 [審計](https://eprint.iacr.org/2016/1013.pdf) 。 The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). 我們有一些關於配置和硬化 Signal 安裝的額外提示: -[Signal 配置和硬化 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal 配置和硬化 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -75,10 +75,10 @@ Signal 需要手機號碼才能註冊,但是您應該建立用戶名,以隱 [:octicons-code-16:](https://github.com/simplex-chat){ .card-link title="Source Code" }
-Downloads "下載" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat 提供基本的小組聊天功能、直接傳訊與 markdown 格式 ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** 是 [連接](https://briarproject.org/how-it-works/)其他使用 Tor網路客戶端的加密即時通訊工具。 Briar 還可以在本地附近通過 Wi-Fi 或藍牙連接。 當無法使用網際網路時, Briar 的本地網格(mesh)模式可能很有用。 +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar 還可以在本地附近通過 Wi-Fi 或藍牙連接。 當無法使用網際網路時, Briar 的本地網格(mesh)模式可能很有用。 -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
-Downloads "下載" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat 提供基本的小組聊天功能、直接傳訊與 markdown 格式 Briar 要新增聯絡人,必須先彼此互加。 您可以交換 `briar://` 鏈結或是掃瞄對方的二維碼。 -客戶端軟體被獨立 [稽核](https://briarproject.org/news/2017-beta-released-security-audit/),而匿名路由協議使用Tor 網路也接受了審計。 +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar有一個完整 [發布的規範](https://code.briarproject.org/briar/briar-spec)。 @@ -141,24 +141,24 @@ Briar 利用[^1] Bramble[Handshake](https://code.briarproject.org/briar/briar-sp ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** 是 [Matrix](https://matrix.org/docs/guides/introduction) 協議的參考[用戶端](https://matrix.org/ecosystem/clients/) ,這是一個 [開放標準](https://matrix.org/docs/spec) 、安全去中心化實時通訊。 +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. 在私人聊天室(需透過邀請加入)共享的訊息和文件預設為 E2EE ,一對一的語音和視訊通話也是如此。 -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" }
-Downloads "下載" +Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Briar 利用[^1] Bramble[Handshake](https://code.briarproject.org/briar/briar-sp Matrix 協議本身[理論上支持前向保密](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy) [^1],但[ Element 目前不支援](https:/ / github.com/vector-im/element-web/issues/7101),因為會破壞某方面的使用者體驗,例如金鑰備份和共享訊息歷史記錄。 -其協議在 2016年獨立進行了 [審計](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) 。 Matrix 協議的規範可以在他們的 [文檔](https://spec.matrix.org/latest/)中找到。 Matrix 使用的 [Olm 加密棘輪](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/)是執行Signal [Double Ratchet 演算法](https://signal.org/docs/specifications/doubleratchet/)。 +其協議在 2016年獨立進行了 [審計](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) 。 The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ Matrix 協議本身[理論上支持前向保密](https://gitlab.matrix.org/matri **Session** 是一款分散式通訊軟體,專注於私密、安全和匿名。 Session 支援直接訊息、羣組聊天和語音通話。 -Session使用去中心化的 [Oxen Service Node Network](https://oxen.io/) 來儲存和路由訊息。 每條加密訊息都通過 Oxen Service Node Network 中三個節點路由,使得節點幾乎不可能編譯有意義信息給此網路的使用者。 +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. 每條加密訊息都通過 Oxen Service Node Network 中三個節點路由,使得節點幾乎不可能編譯有意義信息給此網路的使用者。 -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/zh-Hant/router.md b/i18n/zh-Hant/router.md index a4285abd..3492bc47 100644 --- a/i18n/zh-Hant/router.md +++ b/i18n/zh-Hant/router.md @@ -35,10 +35,10 @@ cover: router.webp **OPNsense** 是開源的、基於FreeBSD 的防火牆和路由平臺,它包含許多進階功能,如流量整形、負載平衡和 VPN 功能,且有插件的形式提供更多功能。 OPNsense 通常部署作邊界防火牆、路由器、無線存取點、DHCP伺服器、DNS伺服器和 VPN 端點。 -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/zh-Hant/search-engines.md b/i18n/zh-Hant/search-engines.md index 85be87df..12128817 100644 --- a/i18n/zh-Hant/search-engines.md +++ b/i18n/zh-Hant/search-engines.md @@ -10,7 +10,7 @@ cover: search-engines.webp 這裡的建議是基於每個服務的隱私政策的優點。 **不能保證**這些隱私政策都有好好落實。 -如果您的威脅模型需要向搜尋供應商隱藏您的IP位址,請考慮使用 [VPN](vpn.md) 或 [Tor](https://www.torproject.org/) 。 +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search 包括獨特的功能,如討論,突出了對話為中心的結 我們建議您停用 [匿名使用指標](https://search.brave.com/help/usage-metrics) ,因為它預設為啟用,可在設定中停用。 -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search 總部在美國。 他們的 [隱私政策](https://search.brave.co ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** 最主流的隱私搜尋引擎選項之一。 著名的 DuckDuckGo 搜索功能包括 [bangs](https://duckduckgo.com/bang)和許多[即時答案](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/)。 搜尋引擎依賴商業 Bing API 來提供大多數結果,但它確實使用許多[其他來源](https://help.duckduckgo.com/results/sources/ )來獲取即時答案和其他非主要結果。 +**DuckDuckGo** 最主流的隱私搜尋引擎選項之一。 Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo 是 Tor瀏覽器的預設搜尋引擎,也是 Apple Safari 瀏覽器上為數不多的可用選項之一。 [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo 是 Tor瀏覽器的預設搜尋引擎,也是 Apple Safari 瀏覽器 Brave Search 總部在美國。 他們的[隱私政策](https://duckduckgo.com/privacy)聲明他們**確實** 記錄使用者搜尋以改善其產品,但不會記錄 IP 地址或其它可識別的個人資訊。 -DuckDuckGo 提供兩種 [其它版本](https://help.duckduckgo.com/features/non-javascript/) 搜尋引擎,兩者皆不需要JavaScript。 然而,這些版本缺少特色。 這些版本也可以與其 [Tor 洋蔥地址](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) 一起使用,通過為相應的版本附加 [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) 或 [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) 後綴。 +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. 然而,這些版本缺少特色。 These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo 提供兩種 [其它版本](https://help.duckduckgo.com/features/non- **SearXNG** 是一個開源、自我託管的中繼搜索引擎,聚合其他搜索引擎的結果,而自身不儲存任何資訊。 它是一個積極維護的 [SearX](https://github.com/searx/searx) 分支。 [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ SearXNG 是您和它所聚合的搜尋引擎之間的代理。 您的搜尋查 ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage**為私密搜尋引擎,提供[Google 與 Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) 的搜尋結果。 Startpage 的獨特功能之一是 [匿名視圖](https://www.startpage.com/en/anonymous-view/) ,它努力標準化用戶活動,使其更難被突出識別。 這個功能可用來隱藏 [某些](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) 網路與瀏覽器特徵。 不像名字所暗示的,該功能不應該依賴於匿名。 如果您正在尋找匿名性,請改用 [Tor瀏覽器](tor.md#tor-browser)。 +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. 不像名字所暗示的,該功能不應該依賴於匿名。 如果您正在尋找匿名性,請改用 [Tor瀏覽器](tor.md#tor-browser)。 -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,12 +104,9 @@ Startpage 定期限制服務對某些 IP位址的存取,例如為 VPN 或Tor -Startpage位於荷蘭。 根據他們的 [隱私政策](https://www.startpage.com/en/privacy-policy/),他們記錄細節如:作業系統、瀏覽器類型和語言。 他們不會記錄您的IP位址、搜尋查詢或其他個人識別資訊。 - -Startpage 大股東是System1,它是一家廣告技術公司。 我們不認為這是問題,因為他們有明顯分開的 [隱私政策](https://system1.com/terms/privacy-policy)。 Privacy Guides 團隊2020年 聯繫 Startpage -,以消除對 System1對該服務大量投資的擔憂。 我們對收到的答案感到滿意。

- +Startpage位於荷蘭。 According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. 他們不會記錄您的IP位址、搜尋查詢或其他個人識別資訊。 +Startpage 大股東是System1,它是一家廣告技術公司。 我們不認為這是問題,因為他們有明顯分開的 [隱私政策](https://system1.com/terms/privacy-policy)。 The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. 我們對收到的答案感到滿意。 ## 標準 @@ -127,8 +124,6 @@ Startpage 大股東是System1,它是一家廣告技術公司。 我們不認 - 不得根據其隱私權政策收集個人身份資訊。 - 不得要求使用者建立帳戶。 - - ### 最佳案例 最佳案例標準代表了我們希望從這個類別的完美項目應具備的功能。 推薦產品可能沒有此功能,但若有這些功能則會讓排名更為提高。 diff --git a/i18n/zh-Hant/tools.md b/i18n/zh-Hant/tools.md index 4b81f4aa..03846743 100644 --- a/i18n/zh-Hant/tools.md +++ b/i18n/zh-Hant/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides 是最透明和可靠的網站,用於尋找保護 如果您正在尋找特定的解決方案,這些是我們在各種類別中推薦的硬件和軟件工具。 我們推薦的隱私工具主要是基於安全功能而選擇的,並特別強調去中心化和開源工具。 它們適用於各種威脅模型,從防止全球大規模監控計劃,避免大型科技公司到減輕攻擊,但只有您才能確定哪些最適合您的需求。 -如果您需要協助,為您的需求找出最佳的隱私工具和替代方案,請在我們的 [論壇](https://discuss.privacyguides.net/) 或 [matrix](https://matrix.to/#/#privacyguides:matrix.org) 社區開始討論! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! 有關每個項目的詳細資訊,為什麼選擇它們,以及我們推薦的其他提示或技巧,請點擊每個部分中的“了解更多”連結,或點擊推薦本身以轉到頁面的特定部分。 @@ -89,7 +89,7 @@ description: Privacy Guides 是最透明和可靠的網站,用於尋找保護 #### DNS 提供者 -基於各種標準,我們 [推薦](dns.md#recommended-providers) 一些加密 DNS 伺服器,例如[Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) 與 [Quad9](https://quad9.net/)。 建議您在選擇供應商之前先閱讀我們有關 DNS 的頁面。 在許多情況下,不建議使用替代 DNS 提供商。 +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. 建議您在選擇供應商之前先閱讀我們有關 DNS 的頁面。 在許多情況下,不建議使用替代 DNS 提供商。 [了解更多 :material-arrow-right-drop-circle:](dns.md) diff --git a/i18n/zh-Hant/tor.md b/i18n/zh-Hant/tor.md index 52429a8b..c4e4dd02 100644 --- a/i18n/zh-Hant/tor.md +++ b/i18n/zh-Hant/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor Browser image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: 網頁瀏覽器 operatingSystem: @@ -27,11 +27,11 @@ schema: **Tor** 網絡是一組由志願者操作的伺服器,可讓您免費連線,並改善您的隱私權和安全性。 個人和組織還可以通過 Tor 網絡與“.onion 隱藏服務”分享資訊,而不會損害他們的隱私。 很難阻止和追蹤 Tor 流量,因此它是一種有效的審查規避工具。 -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor 的工作原理是通過志願者運營的服務器來引導您的網際網路路徑,而不是直接連接到您試圖訪問的網站。 這樣可以混淆流量來源,所連接的伺服器都無法看到流量來去的完整路徑,也意味著即使您連接的伺服器無法破壞您的匿名性。 @@ -60,20 +60,20 @@ Tor 的工作原理是通過志願者運營的服務器來引導您的網際網 **Tor 瀏覽器** 需要匿名的好選擇,為您提供 Tor 網絡和橋接的存取權限,它包含預設設置和擴展其自動配置安全級別有: *標準* 、 *更安全*和*最安全*三種。 -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ Tor 的工作原理是通過志願者運營的服務器來引導您的網際網 -Tor 瀏覽器旨在防止指紋識別----根據您的瀏覽器配置識別您。 因此,您 **不應** 修改瀏覽器超出預設 [安全級別](https://tb-manual.torproject.org/security-settings/)。 +Tor 瀏覽器旨在防止指紋識別----根據您的瀏覽器配置識別您。 Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). 除了直接在電腦安裝 Tor 瀏覽器外,還有專門設計用於連接到 Tor 網絡的操作系統,例如 [Qubes OS 作業系統](desktop.md#qubes-os) [Whonix](desktop.md#whonix),它們提供比標準 Tor 瀏覽器更高的安全性和保護。 @@ -98,7 +98,7 @@ Tor 瀏覽器旨在防止指紋識別----根據您的瀏覽器配置識別您。 **Orbot** 是一款免費的Tor VPN ,適用於智慧型手機,可讓裝置上的任何應用程式流量通過 Tor 網絡。 -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ Tor 瀏覽器旨在防止指紋識別----根據您的瀏覽器配置識別您。 Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases)
@@ -134,7 +134,7 @@ Guardian Project 的[F-Droid repository](https://guardianproject.info/fdroid)和 ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion 瀏覽器r** 為開源瀏覽器可在 iOS 設備上匿名瀏覽 Tor 網絡,其有 [Tor Project](https://support.torproject.org/glossary/onion-browser/)之保證。 +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ Guardian Project 的[F-Droid repository](https://guardianproject.info/fdroid)和 被審查的人可以使用 Snowflake 代理來連接 Tor 網絡。 Snowflake 是貢獻 Tor 網絡的好方法,即便您沒有運行 Tor 中繼或橋接的技術知識。 -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
@@ -181,4 +181,4 @@ Snowflake 無法加強隱私,也不會在您的個人瀏覽器中連接 Tor網 運行 Snowflake 代理風險很低,甚至低於運行 Tor 中繼或橋接器,而這些中繼器或橋接器已經不算是特別高風險的工作。 但是,它通過您的網路進行代理流量,在某些方面可能會產生影響,特別是您的網路頻寬有限制的話。 在運行代理之前,要確保已清楚了解[ Snowflake 運作方式](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) 。 -[^1]: `IsolateDestAddr` 設定問題已在 [Tor 郵件群組](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) 中討論過而且在 [Whonix's 串流隔離文檔](https://www.whonix.org/wiki/Stream_Isolation),兩項專案都認為對大多數人而言它並不是好方法。 +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/zh-Hant/vpn.md b/i18n/zh-Hant/vpn.md index 223421ce..555dd0ad 100644 --- a/i18n/zh-Hant/vpn.md +++ b/i18n/zh-Hant/vpn.md @@ -25,7 +25,7 @@ cover: vpn.webp 如果要的是更多 **安全性** ,您應該確保您全程使用 HTTPS 連接到網站。 VPN 不能取代良好的安全措施。 -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ cover: vpn.webp **Proton VPN** 是 VPN 領域強大競爭者,自 2016 年開始營運。 Proton AG 總部位於瑞士,提供有限的免費會員等級,以及更多功能的付費選項。 -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ Proton VPN 在73個國家/地區設有 [伺服器](https://protonvpn.com/vpn-ser #### :material-check:{ .pg-green } 獨立稽核 -截至 2020年1月, Proton VPN 已接受 SEC Consult 的獨立審計。 SEC Consult 在 Proton VPN Windows、Android 和 iOS應用程序中發現一些中低風險漏洞,Proton VPN 已在報告發布之前全部“正確修復”這些漏洞。 所發現的問題都不會讓攻擊者遠端存取您的裝置或流量。 您可以透過 [protonvpn.com](https://protonvpn.com/blog/open-source/)查看各個平臺的報告。 2022 年 4月Proton VPN 通過 [另一次審計](https://protonvpn.com/blog/no-logs-audit/) ,[ Securitum 所作的報告在此](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf)。 [Securitum](https://research.securitum.com) 在 2021年11月9日簽發 [Proton VPN 的應用程式認證函](https://proton.me/blog/security-audit-all-proton-apps) 。 +截至 2020年1月, Proton VPN 已接受 SEC Consult 的獨立審計。 SEC Consult 在 Proton VPN Windows、Android 和 iOS應用程序中發現一些中低風險漏洞,Proton VPN 已在報告發布之前全部“正確修復”這些漏洞。 所發現的問題都不會讓攻擊者遠端存取您的裝置或流量。 You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). [Securitum](https://research.securitum.com) 在 2021年11月9日簽發 [Proton VPN 的應用程式認證函](https://proton.me/blog/security-audit-all-proton-apps) 。 #### :material-check:{ .pg-green } 開源客戶端 @@ -84,31 +84,31 @@ Proton VPN 在 [GitHub](https://github.com/ProtonVPN) 提供其桌面和移動 #### :material-check:{ .pg-green } WireGuard支持 -Proton VPN 支持 WireGuard ®協議。 [WireGuard](https://www.wireguard.com) 是一個較新的協議,使用最先進的 [加密技術](https://www.wireguard.com/protocol/)。 此外, WireGuard的目標是更簡單,更高效。 +Proton VPN 支持 WireGuard ®協議。 [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). 此外, WireGuard的目標是更簡單,更高效。 -Proton VPN [建議](https://protonvpn.com/blog/wireguard/) 搭配 WireGuard 使用。 Proton VPN 在 Windows, macOS, iOS, Android, ChromeOS, 以及 Android TV 等平台的應用軟體, WireGuard 已是預設協議,不過[尚未支援](https://protonvpn.com/support/how-to-change-vpn-protocols/) Linux 作業系統的應用軟體。 +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } 遠端端口轉發 -Proton VPN 目前僅支援暫寺性NAT-PMP遠方 [連接埠轉發](https://protonvpn.com/support/port-forwarding/)期間為 60 秒。 Windows 應用提供簡易使用選項,而其它作業系統則需運行 [NAT-PMP 客戶端](https://protonvpn.com/support/port-forwarding-manual-setup/)。 Torrent 應用往往支援 NAT-PMP 原生。 +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent 應用往往支援 NAT-PMP 原生。 #### :material-information-outline:{ .pg-orange } 審查規避 -Proton VPN 有自己的[Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) 協定,在其它 VPN 協定如 OpenVPN, Wireguard 遭封鎖時*或可*派上用場。 Stealth 將 VPN 隧道封裝在 TLS 會話中,使其看起來像是一般的網路流量。 +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth 將 VPN 隧道封裝在 TLS 會話中,使其看起來像是一般的網路流量。 不幸在部署複雜過濾器分析所有對外流量以試圖發現加密隧道的國家/地區,它的效果不太好。 Stealth 也無法在 [Windows](https://github.com/ProtonVPN/win-app/issues/64) 或 Linux 上使用。 #### :material-check:{ .pg-green } 手機客戶端 -除了提供標準的 OpenVPN 配置檔案外, Proton VPN 還有 [ App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085)、 [ Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US)和 [個GitHub](https://github.com/ProtonVPN/android-app/releases) 的移動客戶端,可以輕鬆連接到其伺服器。 +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } 額外功能 -除 Linux 以外,Proton VPN 客戶端目前支持所有平臺上的雙因素身份驗證。 在瑞士、冰島和瑞典,Proton VPN 擁有自己的伺服器和資料中心。 他們透過自己的 DNS 服務,提供內容封鎖和已知的惡意軟體網域。 此外, Proton VPN 還提供“Tor”伺服器,讓您可輕鬆連接到洋蔥網站,但我們仍然強烈建議這類目的,最好還是使用 [官方 Tor 瀏覽器](https://www.torproject.org/) 。 +除 Linux 以外,Proton VPN 客戶端目前支持所有平臺上的雙因素身份驗證。 在瑞士、冰島和瑞典,Proton VPN 擁有自己的伺服器和資料中心。 他們透過自己的 DNS 服務,提供內容封鎖和已知的惡意軟體網域。 Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch 無法用在 Intel 處理器的 Mac 電腦 -Intel 處理器的 Mac 電腦 若用 VPN killswitch 會發生 [系統崩潰](https://protonvpn.com/support/macos-t2-chip-kill-switch/) 。 如果您需要此功能,但使用的是搭載 Intel 晶片組的Mac ,則應考慮使用其他 VPN 服務。 +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. 如果您需要此功能,但使用的是搭載 Intel 晶片組的Mac ,則應考慮使用其他 VPN 服務。 ### IVPN @@ -118,9 +118,9 @@ Intel 處理器的 Mac 電腦 若用 VPN killswitch 會發生 [系統崩潰](htt **IVPN** 是另一家高級 VPN 提供商,自 2009年開始運營。 IVPN 位於直布羅陀。 -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ Intel 處理器的 Mac 電腦 若用 VPN killswitch 會發生 [系統崩潰](htt - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ Intel 處理器的 Mac 電腦 若用 VPN killswitch 會發生 [系統崩潰](htt #### :material-check:{ .pg-green } 37 個國家 -IVPN 在 37 個國家/地區擁有 [伺服器](https://www.ivpn.net/server-locations)。 (1)選擇離最近的伺服器 VPN 供應商,將減少發送網路流量的延遲。 這是因為到目的地的路線較短(跳數較少)。 +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. 這是因為到目的地的路線較短(跳數較少)。 { .annotate } 1. 上次檢查日期: 2023-12-21 @@ -150,13 +150,13 @@ IVPN 在 37 個國家/地區擁有 [伺服器](https://www.ivpn.net/server-locat IVPN 通過 Cure53 的 -不留記錄審計,該審計結果與 IVPN 的不留記錄聲明一致。 IVPN 還在2020年1月完成了Cure53 [全面的 pentest 報告](https://cure53.de/summary-report_ivpn_2019.pdf) 。 IVPN 也表示打算未來會定期提出 [年度報告](https://www.ivpn.net/blog/independent-security-audit-concluded)。 2022年4月進行[進一步評估](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) ,並由執行單位 Cure53 發佈[在其網站](https://cure53.de/pentest-report_IVPN_2022.pdf)。

+不留記錄審計,該審計結果與 IVPN 的不留記錄聲明一致。 IVPN 還在2020年1月完成了Cure53 [全面的 pentest 報告](https://cure53.de/summary-report_ivpn_2019.pdf) 。 IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf).

#### :material-check:{ .pg-green } 開源客戶端 -2020 二月後 [IVPN 應用程式已公開其源代碼](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source)。 源代碼可以從他們的 [GitHub組織](https://github.com/ivpn)獲得。 +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). 源代碼可以從他們的 [GitHub組織](https://github.com/ivpn)獲得。 @@ -168,33 +168,33 @@ IVPN 通過 Cure53 的 #### :material-check:{ .pg-green } WireGuard支持 -IVPN 支援 WireGuard 協議。 [WireGuard](https://www.wireguard.com) 是一個較新的協議,使用最先進的 [加密技術](https://www.wireguard.com/protocol/)。 此外, WireGuard的目標是更簡單,更高效。 +IVPN 支援 WireGuard 協議。 [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). 此外, WireGuard的目標是更簡單,更高效。 -IVPN [建議](https://www.ivpn.net/wireguard/)搭配 WireGuard 一起使用, IVPN's 所有應用程式皆已預設 WireGuard 協議。 IVPN 亦提供 WireGuard 設置生成器以用於官方版本的 WireGuard [應用軟體](https://www.wireguard.com/install/)。 +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } 遠端端口轉發 -IVPN 之前支援向前轉發,但於[2023年6月](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding)移除此功能選項。 失去此功能將對應用程式造成負面影響,尤其是點對點的應用如 torrent 客戶端軟體。 +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). 失去此功能將對應用程式造成負面影響,尤其是點對點的應用如 torrent 客戶端軟體。 #### :material-check:{ .pg-green } 審查規避 -IVPN 混淆模式採[v2ray](https://www.v2ray.com/en/index.html) 專案,它 在其它 VPN 協定如 OpenVPN, Wireguard 遭封鎖時可予協助。 此功能目前僅支援桌機版與 [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/)。 有兩種模式可運用: [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) 取代 QUIC 或 TCP 連接。 QUIC 為新版的協定具有更佳的擁塞控制,減少延遲速度更快。 TCP 模式的數據呈現為一般的 HTTP 流量。 +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). 有兩種模式可運用: [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) 取代 QUIC 或 TCP 連接。 QUIC 為新版的協定具有更佳的擁塞控制,減少延遲速度更快。 TCP 模式的數據呈現為一般的 HTTP 流量。 #### :material-check:{ .pg-green } 手機客戶端 -除標準的 OpenVPN 配置文件外, IVPN可以在 [App Store ](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683)、 [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client)和 [GitHub](https://github.com/ivpn/android-app/releases) 下載移動客戶端,以輕鬆連接到他們的伺服器。 +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } 額外功能 -IVPN 客戶端支援雙因素驗證(Mullvad 客戶端不支援)。 IVPN 有"[反追蹤](https://www.ivpn.net/antitracker)" 功能,以阻絕來自網路層的廣告與追蹤。 +IVPN 客戶端支援雙因素驗證(Mullvad 客戶端不支援)。 IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. @@ -208,19 +208,19 @@ IVPN 客戶端支援雙因素驗證(Mullvad 客戶端不支援)。 IVPN 有" [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -228,7 +228,7 @@ IVPN 客戶端支援雙因素驗證(Mullvad 客戶端不支援)。 IVPN 有" #### :material-check:{ .pg-green } 40 個國家 -Mullvad 在 40 個國家/地區設有 [伺服器](https://mullvad.net/servers/)。(1) 選擇離最近伺服器,這將減少網路流量的延遲。 這是因為到目的地的路線較短(跳數較少)。 +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. 這是因為到目的地的路線較短(跳數較少)。 { .annotate } @@ -246,13 +246,13 @@ Cure53 審計了 Mullvad's VPN 客戶端軟體, Assured AB 對他們進行穿 > Cure53 和 Assured AB 對審計結果感到滿意,Mullvad 留下整體正面的印象。 由於 Mullvad VPN 內部團隊在安全上的投入,測試人員肯定了該項目從安全角度來看是正確的。 -2020年宣布第二次審計 [](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) , [最終報告結果](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) 可在 Cure53 網站上獲得: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > 2020年5月~6月針對 Mullvad 的專案結果是相當正面。 [...] Mullvad 使用的整體應用生態系統給人留下了結構完善之印象。 該應用程序的整體結構更容易以結構化的方式推出補丁和修復。 Cure53 的發現展示了不斷審核和重新評估當前泄漏向量的重要性,以始終確保最終用戶的隱私。 Mullvad 在保護最終用戶免受常見 PII 洩漏和隱私相關風險方面做得很好。 -2021年宣布[基礎設施審計](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) ,並在 Cure53 網站上公布[最終審計報告](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) 。 2022年6月另一份委託 Assured 所作的報告 。

+In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). @@ -270,21 +270,21 @@ Mullvad 在[GitHub 提供其桌面和移動客戶端的源代碼](https://github #### :material-check:{ .pg-green } WireGuard支持 -Mullvad 支持 WireGuard ®協議。 [WireGuard](https://www.wireguard.com) 是一個較新的協議,使用最先進的 [加密技術](https://www.wireguard.com/protocol/)。 此外, WireGuard的目標是更簡單,更高效。 +Mullvad 支持 WireGuard ®協議。 [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). 此外, WireGuard的目標是更簡單,更高效。 -Mullvad [建議](https://mullvad.net/en/help/why-wireguard/) 搭配 WireGuard 使用。 Android, iOS, macOS, 與 Linux Mullvad 應用軟體已將 WireGuard 調為預設協議,但 Windows 則須要自行 [手動打開](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard。 Mullvad 提供 WireGuard 配置生成器,搭配 WireGuard 官方 [應用程序](https://www.wireguard.com/install/)。 +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 支持 -Mullvad 可 [存取託管在 IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/) 的服務,有些供應商會阻止IPv6 連接。 +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } 遠端端口轉發 -Mullvad 之前支援向前轉發,但於[2023年5月](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/)移除此功能選項。 失去此功能將對應用程式造成負面影響,尤其是點對點的應用如 torrent 客戶端軟體。 +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). 失去此功能將對應用程式造成負面影響,尤其是點對點的應用如 torrent 客戶端軟體。 @@ -296,13 +296,13 @@ Mullvad 混淆模式採用 [Shadowsocks with v2ray](https://mullvad.net/en/help/ #### :material-check:{ .pg-green } 手機客戶端 -Mullvad 有 [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) 和 [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) 用戶端,兩者易於使用的界面,無須手動配置 WireGuard 連接。 Android 客戶端也從 [GitHub](https://github.com/mullvad/mullvadvpn-app/releases)下載。 +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. Android 客戶端也從 [GitHub](https://github.com/mullvad/mullvadvpn-app/releases)下載。 #### :material-information-outline:{ .pg-blue } 額外功能 -Mullvad 對 [自有或租用](https://mullvad.net/en/servers/)的節點非常透明。 他們在 ShadowSocks + OpenVPN 配置中使用 [ShadowSocks](https://shadowsocks.org/) ,以更能抵抗 [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) 試圖阻止 VPN 之防火牆。 據推測, [中國使用不同的方法來阻止 ShadowSocks 伺服器](https://github.com/net4people/bbs/issues/22)。 Mullvad 網站也可以通過 Tor 訪問 [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion)。 +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. 據推測, [中國使用不同的方法來阻止 ShadowSocks 伺服器](https://github.com/net4people/bbs/issues/22)。 Mullvad 網站也可以通過 Tor 訪問 [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion)。 diff --git a/i18n/zh/CODE_OF_CONDUCT.md b/i18n/zh/CODE_OF_CONDUCT.md index 3911e051..ac388f35 100644 --- a/i18n/zh/CODE_OF_CONDUCT.md +++ b/i18n/zh/CODE_OF_CONDUCT.md @@ -16,7 +16,7 @@ What we expect from members of our communities: 2. **Do not abuse our willingness to help** - Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires/). + Our community members are not free tech support. We are happy to help with specific steps for individual's, privacy journey, if they are willing to put in effort. We are not obligated to answer endless, repetitive questions, about general computer problems solvable with a simple internet search. **Do not** become a [help vampire](https://slash7.com/2006/12/22/vampires). 3. **Behave in a positive and constructive manner** diff --git a/i18n/zh/about/index.md b/i18n/zh/about/index.md index 454e50fa..7cd6dce3 100644 --- a/i18n/zh/about/index.md +++ b/i18n/zh/about/index.md @@ -21,19 +21,19 @@ schema: **Privacy Guides** is a socially motivated website that provides [information](/kb) for protecting your data security and privacy. Our mission is to inform the public about the value of digital privacy, and global government initiatives which aim to monitor your online activity. 我们是一个非营利性的集体,完全由志愿者 [团队成员](https://discuss.privacyguides.net/g/team) 和贡献者运作。 Our website is free of advertisements and not affiliated with any of the listed providers. -[:octicons-home-16:](https://www.privacyguides.org/){ .card-link title=Homepage } +[:octicons-home-16:](https://www.privacyguides.org){ .card-link title=Homepage } [:octicons-code-16:](https://github.com/privacyguides/privacyguides.org){ .card-link title="Source Code" } [:octicons-heart-16:](donate.md){ .card-link title=Contribute } > To find [privacy-focused alternative] apps, check out sites like Good Reports and **Privacy Guides**, which list privacy-focused apps in a variety of categories, notably including email providers (usually on paid plans) that aren’t run by the big tech companies. -— [New York Times](https://www.nytimes.com/wirecutter/guides/online-security-social-media-privacy/) +— [New York Times](https://nytimes.com/wirecutter/guides/online-security-social-media-privacy) > If you're looking for a new VPN, you can go to the discount code of just about any podcast. If you are looking for a **good** VPN, you need professional help. The same goes for email clients, browsers, operating systems and password managers. How do you know which of these is the best, most privacy-friendly option? For that there is **Privacy Guides**, a platform on which a number of volunteers search day in, day out for the best privacy-friendly tools to use on the internet. — [Tweakers.net](https://tweakers.net/reviews/10568/op-zoek-naar-privacyvriendelijke-tools-niek-de-wilde-van-privacy-guides.html) [Translated from Dutch] -Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok/), [Wirecutter](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc/) [[2](https://www.nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac/)], [NPO Radio 1](https://www.nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://www.wired.com/story/firefox-mozilla-2022/). +Also featured on: [Ars Technica](https://arstechnica.com/gadgets/2022/02/is-firefox-ok), [Wirecutter](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-windows-pc) [[2](https://nytimes.com/wirecutter/guides/practical-guide-to-securing-your-mac)], [NPO Radio 1](https://nporadio1.nl/nieuws/binnenland/8eaff3a2-8b29-4f63-9b74-36d2b28b1fe1/ooit-online-eens-wat-doms-geplaatst-ga-jezelf-eens-googlen-en-kijk-dan-wat-je-tegenkomt), and [Wired](https://wired.com/story/firefox-mozilla-2022). ## History @@ -41,7 +41,7 @@ Privacy Guides was launched in September 2021 as a continuation of the [defunct] In 2022, we completed the transition of our main website framework from Jekyll to MkDocs, using the `mkdocs-material` documentation software. This change made open-source contributions to our site significantly easier for outsiders, because instead of needing to know complicated syntax to write posts effectively, contributing is now as easy as writing a standard Markdown document. -We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net/) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. +We additionally launched our new discussion forum at [discuss.privacyguides.net](https://discuss.privacyguides.net) as a community platform to share ideas and ask questions about our mission. This augments our existing community on Matrix, and replaced our previous GitHub Discussions platform, decreasing our reliance on proprietary discussion platforms. So far in 2023 we've launched international translations of our website in [French](/fr/), [Hebrew](/he/), and [Dutch](/nl/), with more languages on the way, made possible by our excellent translation team on [Crowdin](https://crowdin.com/project/privacyguides). We plan to continue carrying forward our mission of outreach and education, and finding ways to more clearly highlight the dangers of a lack of privacy awareness in the modern digital age, and the prevalence and harms of security breaches across the technology industry. diff --git a/i18n/zh/about/notices.md b/i18n/zh/about/notices.md index 7a094c98..de301595 100644 --- a/i18n/zh/about/notices.md +++ b/i18n/zh/about/notices.md @@ -29,7 +29,7 @@ Unless otherwise noted, all **content** on this website is made available under 这意味着您可以根据Creative Commons Attribution-NoDerivatives 4.0国际公共许可证文本中列出的条款,将此存储库中的可读内容用于您自己的项目。 您可以以任何合理的方式这样做,但不得以任何方式暗示隐私指南认可您或您的使用。 **未经本项目的明确批准,您 **,不得在您自己的项目中使用隐私指南的品牌。 隐私指南的品牌商标包括“隐私指南”字样和盾形标志。 -我们认为从第三方提供商获得的 `资产` 中的标志和其他图像属于公共领域或 **合理使用**。 简而言之,法律 [公正使用原则](https://www.copyright.gov/fair-use/more-info.html) 允许使用受版权保护的图像来识别主题,以供公众评论。 然而,在一个或多个司法管辖区,这些徽标和其他图像仍可能受商标法的约束。 在使用此内容之前,请确保其用于识别拥有商标的实体或组织,并且根据适用于您预期使用情况的法律,您有权使用商标。 *从本网站复制内容时,您应自行负责确保您不侵犯他人的商标或版权。* +我们认为从第三方提供商获得的 `资产` 中的标志和其他图像属于公共领域或 **合理使用**。 In a nutshell, legal [fair use doctrine](https://copyright.gov/fair-use/more-info.html) allows the use of copyrighted images in order to identify the subject matter for purposes of public comment. 然而,在一个或多个司法管辖区,这些徽标和其他图像仍可能受商标法的约束。 在使用此内容之前,请确保其用于识别拥有商标的实体或组织,并且根据适用于您预期使用情况的法律,您有权使用商标。 *从本网站复制内容时,您应自行负责确保您不侵犯他人的商标或版权。* When you contribute to our website you are doing so under the above licenses, and you are granting Privacy Guides a perpetual, worldwide, non-exclusive, transferable, royalty-free, irrevocable license with the right to sublicense such rights through multiple tiers of sublicensees, to reproduce, modify, display, perform and distribute your contribution as part of our project. @@ -47,4 +47,4 @@ When you contribute to our website you are doing so under the above licenses, an --- -*本通知本身的部分内容来自GitHub上的 [openensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) 。 That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0/).* +*本通知本身的部分内容来自GitHub上的 [openensource.guide](https://github.com/github/opensource.guide/blob/master/notices.md) 。 That resource and this page itself are released under [CC-BY-4.0](https://creativecommons.org/licenses/by-sa/4.0).* diff --git a/i18n/zh/about/privacytools.md b/i18n/zh/about/privacytools.md index 23d34708..3868111b 100644 --- a/i18n/zh/about/privacytools.md +++ b/i18n/zh/about/privacytools.md @@ -14,13 +14,13 @@ title: "隐私工具常见问题" PrivacyTools由“BurungHantu”于2015年创立,他希望在斯诺登揭露事件后创造一个隐私信息资源--实用的工具。 该网站发展成为一个蓬勃发展的开源项目,有 [个众多贡献者](https://github.com/privacytools/privacytools.io/graphs/contributors),其中一些最终承担了各种组织责任,例如运营Matrix和Mastodon等在线服务,管理和审查GitHub网站的变化,为该项目寻找赞助商,撰写博客文章,以及运营Twitter等社交媒体外联平台等。 -从2019年开始, BurungHantu越来越远离网站和社区的积极发展,并开始延迟与我们运营的服务器相关的付款。 为了避免我们的系统管理员自掏腰包支付服务器费用,我们将网站上列出的捐赠方式从BurungHantu的个人PayPal和加密货币账户改为新的OpenCollective页面, [,2019年10月31日](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation/)。 这具有额外的好处,使我们的财务完全透明,我们坚信这一价值,并且在美国可以免税,因为它们由开放集体基金会501 (c) 3持有。 这一变动得到了团队的一致同意,没有引起争议。 +从2019年开始, BurungHantu越来越远离网站和社区的积极发展,并开始延迟与我们运营的服务器相关的付款。 To avoid having our system administrator pay server costs out of their own pocket, we changed the donation methods listed on the site from BurungHantu's personal PayPal and crypto accounts to a new OpenCollective page on [October 31, 2019](https://web.archive.org/web/20210729184557/https://blog.privacytools.io/privacytools-io-joins-the-open-collective-foundation). 这具有额外的好处,使我们的财务完全透明,我们坚信这一价值,并且在美国可以免税,因为它们由开放集体基金会501 (c) 3持有。 这一变动得到了团队的一致同意,没有引起争议。 ## 我们为什么要继续前进 2020年, BurungHantu的缺席变得更加明显。 有一次,我们要求将该域名的名称服务器改为由我们的系统管理员控制的名称服务器,以避免未来的中断,而这一改变在最初的要求后一个多月才完成。 他在Matrix的公共聊天室和私人团队聊天室里一连消失了好几个月,偶尔会突然出现,给一些小的反馈,或者承诺会更加活跃,然后再次消失。 -2020年10月,PrivacyTools 系统管理员 (Jonah) [因这些困难离开了](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over/) 这个项目,将控制权交给另一个长期贡献者。 Jonah一直在操作几乎所有的PrivacyTools服务,并在BurungHantu不在的情况下担任 *事实上的网站开发项目负责人,因此他的离开对组织来说是一个重大变化。 当时,由于这些重大的组织变化,BurungHantu向剩余的团队承诺,他将回来控制这个项目的发展。 在接下来的几个月里, PrivacyTools团队通过几种沟通方式进行了联系,但没有收到任何回复。

+In October 2020, the PrivacyTools system administrator (Jonah) [left](https://web.archive.org/web/20210729190742/https://blog.privacytools.io/blacklight447-taking-over) the project because of these difficulties, handing control to another long-time contributor. Jonah一直在操作几乎所有的PrivacyTools服务,并在BurungHantu不在的情况下担任 *事实上的网站开发项目负责人,因此他的离开对组织来说是一个重大变化。 当时,由于这些重大的组织变化,BurungHantu向剩余的团队承诺,他将回来控制这个项目的发展。 在接下来的几个月里, PrivacyTools团队通过几种沟通方式进行了联系,但没有收到任何回复。

## 域名可靠性 @@ -34,34 +34,25 @@ PrivacyTools由“BurungHantu”于2015年创立,他希望在斯诺登揭露 ## 社区呼吁行动 - 在2021年7月底,我们 -,通知PrivacyTools社区,我们打算选择一个新的名字,并在一个新的域名上继续项目,将在2022年8月2日选择 [](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw)。 最后,"Privacy Guides "被选中, `privacyguides.org` 域名已经被Jonah拥有,用于2020年的一个副业项目,但没有得到发展。

- - +At the end of July 2021, we [informed](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) the PrivacyTools community of our intention to choose a new name and continue the project on a new domain, to be [chosen](https://web.archive.org/web/20210729190935/https://aragon.cloud/apps/forms/cMPxG9KyopapBbcw) on 2nd August 2022. 最后,"Privacy Guides "被选中, `privacyguides.org` 域名已经被Jonah拥有,用于2020年的一个副业项目,但没有得到发展。 ## 控制r/privacytoolsIO -在privacytools.io网站出现问题的同时,r/privacytoolsIO的管理团队也面临着管理该子版块的挑战。 该子版块一直以来都是基本独立于网站发展的,但BurungHantu也是该子版块的主要版主,而且他是唯一被授予 "完全控制 "特权的版主。 u/trai_dep是当时唯一活跃的版主, [,在2021年6月28日向Reddit的管理员发布了](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) ,要求获得主要版主职位和完全控制权限,以便对Subreddit进行必要的修改。 +在privacytools.io网站出现问题的同时,r/privacytoolsIO的管理团队也面临着管理该子版块的挑战。 该子版块一直以来都是基本独立于网站发展的,但BurungHantu也是该子版块的主要版主,而且他是唯一被授予 "完全控制 "特权的版主。 u/trai_dep was the only active moderator at the time, and [posted](https://reddit.com/comments/o9tllh) a request to Reddit's administrators on June 28, 2021, asking to be granted the primary moderator position and full control privileges, in order to make necessary changes to the Subreddit. Reddit要求子版块有活跃的版主。 如果主版主长时间不活动(如一年),主版主的位置可以重新任命给下一个版主。 为了使这一请求得到批准,BurungHantu必须在很长一段时间内完全不参与所有Reddit活动,这与他在其他平台上的行为是一致的。 - - > 如果你通过Reddit请求被撤掉了子版块的版主,那是因为你缺乏回应和缺乏活动,使该子版块有资格进行r/redditrequest转移。 > -> r/redditrequest是Reddit确保社区有积极的版主的方式,是 [版主行为准则的一部分](https://www.redditinc.com/policies/moderator-code-of-conduct)。 - - +> r/redditrequest is Reddit's way of making sure communities have active moderators and is part of the [Moderator Code of Conduct](https://redditinc.com/policies/moderator-code-of-conduct). ## 开始过渡 -2021年9月14日,我们 [,宣布](https://www.privacyguides.org/blog/2021/09/14/welcome-to-privacy-guides/) ,开始迁移到这个新领域。 - - +On September 14th, 2021, we [announced](https://blog.privacyguides.org/2021/09/14/welcome-to-privacy-guides) the beginning of our migration to this new domain: > [...] 我们发现有必要尽早进行这一转换,以确保人们尽快发现这一过渡。 这给了我们足够的时间来过渡域名,目前正在重定向到www.privacyguides.org,并希望给每个人足够的时间来注意这一变化,更新书签和网站等。 -这一变化 [,需要:](https://www.reddit.com/r/PrivacyGuides/comments/pnhn4a/rprivacyguides_privacyguidesorg_what_you_need_to/) +This change [entailed:](https://reddit.com/comments/pnhn4a) - 重定向 www.privacytools.io 到 [www.privacyguides.org](https://www.privacyguides.org)。 - 在GitHub上存档源代码,以保存我们过去的工作和问题跟踪器,我们继续使用该网站未来几个月的开发。 @@ -70,35 +61,27 @@ Reddit要求子版块有活跃的版主。 如果主版主长时间不活动( 事情似乎进行得很顺利,我们活跃的社区中的大多数人都完全按照我们的希望转换到我们的新项目。 - - ## 后续事件 -在过渡期后的大约一周,BurungHantu在近一年来首次回到了网上,然而我们团队中没有人愿意回到PrivacyTools,因为他历来不可靠。 他没有为自己的长期缺席道歉,而是立即展开攻势,将向隐私指南的过渡定位为对他和他的项目的攻击。 随后,当社区指出他缺席并放弃了这个项目时,他 [,删除了](https://www.reddit.com/r/privacytoolsIO/comments/pp9yie/comment/hd49wbn) ,其中许多帖子。 +在过渡期后的大约一周,BurungHantu在近一年来首次回到了网上,然而我们团队中没有人愿意回到PrivacyTools,因为他历来不可靠。 他没有为自己的长期缺席道歉,而是立即展开攻势,将向隐私指南的过渡定位为对他和他的项目的攻击。 He subsequently [deleted](https://reddit.com/comments/pp9yie/comment/hd49wbn) many of these posts when it was pointed out by the community that he had been absent and abandoned the project. 此时,BurungHantu声称他想继续自己的privacytools.io的工作,并要求我们删除从www.privacytools.io 到 [www.privacyguides.org](https://www.privacyguides.org)的重定向。 我们答应了他的请求,并要求他保持Matrix、Mastodon和PeerTube的子域名的活跃性,以便我们作为一项公共服务在社区内运行至少几个月,以便让这些平台上的用户能够轻松地迁移到其他账户。 由于我们所提供的服务的联合性质,它们与特定的域名联系在一起,使得迁移非常困难(在某些情况下不可能迁移)。 - 不幸的是,由于r/privacytoolsIO子版块的控制权没有按照BurungHantu的要求归还他(进一步信息见下文),这些子版块在10月初被 ,终止了任何仍在使用这些服务的用户的迁移可能性。

+Unfortunately, because control of the r/privacytoolsIO subreddit was not returned to BurungHantu at his demand (further information below), those subdomains were [cut off](https://reddit.com/comments/pymthv/comment/hexwrps) at the beginning of October, ending any migration possibilities to any users still using those services. 在这之后,BurungHantu对Jonah从项目中窃取捐款提出了不实指控。 BurungHantu在所谓的事件发生后有一年多的时间,但他从未让任何人知道,直到隐私指南迁移之后。 BurungHantu多次被要求提供证据,并要求团队 [和社区](https://twitter.com/TommyTran732/status/1526153536962281474),对其沉默的原因进行评论,但他没有这样做。 BurungHantu还在Twitter上发了一篇 [的帖子](https://twitter.com/privacytoolsIO/status/1510560676967710728) ,声称一名“律师”在Twitter上与他联系并提供建议,再次试图欺负我们让他控制我们的subreddit ,并作为他的诽谤运动的一部分,在假装成为受害者的同时,搅乱了隐私指南发布周围的水域。 - - ## PrivacyTools.io的现状 截至2022年9月25日,我们看到BurungHantu的整体计划在privacytools.io上实现,而这正是我们今天决定创建这个解释页的原因。 他运营的网站似乎是该网站的SEO优化版本,该网站推荐工具以换取经济补偿。 [最近,IVPN和Mullvad这两个VPN供应商几乎被隐私社区普遍推荐为](../vpn.md) ,并因其反对联盟计划的立场而备受关注,被从PrivacyTools中删除。 在他们的位置上? NordVPN、Surfshark、ExpressVPN和hide.me;巨大的VPN公司拥有不值得信赖的平台和商业行为,因其积极的营销和联盟计划而臭名昭著。 -==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews/) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. 我们这些真正为隐私而战的人并不是在相互斗争,也不是从出价最高的人那里得到我们的建议。 - - +==**PrivacyTools has become exactly the type of site we [warned against](https://web.archive.org/web/20210729205249/https://blog.privacytools.io/the-trouble-with-vpn-and-privacy-reviews) on the PrivacyTools blog in 2019.**== We've tried to keep our distance from PrivacyTools since the transition, but their continued harassment towards our project and now their absurd abuse of the credibility their brand gained over 6 years of open-source contributions is extremely troubling to us. 我们这些真正为隐私而战的人并不是在相互斗争,也不是从出价最高的人那里得到我们的建议。 ## r/privacytoolsIO 的现状 - 在推出 [r/PrivacyGuides](https://www.reddit.com/r/privacyguides),让u/trai_dep继续主持这两个子版块是不现实的,在社区同意过渡的情况下,r/privacytoolsIO在2021年11月1日的帖子中被 ,成为一个受限制的子版块。

- - +After the launch of [r/PrivacyGuides](https://reddit.com/r/privacyguides), it was impractical for u/trai_dep to continue moderating both subreddits, and with the community on-board with the transition, r/privacytoolsIO was [made](https://reddit.com/comments/qk7qrj) a restricted sub in a post on November 1st, 2021: > [...] 该小组的成长是PrivacyGuides.org团队数年来努力的结果。 还有你们每一个人。 > @@ -106,19 +89,16 @@ BurungHantu还在Twitter上发了一篇 [的帖子](https://twitter.com/privacyt 子版块不属于任何人,尤其不属于品牌持有人。 他们属于自己的社区,而社区及其版主做出了支持移至r/PrivacyGuides的决定。 - 在此后的几个月里,BurungHantu威胁并乞求将subreddit的控制权归还给他的账户, ,违反了Reddit的规则。

- - +In the months since, BurungHantu has threatened and begged for returning subreddit control to his account in [violation](https://reddit.com/r/redditrequest/wiki/top_mod_removal) of Reddit rules: > 不允许任何版主对删除请求进行报复。 对于一个拥有数千名剩余用户的社区来说,我们觉得把这个庞大的平台的控制权还给那个抛弃了它一年多的人,而且他现在经营着一个我们认为提供非常低质量信息的网站,这将是非常不尊重的。 对我们来说,保留该社区过去多年的讨论更为重要,因此u/trai_dep和其他子版块的管理团队做出决定,保持r/privacytoolsIO的现状。 - - ## OpenCollective Now -我们的筹款平台OpenCollective是另一个争论的焦点。 我们的立场是,OpenCollective是由我们的团队建立的,并由我们的团队管理,以资助我们目前经营的服务,而PrivacyTools不再做这些。 我们 ,就我们转向隐私指南的问题向所有的捐赠者进行了宣传,我们得到了赞助商和社区的一致支持。

+我们的筹款平台OpenCollective是另一个争论的焦点。 我们的立场是,OpenCollective是由我们的团队建立的,并由我们的团队管理,以资助我们目前经营的服务,而PrivacyTools不再做这些。 我们 +,就我们转向隐私指南的问题向所有的捐赠者进行了宣传,我们得到了赞助商和社区的一致支持。

因此,OpenCollective中的资金属于Privacy Guides,它们被赋予了我们的项目,而不是一个知名域名的所有者。 在2021年9月17日向捐赠者发布的公告中,我们向任何不同意我们立场的捐赠者提供退款,但没有人接受这一提议。 @@ -132,12 +112,12 @@ BurungHantu还在Twitter上发了一篇 [的帖子](https://twitter.com/privacyt 这个话题已经在我们社区的不同地方进行了广泛的讨论,而且似乎大多数人在阅读这个页面时都已经熟悉了导致转向隐私指南的事件。 我们以前关于这个问题的一些帖子可能有额外的细节,为了简洁起见,我们在这里省略了。 为了完整起见,它们已被链接到下面。 -- [2021年6月28日,请求控制r/privacytoolsIO](https://www.reddit.com/r/redditrequest/comments/o9tllh/requesting_rprivacytoolsio_im_only_active_mod_top/) -- [2021年7月27日,在PrivacyTools博客上宣布了我们的搬迁意向,由团队撰写](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools/) -- [2021年9月13日,在r/privacytoolsIO上宣布我们开始过渡到隐私指南。](https://www.reddit.com/r/privacytoolsIO/comments/pnql46/rprivacyguides_privacyguidesorg_what_you_need_to/) +- [2021年6月28日,请求控制r/privacytoolsIO](https://reddit.com/comments/o9tllh) +- [2021年7月27日,在PrivacyTools博客上宣布了我们的搬迁意向,由团队撰写](https://web.archive.org/web/20210729184422/https://blog.privacytools.io/the-future-of-privacytools) +- [2021年9月13日,在r/privacytoolsIO上宣布我们开始过渡到隐私指南。](https://reddit.com/pnql46) - [2021年9月17日,Jonah在OpenCollective上发布的公告](https://opencollective.com/privacyguides/updates/transitioning-to-privacy-guides) - [2021 年9月30日,Twitter 主题详细介绍了本页上描述的大部分事件](https://twitter.com/privacy_guides/status/1443633412800225280) -- [2021年10月1日,u/dng99发帖指出子域名失败。](https://www.reddit.com/r/PrivacyGuides/comments/pymthv/comment/hexwrps/) -- [2022年4月2日u/dng99对PrivacyTools的指责性博文的回应](https://www.reddit.com/comments/tuo7mm/comment/i35kw5a/) +- [2021年10月1日,u/dng99发帖指出子域名失败。](https://reddit.com/comments/pymthv/comment/hexwrps) +- [2022年4月2日u/dng99对PrivacyTools的指责性博文的回应](https://reddit.com/comments/tuo7mm/comment/i35kw5a) - [2022年5月16日,由@TommyTran732在Twitter上回应](https://twitter.com/TommyTran732/status/1526153497984618496) - [2022年9月3日在Techlore的论坛上发表的帖子:@dngray](https://discuss.techlore.tech/t/has-anyone-seen-this-video-wondering-your-thoughts/792/20) diff --git a/i18n/zh/advanced/communication-network-types.md b/i18n/zh/advanced/communication-network-types.md index 34027cdb..2605946f 100644 --- a/i18n/zh/advanced/communication-network-types.md +++ b/i18n/zh/advanced/communication-network-types.md @@ -28,7 +28,7 @@ description: 即时信息应用程序常用的几种网络架构的概述。 - 可以包括 [访问限制和审查](https://drewdevault.com/2018/08/08/Signal.html)。 这可能包括以下内容: - 封禁将可能提供更灵活的定制或更好的体验的[第三方客户端](https://github.com/LibreSignal/LibreSignal/issues/37#issuecomment-217211165)。 通常在使用条款和条件中定义。 - 为第三方开发者提供的文件很差或没有。 -- 当单个实体控制服务时,[所有权](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire/),隐私政策和服务的行为很容易改变,可能会在以后危及服务。 +- The [ownership](https://web.archive.org/web/20210729191953/https://blog.privacytools.io/delisting-wire), privacy policy, and operations of the service can change easily when a single entity controls it, potentially compromising the service later on. - 自托管需要耐心和知识。 ## 联邦网络 @@ -60,7 +60,7 @@ description: 即时信息应用程序常用的几种网络架构的概述。 点对点聊天软件连接到一个由节点组成的 [分布式网络](https://en.wikipedia.org/wiki/Distributed_networking) ,在没有第三方服务器的情况下将信息转发给收件人。 -客户端(对等节点)通常通过使用 [分布式网络](https://en.wikipedia.org/wiki/Distributed_computing) 找到对方。 这方面的例子包括 [分布式哈希表](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT),由 [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) 和 [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) 等使用。 另一种方法是基于近距离的网络,通过WiFi或蓝牙建立连接(例如,Briar或 [Scuttlebutt](https://www.scuttlebutt.nz) 社交网络协议)。 +客户端(对等节点)通常通过使用 [分布式网络](https://en.wikipedia.org/wiki/Distributed_computing) 找到对方。 这方面的例子包括 [分布式哈希表](https://en.wikipedia.org/wiki/Distributed_hash_table) (DHT),由 [torrents](https://en.wikipedia.org/wiki/BitTorrent_(protocol)) 和 [IPFS](https://en.wikipedia.org/wiki/InterPlanetary_File_System) 等使用。 Another approach is proximity based networks, where a connection is established over WiFi or Bluetooth (for example, Briar or the [Scuttlebutt](https://scuttlebutt.nz) social network protocol). 一旦一个节点通过这些方法中的任何一种找到了通往其联系人的路线,它们之间就会建立直接连接。 虽然信息通常是加密的,但观察者仍然可以推断出发件人和收件人的位置和身份。 diff --git a/i18n/zh/advanced/dns-overview.md b/i18n/zh/advanced/dns-overview.md index 3ada5526..0bd4eb54 100644 --- a/i18n/zh/advanced/dns-overview.md +++ b/i18n/zh/advanced/dns-overview.md @@ -18,7 +18,7 @@ DNS自互联网的 [早期](https://en.wikipedia.org/wiki/Domain_Name_System#His ### 未加密DNS -1. 使用 [`tshark`](https://www.wireshark.org/docs/man-pages/tshark.html) ( [Wireshark](https://en.wikipedia.org/wiki/Wireshark) 项目的一部分),我们可以监测和记录互联网数据包流。 此命令记录符合指定规则的数据包: +1. Using [`tshark`](https://wireshark.org/docs/man-pages/tshark.html) (part of the [Wireshark](https://en.wikipedia.org/wiki/Wireshark) project) we can monitor and record internet packet flow. 此命令记录符合指定规则的数据包: ```bash tshark -w /tmp/dns.pcap udp port 53 and host 1.1.1.1 or host 8.8.8.8 @@ -39,7 +39,7 @@ DNS自互联网的 [早期](https://en.wikipedia.org/wiki/Domain_Name_System#His nslookup privacyguides.org 8.8.8.8 ``` -3. 接下来,我们来 [分析](https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) 输出的结果: +3. Next, we want to [analyse](https://wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroWhatIs) the results: === "Wireshark" @@ -74,7 +74,7 @@ DNS自互联网的 [早期](https://en.wikipedia.org/wiki/Domain_Name_System#His ### DNS over TLS (DoT) -[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) 是另一种加密DNS通信的方法,在 [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858)中被定义。 首次得到支持是在安卓9、iOS 14和Linux上,被版本号237的 [systemd-resolved](https://www.freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) 实现。 近年来,业界的偏好已经从DoT转向DoH,因为DoT是一个 [复杂的协议](https://dnscrypt.info/faq/) ,并且在现有的实现中对RFC的遵守情况各不相同。 DoT也在一个专用的853端口上运行,该端口很容易被限制性的防火墙阻断。 +[**DNS over TLS**](https://en.wikipedia.org/wiki/DNS_over_TLS) 是另一种加密DNS通信的方法,在 [RFC 7858](https://datatracker.ietf.org/doc/html/rfc7858)中被定义。 Support was first implemented in Android 9, iOS 14, and on Linux in [systemd-resolved](https://freedesktop.org/software/systemd/man/resolved.conf.html#DNSOverTLS=) in version 237. Preference in the industry has been moving away from DoT to DoH in recent years, as DoT is a [complex protocol](https://dnscrypt.info/faq) and has varying compliance to the RFC across the implementations that exist. DoT也在一个专用的853端口上运行,该端口很容易被限制性的防火墙阻断。 ### DNS over HTTPS (DoH) @@ -106,7 +106,7 @@ DoH的原生实现出现在iOS 14、macOS 11、微软Windows和Android 13中( wireshark -r /tmp/dns_doh.pcap ``` -我们可以看到任何加密连接都需要发生的 [连接建立](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) 和 [TLS握手](https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/) 过程。 当查看下面的“应用程序数据”数据包时,没有一个数据包包含我们请求的域或返回的IP地址。 +We can see the [connection establishment](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) and [TLS handshake](https://cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake) that occurs with any encrypted connection. 当查看下面的“应用程序数据”数据包时,没有一个数据包包含我们请求的域或返回的IP地址。 ## 为什么我**不应该** 使用加密的DNS? @@ -158,13 +158,9 @@ DoH的原生实现出现在iOS 14、macOS 11、微软Windows和Android 13中( tshark -r /tmp/pg.pcap -Tfields -Y tls.handshake.extensions_server_name -e tls.handshake.extensions_server_name ``` -这意味着即使我们使用 "加密DNS "服务器,域名也可能通过SNI被披露。 [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) 协议带来了 [Client Hello](https://blog.cloudflare.com/encrypted-client-hello/),可以防止这种泄漏。 - - 各国政府,特别是 [中国](https://www.zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni/) 和 [俄罗斯](https://www.zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni/),已经开始阻止 - -,或表示希望这样做。 [最近,俄罗斯开始封锁使用 [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) 标准的外国网站](https://github.com/net4people/bbs/issues/108)。 这是因为作为HTTP/3一部分的 [QUIC](https://en.wikipedia.org/wiki/QUIC) 协议要求 `ClientHello` 也被加密。

- +这意味着即使我们使用 "加密DNS "服务器,域名也可能通过SNI被披露。 The [TLS v1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3) protocol brings with it [Encrypted Client Hello](https://blog.cloudflare.com/encrypted-client-hello), which prevents this kind of leak. +Governments, in particular [China](https://zdnet.com/article/china-is-now-blocking-all-encrypted-https-traffic-using-tls-1-3-and-esni) and [Russia](https://zdnet.com/article/russia-wants-to-ban-the-use-of-secure-protocols-such-as-tls-1-3-doh-dot-esni), have either already [started blocking](https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypted_Client_Hello) it or expressed a desire to do so. [最近,俄罗斯开始封锁使用 [HTTP/3](https://en.wikipedia.org/wiki/HTTP/3) 标准的外国网站](https://github.com/net4people/bbs/issues/108)。 这是因为作为HTTP/3一部分的 [QUIC](https://en.wikipedia.org/wiki/QUIC) 协议要求 `ClientHello` 也被加密。 ### 在线证书状态协议(OCSP) @@ -174,66 +170,46 @@ DoH的原生实现出现在iOS 14、macOS 11、微软Windows和Android 13中( 我们可以使用 [`openssl`](https://en.wikipedia.org/wiki/OpenSSL) 命令来模拟浏览器会做什么。 -1. 获取服务器证书,并使用 [`sed`](https://en.wikipedia.org/wiki/Sed) ,只保留重要部分,并将其写入文件。 - - +1. 获取服务器证书,并使用 [`sed`](https://en.wikipedia.org/wiki/Sed) ,只保留重要部分,并将其写入文件。 ```bash openssl s_client -connect privacyguides.org:443 < /dev/null 2>&1 | sed -n '/^-*BEGIN/,/^-*END/p' > /tmp/pg_server.cert ``` - -2. 获得中间证书。 [证书颁发机构(CA)](https://en.wikipedia.org/wiki/Certificate_authority) ,通常不直接签署证书;他们使用所谓的 "中间 "证书。 - - +2. 获得中间证书。 [证书颁发机构(CA)](https://en.wikipedia.org/wiki/Certificate_authority) ,通常不直接签署证书;他们使用所谓的 "中间 "证书。 ```bash openssl s_client -showcerts -connect privacyguides.org:443 < /dev/null 2>&1 | sed -n '/^-*BEGIN/,/^-*END/p' > /tmp/pg_and_intermediate.cert ``` - -3. `pg_and_intermediate.cert` 中的第一个证书实际上是步骤1中的服务器证书。 我们可以再次使用 `sed` ,删除直到END的第一个实例。 - - +3. `pg_and_intermediate.cert` 中的第一个证书实际上是步骤1中的服务器证书。 我们可以再次使用 `sed` ,删除直到END的第一个实例。 ```bash sed -n '/^-*END CERTIFICATE-*$/!d;:a n;p;ba' \ /tmp/pg_and_intermediate.cert > /tmp/intermediate_chain.cert ``` - -4. 获取服务器证书的OCSP应答器。 - - +4. 获取服务器证书的OCSP应答器。 ```bash openssl x509 -noout -ocsp_uri -in /tmp/pg_server.cert ``` - -我们的证书显示的是Lets Encrypt证书响应者。 如果我们想查看证书的所有详细信息,我们可以使用: - - + 我们的证书显示的是Lets Encrypt证书响应者。 如果我们想查看证书的所有详细信息,我们可以使用: ```bash openssl x509 -text -noout -in /tmp/pg_server.cert ``` - -5. 开始捕获数据包。 - - +5. 开始捕获数据包。 ```bash tshark -w /tmp/pg_ocsp.pcap -f "tcp port http" ``` - -6. 提出OCSP请求。 - - +6. 提出OCSP请求。 ```bash openssl ocsp -issuer /tmp/intermediate_chain.cert \ @@ -242,19 +218,13 @@ DoH的原生实现出现在iOS 14、macOS 11、微软Windows和Android 13中( -url http://r3.o.lencr.org ``` - -7. 打开捕获。 - - +7. 打开捕获。 ```bash wireshark -r /tmp/pg_ocsp.pcap ``` - -在 "OCSP "协议中会有两个数据包:一个 "请求 "和一个 "响应"。 对于 "请求",我们可以通过展开每个字段旁边的三角形 ▸ ,看到 "序列号"。 - - + 在 "OCSP "协议中会有两个数据包:一个 "请求 "和一个 "响应"。 对于 "请求",我们可以通过展开每个字段旁边的三角形 ▸ ,看到 "序列号"。 ```bash ▸ Online Certificate Status Protocol @@ -265,10 +235,7 @@ DoH的原生实现出现在iOS 14、macOS 11、微软Windows和Android 13中( serialNumber ``` - -对于 "回应",我们也可以看到 "序列号"。 - - + 对于 "回应",我们也可以看到 "序列号"。 ```bash ▸ Online Certificate Status Protocol @@ -281,26 +248,18 @@ DoH的原生实现出现在iOS 14、macOS 11、微软Windows和Android 13中( serialNumber ``` - -8. 或者使用 `tshark` 来过滤序列号的数据包。 - - +8. 或者使用 `tshark` 来过滤序列号的数据包。 ```bash tshark -r /tmp/pg_ocsp.pcap -Tfields -Y ocsp.serialNumber -e ocsp.serialNumber ``` - 如果网络观察者拥有公开的公共证书,他们可以将序列号与该证书相匹配,从而从中确定你所访问的网站。 这个过程可以自动化,并能将IP地址与序列号联系起来。 也可以检查 [证书透明度](https://en.wikipedia.org/wiki/Certificate_Transparency) 日志中的序列号。 - - ## 我应该使用加密的DNS吗? 我们做了这个流程图来描述你什么时候 *应该* 使用加密的DNS。 - - ``` mermaid 图TB 开始[Start] --> 匿名{尝试
匿名?} @@ -316,13 +275,10 @@ DoH的原生实现出现在iOS 14、macOS 11、微软Windows和Android 13中( ispDNS --> | 否 | nothing(什么都不做) ``` - 第三方的加密DNS应该只用于绕过重定向和基本的 [DNS拦截](https://en.wikipedia.org/wiki/DNS_blocking) ,当你能确定不会有任何后果,或者你对一个能做一些基本过滤的供应商感兴趣时。 [推荐的DNS服务器列表](../dns.md ""){.md-button} - - ## 什么是DNSSEC? [域名系统安全扩展](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) (DNSSEC)是DNS的一项功能,对域名查询的响应进行认证。 它不为这些查询提供隐私保护,而是防止攻击者操纵或毒害对DNS请求的响应。 @@ -333,9 +289,7 @@ DNSSEC的签署过程类似于某人用笔签署一份法律文件;该人用 DNSSEC在DNS的所有层面上实现了分层的数字签名政策。 例如,在 `privacyguides.org` 查询的情况下,根 DNS 服务器将签署 `.org` 名称服务器的密钥,然后 `.org` 名称服务器将签署 `privacyguides.org`的权威名称服务器的密钥。 -改编自Google的[DNS安全扩展(DNSSEC)概述](https://cloud.google.com/dns/docs/dnssec)和Cloudflare的[DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction/),两者均以[CC BY 4.0](https://creativecommons.org/licenses/by/4.0/)授权。 - - +Adapted from [DNS Security Extensions (DNSSEC) overview](https://cloud.google.com/dns/docs/dnssec) by Google and [DNSSEC: An Introduction](https://blog.cloudflare.com/dnssec-an-introduction) by Cloudflare, both licensed under [CC BY 4.0](https://creativecommons.org/licenses/by/4.0). ## 什么是QNAME最小化? @@ -347,7 +301,6 @@ DNSSEC在DNS的所有层面上实现了分层的数字签名政策。 例如, | .net 的服务器 | discuss.privacyguides.net 的 IP 地址是什么? | 我不知道,问 Privacy Guides 的服务器... | | Privacy Guides 的服务器 | discuss.privacyguides.net 的 IP 地址是什么? | 5.161.195.190! | - 有了 “QNAME 最小化” 技术,DNS 解析器现在只请求能够找到链中的下一个服务器的信息。 在这个例子中,根服务器只要求提供足够的信息,以便能够找到 .net TLD 的名称服务器,以此类推,而不会知道您要访问的完整域名: | 服务器 | 询问 | 响应 | @@ -357,11 +310,8 @@ DNSSEC在DNS的所有层面上实现了分层的数字签名政策。 例如, | Privacy Guides 的服务器 | discuss.privacyguides.net 的名称服务器是什么? | 就是此服务器! | | Privacy Guides 的服务器 | discuss.privacyguides.net 的 IP 地址是什么? | 5.161.195.190 | - 虽然这个过程的效率会稍低一些,但在这个例子中,中央根域名服务器和顶级域名的域名服务器都不会收到您的 *完整* 查询的信息,从而减少了有关您的浏览习惯的信息传输量。 进一步的技术描述在 [RFC 7816](https://datatracker.ietf.org/doc/html/rfc7816)中定义。 - - ## 什么是EDNS客户子网(ECS)? [EDNS 客户端子网](https://en.wikipedia.org/wiki/EDNS_Client_Subnet) 是递归 DNS 解析器为 [主机或客户端](https://en.wikipedia.org/wiki/Client_(computing)) 进行 DNS 查询时,指定一个 [子网](https://en.wikipedia.org/wiki/Subnetwork) 的一种方法。 diff --git a/i18n/zh/advanced/payments.md b/i18n/zh/advanced/payments.md index df356a03..99777425 100644 --- a/i18n/zh/advanced/payments.md +++ b/i18n/zh/advanced/payments.md @@ -9,7 +9,7 @@ There's a reason data about your buying habits is considered the holy grail of a For centuries, **cash** has functioned as the primary form of private payment. Cash has excellent privacy properties in most cases, is widely accepted in most countries, and is **fungible**, meaning it is non-unique and completely interchangable. -Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://www.irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. +Cash payment laws vary by country. In the United States, special disclosure is required for cash payments over $10,000 to the IRS on [Form 8300](https://irs.gov/businesses/small-businesses-self-employed/form-8300-and-reporting-cash-payments-of-over-10000). The receiving business is required to ID verify the payee’s name, address, occupation, date of birth, and Social Security Number or other TIN (with some exceptions). Lower limits without ID such as $3,000 or less exist for exchanges and money transmission. Cash also contains serial numbers. These are almost never tracked by merchants, but they can be used by law enforcement in targeted investigations. Despite this, it’s typically the best option. @@ -60,7 +60,7 @@ There are a number of cryptocurrency projects which purport to provide privacy b - [Recommended Cryptocurrency :material-arrow-right-drop-circle:](../cryptocurrency.md#coins) -Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://www.forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. +Privacy coins have been subject to increasing scrutiny by government agencies. In 2020, [the IRS published a $625,000 bounty](https://forbes.com/sites/kellyphillipserb/2020/09/14/irs-will-pay-up-to-625000-if-you-can-crack-monero-other-privacy-coins/?sh=2e9808a085cc) for tools which can break Bitcoin Lightning Network and/or Monero's transaction privacy. They ultimately [paid two companies](https://sam.gov/opp/5ab94eae1a8d422e88945b64181c6018/view) (Chainalysis and Integra Fec) a combined $1.25 million for tools which purport to do so (it is unknown which cryptocurrency network these tools target). Due to the secrecy surrounding tools like these, ==none of these methods of tracing cryptocurrencies have been independently confirmed.== However, it is quite likely that tools which assist targeted investigations into private coin transactions exist, and that privacy coins only succeed in thwarting mass surveillance. ### Other Coins (Bitcoin, Ethereum, etc.) @@ -76,7 +76,7 @@ With cryptocurrency there are two forms of wallets: custodial wallets and noncus ### Acquisition -Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co/), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com/), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. +Acquiring [cryptocurrencies](../cryptocurrency.md) like Monero privately can be difficult. P2P marketplaces like [LocalMonero](https://localmonero.co), a platform which facilitates trades between people, are one option that can be used. If using an exchange which requires KYC is an acceptable risk for you as long as subsequent transactions can't be traced, a much easier option is to purchase Monero on an exchange like [Kraken](https://kraken.com), or purchase Bitcoin/Litecoin from a KYC exchange which can then be swapped for Monero. Then, you can withdraw the purchased Monero to your own noncustodial wallet to use privately from that point forward. If you go this route, make sure to purchase Monero at different times and in different amounts than where you will spend it. If you purchase $5000 of Monero at an exchange and make a $5000 purchase in Monero an hour later, those actions could potentially be correlated by an outside observer regardless of which path the Monero took. Staggering purchases and purchasing larger amounts of Monero in advance to later spend on multiple smaller transactions can avoid this pitfall. diff --git a/i18n/zh/advanced/tor-overview.md b/i18n/zh/advanced/tor-overview.md index 9a1d71f7..cf0eedcb 100644 --- a/i18n/zh/advanced/tor-overview.md +++ b/i18n/zh/advanced/tor-overview.md @@ -21,7 +21,7 @@ If you have the ability to access a trusted VPN provider and **any** of the foll Because we already [generally recommend](../basics/vpn-overview.md) that the vast majority of people use a trusted VPN provider for a variety of reasons, the following recommendation about connecting to Tor via a VPN likely applies to you. There is no need to disable your VPN before connecting to Tor, as some online resources would lead you to believe. -Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax/) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. +Connecting directly to Tor will make your connection stand out to any local network administrators or your ISP. Detecting and correlating this traffic [has been done](https://edition.cnn.com/2013/12/17/justice/massachusetts-harvard-hoax) in the past by network administrators to identify and deanonymize specific Tor users on their network. On the other hand, connecting to a VPN is almost always less suspicious, because commercial VPN providers are used by everyday consumers for a variety of mundane tasks like bypassing geo-restrictions, even in countries with heavy internet restrictions. Therefore, you should make an effort to hide your IP address **before** connecting to the Tor network. You can do this by simply connecting to a VPN (through a client installed on your computer) and then accessing [Tor](../tor.md) as normal, through Tor Browser for example. This creates a connection chain like: @@ -72,7 +72,7 @@ As we've alluded to already, Tor is also easily identifiable on the network. Unl ### Tor usage is not undetectable -**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://www.hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://www.hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. +**Even if you use bridges and pluggable transports,** the Tor Project provides no tools to hide the fact that you are using Tor from your ISP. Even using obfuscated "pluggable transports" or non-public bridges do not hide the fact that you are using a private communications channel. The most popular pluggable transports like obfs4 (which obfuscates your traffic to "look like nothing") and meek (which uses domain fronting to camouflage your traffic) can be [detected](https://hackerfactor.com/blog/index.php?/archives/889-Tor-0day-Burning-Bridges.html) with fairly standard traffic analysis techniques. Snowflake has similar issues, and can be [easily detected](https://hackerfactor.com/blog/index.php?/archives/944-Tor-0day-Snowflake.html) *before* a Tor connection is even established. Pluggable transports other than these three do exist, but typically rely on security through obscurity to evade detection. They aren't impossible to detect, they are just used by so few people that it's not worth the effort building detectors for them. They shouldn't be relied upon if you specifically are being monitored. @@ -193,6 +193,6 @@ It is [possible](https://discuss.privacyguides.net/t/clarify-tors-weaknesses-wit - [Tor 是如何工作的 - Computerphile](https://invidious.privacyguides.net/embed/QRYzre4bf7I?local=true) (YouTube) - [Tor 暗网服务 - Computerphile](https://invidious.privacyguides.net/embed/lVcbq_a5N9I?local=true) (YouTube) -[^1]: 您线路上的第一个中继称为“入口警卫“或“警卫”。 它是一个快速而稳定的中继,会在2-3个月内持续作为你的线路的第一个中继,以防止已知的破坏匿名性的攻击。 你的线路其余部分会随着你访问的每个新网站而改变,所有这些中继器一起提供Tor的全部隐私保护。 关于警卫中继器如何工作的更多信息,请参阅这篇 [博文](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) 和 [关于入口警卫的论文](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf)。 ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2/)) +[^1]: 您线路上的第一个中继称为“入口警卫“或“警卫”。 它是一个快速而稳定的中继,会在2-3个月内持续作为你的线路的第一个中继,以防止已知的破坏匿名性的攻击。 你的线路其余部分会随着你访问的每个新网站而改变,所有这些中继器一起提供Tor的全部隐私保护。 关于警卫中继器如何工作的更多信息,请参阅这篇 [博文](https://blog.torproject.org/improving-tors-anonymity-changing-guard-parameters) 和 [关于入口警卫的论文](https://www-users.cs.umn.edu/~hoppernj/single_guard.pdf)。 ([https://support.torproject.org/tbb/tbb-2/](https://support.torproject.org/tbb/tbb-2)) [^2]: 中继标志:由目录权限分配并在目录协议规范中进一步定义的线路位置(例如, “Guard”、“Exit”、“BadExit” )、线路属性(例如, “Fast”、“Stable” )或角色(例如, “Authority”、“HSDir” )的中继的特殊( dis- )限定。 ([https://metrics.torproject.org/glossary.html](https://metrics.torproject.org/glossary.html)) diff --git a/i18n/zh/android.md b/i18n/zh/android.md index 403cd627..adf23987 100644 --- a/i18n/zh/android.md +++ b/i18n/zh/android.md @@ -83,9 +83,9 @@ schema: **安卓开源项目** 是一个由谷歌领导的开源移动操作系统,为世界上大多数移动设备提供动力。 大多数使用安卓系统销售的手机都经过修改,包括侵入性的集成和应用程序,如谷歌游戏服务,所以你可以通过用没有这些侵入性功能的安卓系统版本替换你的手机默认安装,来大大改善你在移动设备上的隐私。 -[:octicons-home-16:](https://source.android.com/){ .card-link title="首页" } -[:octicons-info-16:](https://source.android.com/docs){ .card-link title=文档} -[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="源代码" } +[:octicons-home-16:](https://source.android.com){ .card-link title=Homepage } +[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation} +[:octicons-code-16:](https://cs.android.com/android/platform/superproject){ .card-link title="Source Code" } 这些是我们推荐的安卓操作系统、设备和应用程序,以最大限度地提高你的移动设备的安全和隐私。 要了解更多关于安卓的信息。 @@ -113,27 +113,27 @@ We recommend installing one of these custom Android operating systems on your de GrapheneOS提供了额外的[安全加固](https://en.wikipedia.org/wiki/Hardening_(计算))和隐私改进。 它有一个[加固的内存分配器](https://github.com/GrapheneOS/hardened_malloc)、网络和传感器权限,以及其他各种[安全功能](https://grapheneos.org/features)。 GrapheneOS还带有完整的固件更新和签名构建,因此完全支持验证性启动。 -[:octicons-home-16: 主页](https://grapheneos.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="隐私政策" } -[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=文档} -[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="源代码" } -[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title="贡献" } +[:octicons-home-16: Homepage](https://grapheneos.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation} +[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" } +[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute } -GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. +GrapheneOS supports [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), which runs [Google Play Services](https://en.wikipedia.org/wiki/Google_Play_Services) fully sandboxed like any other regular app. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice. Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support). -[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button} +[Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos ""){.md-button} ### DivestOS
-![DivestOS标志](assets/img/android/divestos.svg){ align=right } +![DivestOS logo](assets/img/android/divestos.svg){ align=right } -**DivestOS**是 [LineageOS](https://lineageos.org/)的一个软分叉。 +**DivestOS** is a soft-fork of [LineageOS](https://lineageos.org). DivestOS inherits many [supported devices](https://divestos.org/index.php?page=devices&base=LineageOS) from LineageOS. 它有签名的构建,使得在一些非Pixel设备上可以有[验证的启动](https://source.android.com/security/verifiedboot)。 [:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary } @@ -145,11 +145,11 @@ DivestOS inherits many [supported devices](https://divestos.org/index.php?page=d
-DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. +DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled. -DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). +DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features). -DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply. +DivestOS uses F-Droid as its default app store. We normally [recommend avoiding F-Droid](#f-droid), but doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) **with the DivestOS repositories enabled** to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.

警告

@@ -166,13 +166,13 @@ When purchasing a device, we recommend getting one as new as possible. The softw Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution. -Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://www.gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. +Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of it being entered in the [IMEI database](https://gsma.com/get-involved/working-groups/terminal-steering-group/imei-database). There is also a risk involved with you being associated with the activity of the previous owner. A few more tips regarding Android devices and operating system compatibility: - Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer. - Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with. -- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details! +- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net) to find details! ### Google Pixel @@ -194,7 +194,7 @@ Secure Elements like the Titan M2 are more limited than the processor's Trusted Google Pixel phones use a TEE OS called Trusty which is [open source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones. -The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company. +The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://nitrokey.com/about) company. A few more tips for purchasing a Google Pixel: @@ -220,14 +220,14 @@ Shelter支持阻止联系人跨档案搜索,并通过默认文件管理器([Do [:octicons-repo-16: Repository](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary } [:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribute } +[:octicons-heart-16:](https://patreon.com/PeterCxy){ .card-link title=Contribute }

警告

-推荐使用Shelter而不是 [Insular](https://secure-system.gitlab.io/Insular/)和 [Island](https://github.com/oasisfeng/island),因为它支持[联系人搜索屏蔽](https://secure-system.gitlab.io/Insular/faq.html)。 +Shelter is recommended over [Insular](https://secure-system.gitlab.io/Insular) and [Island](https://github.com/oasisfeng/island) as it supports [contact search blocking](https://secure-system.gitlab.io/Insular/faq.html). 当使用Shelter时,你完全信任它的开发者,因为Shelter作为一个[设备管理员](https://developer.android.com/guide/topics/admin/device-admin)来创建工作档案,它可以广泛地访问存储在工作档案中的数据。 @@ -322,11 +322,11 @@ Main privacy features include:
-Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk/) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. +Obtainium allows you to download APK installer files from a wide variety of sources, and it is up to you to ensure those sources and apps are legitimate. For example, using Obtainium to install Signal from [Signal's APK landing page](https://signal.org/android/apk) should be fine, but installing from third-party APK repositories like Aptoide or APKPure may pose additional risks. The risk of installing a malicious *update* is lower, because Android itself verifies that all app updates are signed by the same developer as the existing app on your phone before installing them. ### GrapheneOS应用商店 -GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. +GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to. ### 奥罗拉商店(Aurora Store) @@ -338,7 +338,7 @@ The Google Play Store requires a Google account to login which is not great for * *Aurora Store* *是Google Play Store客户端,无需Google帐户、Google Play服务或microG即可下载应用程序。 -[:octicons-home-16: Homepage](https://auroraoss.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://auroraoss.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://gitlab.com/AuroraOSS/AuroraStore/-/blob/master/POLICY.md){ .card-link title="Privacy Policy" } [:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Source Code" } @@ -375,7 +375,7 @@ On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools). -1. 安装 [Java JDK](https://www.oracle.com/java/technologies/downloads/)。 +1. Install [Java JDK](https://oracle.com/java/technologies/downloads). 2. 下载 [Android Studio命令行工具](https://developer.android.com/studio#command-tools)。 @@ -393,7 +393,7 @@ If you download APK files to install manually, you can verify their signature wi ./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk ``` -5. 然后,所产生的哈希值可以与另一个来源进行比较。 一些开发商,如Signal [,在其网站上显示了指纹](https://signal.org/android/apk/)。 +5. 然后,所产生的哈希值可以与另一个来源进行比较。 Some developers such as Signal [show the fingerprints](https://signal.org/android/apk) on their website. ```bash Signer #1 certificate DN: CN=GrapheneOS @@ -406,18 +406,18 @@ If you download APK files to install manually, you can verify their signature wi ![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px } -==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: +==We only recommend F-Droid as a way to obtain apps which cannot be obtained via the means above.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds) for some applications and is dedicated to free and open-source software. However, there are some security-related downsides to how F-Droid builds, signs, and delivers packages: Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust. Additionally, the requirements for an app to be included in the official F-Droid repo are less strict than other app stores like Google Play, meaning that F-Droid tends to host a lot more apps which are older, unmaintained, or otherwise no longer meet [modern security standards](https://developer.android.com/google/play/requirements/target-sdk). -Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. +Other popular third-party repositories for F-Droid such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can fully recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that repository if they are later added to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates. -That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk. +That said, the [F-Droid](https://f-droid.org/en/packages) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through other means such as the Play Store, Aurora Store, or by getting the APK directly from the developer. You should use your best judgement when looking for new apps via this method, and keep an eye on how frequently the app is updated. Outdated apps may rely on unsupported libraries, among other things, posing a potential security risk.

F-Droid Basic

-In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic/) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface). +In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org) is one example of this). If you really need an app like that, we recommend using the newer [F-Droid Basic](https://f-droid.org/en/packages/org.fdroid.basic) client instead of the original F-Droid app to obtain it. F-Droid Basic can do unattended updates without privileged extension or root, and has a reduced feature set (limiting attack surface).
diff --git a/i18n/zh/assets/img/how-tor-works/tor-encryption-dark.svg b/i18n/zh/assets/img/how-tor-works/tor-encryption-dark.svg index 95e68157..0f1e0716 100644 --- a/i18n/zh/assets/img/how-tor-works/tor-encryption-dark.svg +++ b/i18n/zh/assets/img/how-tor-works/tor-encryption-dark.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/zh/assets/img/how-tor-works/tor-encryption.svg b/i18n/zh/assets/img/how-tor-works/tor-encryption.svg index f5b1e291..f954fb0f 100644 --- a/i18n/zh/assets/img/how-tor-works/tor-encryption.svg +++ b/i18n/zh/assets/img/how-tor-works/tor-encryption.svg @@ -1,131 +1,129 @@ - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - Device - - - - Sending data to a website - - - - - Receiving data from a website - - - - - Your - - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - PrivacyGuides.org - - - - - Entry - - - - - Middle - - - - - Exit - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + Device + + + + Sending data to a website + + + + + Receiving data from a website + + + + + Your + + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + + + + PrivacyGuides.org + + + + + Entry + + + + + Middle + + + + + Exit + + + + + + + + + + + + + + + + + + + + diff --git a/i18n/zh/assets/img/how-tor-works/tor-path-dark.svg b/i18n/zh/assets/img/how-tor-works/tor-path-dark.svg index 9002c9b1..55f37c01 100644 --- a/i18n/zh/assets/img/how-tor-works/tor-path-dark.svg +++ b/i18n/zh/assets/img/how-tor-works/tor-path-dark.svg @@ -1,4 +1,4 @@ - + @@ -22,58 +22,60 @@ - - - Your - Device - - - - Entry - - - - - Middle - - - - - Exit - - - - - PrivacyGuides.org - - - - - - - - + + + + Your + Device + + + + Entry + + + + + Middle + + + + + Exit + + + + + PrivacyGuides.org + + - - - - - - + + + + + + - - - - - - + + + + + + - - - - - - + + + + + + + + + + + + + diff --git a/i18n/zh/assets/img/how-tor-works/tor-path-hidden-service-dark.svg b/i18n/zh/assets/img/how-tor-works/tor-path-hidden-service-dark.svg index d7fb035b..ce51beee 100644 --- a/i18n/zh/assets/img/how-tor-works/tor-path-hidden-service-dark.svg +++ b/i18n/zh/assets/img/how-tor-works/tor-path-hidden-service-dark.svg @@ -1,225 +1,136 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + + diff --git a/i18n/zh/assets/img/how-tor-works/tor-path-hidden-service.svg b/i18n/zh/assets/img/how-tor-works/tor-path-hidden-service.svg index 98a41573..8d008447 100644 --- a/i18n/zh/assets/img/how-tor-works/tor-path-hidden-service.svg +++ b/i18n/zh/assets/img/how-tor-works/tor-path-hidden-service.svg @@ -1,225 +1,134 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Your - - - Device - - - - - - Guard - - - Relay - - - Relay - - - - - hidden...onion - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Rendezvous - - - Relay - - - - - Entry - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Your + + + Device + + + Guard + + + Relay + + + Relay + + + hidden...onion + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + Rendezvous + + + Relay + + + Entry + + + + + + + + + + + + + + + + diff --git a/i18n/zh/assets/img/how-tor-works/tor-path.svg b/i18n/zh/assets/img/how-tor-works/tor-path.svg index cb53d8b1..3cbdbb38 100644 --- a/i18n/zh/assets/img/how-tor-works/tor-path.svg +++ b/i18n/zh/assets/img/how-tor-works/tor-path.svg @@ -1,4 +1,4 @@ - + diff --git a/i18n/zh/basics/account-deletion.md b/i18n/zh/basics/account-deletion.md index 598ca3fc..a1b034e3 100644 --- a/i18n/zh/basics/account-deletion.md +++ b/i18n/zh/basics/account-deletion.md @@ -4,25 +4,25 @@ icon: '资料/账户-删除' description: 积累大量互联网账户很容易,这里有一些关于如何控制您的账户数量的小贴士。 --- -随着时间的推移,很容易积累一些在线账户,其中许多账户你可能不再使用。 删除这些未使用的账户是找回隐私的一个重要步骤,因为休眠账户很容易受到数据泄露的影响。 数据泄露是指一项服务的安全性受到损害,受保护的信息被未经授权的人查看、传输或窃取。 不幸的是,而今数据泄露 [太过于常见](https://haveibeenpwned.com/PwnedWebsites) ,因此保持良好的数字卫生是将它们对你生活的影响降到最低的最好方法。 本指南的目标就是引导您经由令人讨厌的帐户删除过程来优化你的线上生活,这些过程通常采用了 [欺骗性设计](https://www.deceptive.design/)使得其变得更加困难。 +随着时间的推移,很容易积累一些在线账户,其中许多账户你可能不再使用。 删除这些未使用的账户是找回隐私的一个重要步骤,因为休眠账户很容易受到数据泄露的影响。 数据泄露是指一项服务的安全性受到损害,受保护的信息被未经授权的人查看、传输或窃取。 不幸的是,而今数据泄露 [太过于常见](https://haveibeenpwned.com/PwnedWebsites) ,因此保持良好的数字卫生是将它们对你生活的影响降到最低的最好方法。 The goal of this guide then is to help navigate you through the irksome process of account deletion, often made difficult by [deceptive design](https://deceptive.design), for the betterment of your online presence. ## 查找旧帐户 ### 密码管理器 -如果您有一个贯穿整个数字生活来使用的密码管理器,这个部分将非常简单。 通常情况下,它们内置有检测你的凭证是否在数据泄露中被暴露的功能--例如Bitwarden的 [数据泄露报告](https://bitwarden.com/blog/have-you-been-pwned/)。 +如果您有一个贯穿整个数字生活来使用的密码管理器,这个部分将非常简单。 Oftentimes, they include built-in functionality for detecting if your credentials were exposed in a data breach—such as Bitwarden's [Data Breach Report](https://bitwarden.com/blog/have-you-been-pwned).
![Bitwarden's Data Breach Report feature](../assets/img/account-deletion/exposed_passwords.png)
-即使你以前没有明确使用过密码管理器,你也有可能在不知不觉中使用了你的浏览器或手机中的密码管理器。 例如。 [火狐密码管理器](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [谷歌密码管理器](https://passwords.google.com/intro) 和 [Edge密码管理器](https://support.microsoft.com/en-us/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336)。 +即使你以前没有明确使用过密码管理器,你也有可能在不知不觉中使用了你的浏览器或手机中的密码管理器。 For example: [Firefox Password Manager](https://support.mozilla.org/kb/password-manager-remember-delete-edit-logins), [Google Password Manager](https://passwords.google.com/intro) and [Edge Password Manager](https://support.microsoft.com/microsoft-edge/save-or-forget-passwords-in-microsoft-edge-b4beecb0-f2a8-1ca0-f26f-9ec247a3f336). 桌面平台通常也有一个密码管理器,可以帮助你恢复你忘记的密码。 -- Windows [Credential Manager](https://support.microsoft.com/en-us/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) -- macOS [Passwords](https://support.apple.com/en-us/HT211145) -- iOS [Passwords](https://support.apple.com/en-us/HT211146) +- Windows [Credential Manager](https://support.microsoft.com/windows/accessing-credential-manager-1b5c916a-6a16-889f-8581-fc16e8165ac0) +- macOS [Passwords](https://support.apple.com/HT211145) +- iOS [Passwords](https://support.apple.com/HT211146) - Linux 上有 Gnome Keyring,可以通过 [Seahorse](https://wiki.gnome.org/Apps/Seahorse) 或 [KDE Wallet Manager](https://userbase.kde.org/KDE_Wallet_Manager) 访问。 ### 电子邮箱 @@ -39,7 +39,7 @@ description: 积累大量互联网账户很容易,这里有一些关于如何 ### GDPR(仅限欧洲经济区居民) -欧洲经济区的居民在数据删除方面有额外的权利,具体见 [GDPR第17条](https://www.gdpr.org/regulation/article-17.html)。 如果适用于你,请阅读任何特定服务的隐私政策,以找到关于如何行使你的删除权的信息。 阅读隐私政策可能被证明是重要的,因为一些服务有一个 "删除账户 "的选项,它只是禁用你的账户,而要真正删除,你必须采取额外行动。 有时,实际删除可能涉及填写调查表、向服务的数据保护人员发送电子邮件,甚至证明你在欧洲经济区拥有住所。 如果你打算这么做, **不要** 覆盖账户信息--你作为欧洲经济区居民的身份可能被要求。 请注意,服务的地点并不重要;GDPR适用于任何为欧洲用户服务的人。 如果服务不尊重你的删除权,你可以联系你的国家的 [数据保护局](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) ,你可能有权获得金钱赔偿。 +Residents of the EEA have additional rights regarding data erasure specified in [Article 17](https://gdpr.org/regulation/article-17.html) of the GDPR. 如果适用于你,请阅读任何特定服务的隐私政策,以找到关于如何行使你的删除权的信息。 阅读隐私政策可能被证明是重要的,因为一些服务有一个 "删除账户 "的选项,它只是禁用你的账户,而要真正删除,你必须采取额外行动。 有时,实际删除可能涉及填写调查表、向服务的数据保护人员发送电子邮件,甚至证明你在欧洲经济区拥有住所。 如果你打算这么做, **不要** 覆盖账户信息--你作为欧洲经济区居民的身份可能被要求。 请注意,服务的地点并不重要;GDPR适用于任何为欧洲用户服务的人。 如果服务不尊重你的删除权,你可以联系你的国家的 [数据保护局](https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en) ,你可能有权获得金钱赔偿。 ### 覆盖账户信息 @@ -59,4 +59,4 @@ description: 积累大量互联网账户很容易,这里有一些关于如何 ## 避免新账户 -老话说,"上医治未病"。 每当你觉得被诱惑去注册一个新账户时,问问自己,"我真的需要这个吗? 没有账户,我可以完成我需要的东西吗?" 删除一个账户往往比创建一个账户要难得多。 而且,即使在删除或改变你的账户信息后,可能还有一个来自第三方的缓存版本,如 [Internet Archive](https://archive.org/)。 当你能够避免诱惑时--你未来的自己会感谢你的。 +老话说,"上医治未病"。 每当你觉得被诱惑去注册一个新账户时,问问自己,"我真的需要这个吗? 没有账户,我可以完成我需要的东西吗?" 删除一个账户往往比创建一个账户要难得多。 And even after deleting or changing the info on your account, there might be a cached version from a third-party—like the [Internet Archive](https://archive.org). 当你能够避免诱惑时--你未来的自己会感谢你的。 diff --git a/i18n/zh/basics/common-misconceptions.md b/i18n/zh/basics/common-misconceptions.md index 979c24d2..41fdc0dd 100644 --- a/i18n/zh/basics/common-misconceptions.md +++ b/i18n/zh/basics/common-misconceptions.md @@ -88,7 +88,7 @@ We don't suggest using a VPN or Tor for any of these things, as your identity is 2. **未知身份** -未知身份可能是您经常使用的稳定化名。 它不是匿名的,因为它没有变化。 如果你是一个网络社区的一部分,你可能希望保留一个别人知道的角色。 这个化名不是匿名的,因为如果监测的时间足够长,关于主人的细节可以揭示进一步的信息,如他们的写作方式,他们对感兴趣的话题的一般知识,等等。 -你可能希望为此使用VPN,以掩盖你的IP地址。 金融交易更难掩盖。你可以考虑使用匿名的加密货币,如 [Monero](https://www.getmonero.org/)。 采用altcoin转移也可能有助于掩盖你的货币来源。 通常情况下,交易所需要完成KYC(了解你的客户),然后才允许你将法币兑换成任何种类的加密货币。 当地见面会选项也可能是一种解决方案;然而,这些往往更昂贵,有时也需要KYC。 +你可能希望为此使用VPN,以掩盖你的IP地址。 Financial transactions are more difficult to mask: You could consider using anonymous cryptocurrencies, such as [Monero](https://getmonero.org). 采用altcoin转移也可能有助于掩盖你的货币来源。 通常情况下,交易所需要完成KYC(了解你的客户),然后才允许你将法币兑换成任何种类的加密货币。 当地见面会选项也可能是一种解决方案;然而,这些往往更昂贵,有时也需要KYC。 3. **匿名身份** - 即使有经验,匿名身份也很难长期维持。 它们应该是短期和短命的身份,定期轮换。 diff --git a/i18n/zh/basics/common-threats.md b/i18n/zh/basics/common-threats.md index 97a26f9a..88f3abb8 100644 --- a/i18n/zh/basics/common-threats.md +++ b/i18n/zh/basics/common-threats.md @@ -55,7 +55,7 @@ description: 您的威胁模式是您自己量身定制的,但这些是本网 -如果你担心 **物理攻击** ,你应该使用具有安全验证启动实现的操作系统,如Android、iOS、macOS、 [Windows(带TPM)](https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process)。 你还应该确保你的驱动器是加密的,并且操作系统使用TPM或安全 [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) 或 [Element](https://developers.google.com/android/security/android-ready-se) ,以限制输入加密口令的重试速率。 你应该避免与你不信任的人分享你的电脑,因为大多数桌面操作系统没有按用户单独加密数据。 +If you are concerned about **physical attacks** you should use an operating system with a secure verified boot implementation, such as Android, iOS, macOS, or [Windows (with TPM)](https://learn.microsoft.com/windows/security/information-protection/secure-the-windows-10-boot-process). 你还应该确保你的驱动器是加密的,并且操作系统使用TPM或安全 [Enclave](https://support.apple.com/guide/security/secure-enclave-sec59b0b31ff/1/web/1) 或 [Element](https://developers.google.com/android/security/android-ready-se) ,以限制输入加密口令的重试速率。 你应该避免与你不信任的人分享你的电脑,因为大多数桌面操作系统没有按用户单独加密数据。 ## 来自服务提供商的隐私 @@ -89,16 +89,16 @@ description: 您的威胁模式是您自己量身定制的,但这些是本网

Atlas of Surveillance

-如果你想了解更多关于监视方法以及它们在你的城市是如何实施的,你也可以看看[电子前沿基金会](https://atlasofsurveillance.org/)的[监视地图]。 +If you want to learn more about surveillance methods and how they're implemented in your city you can also take a look at the [Atlas of Surveillance](https://atlasofsurveillance.org) by the [Electronic Frontier Foundation](https://eff.org). -In France you can take a look at the [Technopolice website](https://technopolice.fr/villes/) maintained by the non-profit association La Quadrature du Net. +In France you can take a look at the [Technopolice website](https://technopolice.fr/villes) maintained by the non-profit association La Quadrature du Net.
政府经常为大规模监控项目辩护,认为这是打击恐怖主义和防止犯罪的必要手段。 然而,它侵犯人权,最常被用来不成比例地针对少数群体和持不同政见者等。
-

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

+

ACLU: The Privacy Lesson of 9/11: Mass Surveillance is Not the Way Forward

面对[爱德华-斯诺登披露的政府项目,如 [PRISM](https://en.wikipedia.org/wiki/PRISM)和 [Upstream](https://en.wikipedia.org/wiki/Upstream_collection)],情报官员也承认,国家安全局多年来一直在秘密收集几乎每个美国人的电话记录--谁在给谁打电话,这些电话是什么时候打的,以及它们持续多长时间。 你应该考虑你的对手能观察到网络的哪些方面,以及你的行动是否有合理的可否认性。 @@ -144,7 +144,7 @@ In France you can take a look at the [Technopolice website](https://technopolice 包括极权主义政府、网络管理员和服务提供商在内的行为者都可以(在不同程度上)进行网上审查。 这些控制通讯和限制获取信息的努力,总是与言论自由的人权不相容。[^5] -企业平台的审查制度越来越普遍,因为像Twitter和Facebook这样的平台屈服于公众需求、市场压力和政府机构的压力。 政府可以向企业隐蔽,例如白宫 [要求删除](https://www.nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) 某个挑衅性的YouTube视频;也可以是公开的,例如中国政府要求企业遵守严格的审查制度。 +企业平台的审查制度越来越普遍,因为像Twitter和Facebook这样的平台屈服于公众需求、市场压力和政府机构的压力。 Government pressures can be covert requests to businesses, such as the White House [requesting the takedown](https://nytimes.com/2012/09/17/technology/on-the-web-a-fine-line-on-free-speech-across-globe.html) of a provocative YouTube video, or overt, such as the Chinese government requiring companies to adhere to a strict regime of censorship. 关注审查制度威胁的人可以使用像 [Tor](../advanced/tor-overview.md) 这样的技术来规避审查制度,并支持像 [Matrix](../real-time-communication.md#element)这样的抗审查通信平台,该平台没有一个可以任意关闭账户的集中式账户管理机构。 @@ -162,5 +162,5 @@ In France you can take a look at the [Technopolice website](https://technopolice [^1]: 美国隐私和公民自由监督委员会。 [关于根据第215条进行的电话记录计划的报告](https://documents.pclob.gov/prod/Documents/OversightReport/ec542143-1079-424a-84b3-acc354698560/215-Report_on_the_Telephone_Records_Program.pdf) [^2]: 维基百科: [监控资本主义](https://en.wikipedia.org/wiki/Surveillance_capitalism) [^3]: 维基百科。 [*监视资本主义*](https://en.wikipedia.org/wiki/Surveillance_capitalism) -[^4]: "[Enumerating badness](https://www.ranum.com/security/computer_security/editorials/dumb/)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. 你还应该采用其他缓解技术。 +[^4]: "[Enumerating badness](https://ranum.com/security/computer_security/editorials/dumb)" (or, "listing all the bad things that we know about"), as many content blockers and antivirus programs do, fails to adequately protect you from new and unknown threats because they have not yet been added to the filter list. 你还应该采用其他缓解技术。 [^5]: 联合国。 [*世界人权宣言》*](https://www.un.org/en/about-us/universal-declaration-of-human-rights)。 diff --git a/i18n/zh/basics/email-security.md b/i18n/zh/basics/email-security.md index c7358e2d..92b5e441 100644 --- a/i18n/zh/basics/email-security.md +++ b/i18n/zh/basics/email-security.md @@ -13,7 +13,7 @@ description: 电子邮件在许多方面本身就不安全,以下是它不是 在不同的电邮供应商之间为电子邮件添加端到端加密的标准方法是使用OpenPGP。 OpenPGP标准有不同的实现方式,最常见的是 [GnuPG](https://en.wikipedia.org/wiki/GNU_Privacy_Guard) 和 [OpenPGP.js](https://openpgpjs.org)。 -有另一种标准受到商业界的欢迎,称为 [S/MIME](https://en.wikipedia.org/wiki/S/MIME),然而,它需要一个由 [证书颁发机构](https://en.wikipedia.org/wiki/Certificate_authority) (不是所有的证书颁发机构都颁发S/MIME证书)颁发的证书。 它在 [Google Workplace](https://support.google.com/a/topic/9061730?hl=en&ref_topic=9061731) 和 [Outlook for Web 或 Exchange Server 2016, 2019](https://support.office.com/en-us/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480)得到支持。 +有另一种标准受到商业界的欢迎,称为 [S/MIME](https://en.wikipedia.org/wiki/S/MIME),然而,它需要一个由 [证书颁发机构](https://en.wikipedia.org/wiki/Certificate_authority) (不是所有的证书颁发机构都颁发S/MIME证书)颁发的证书。 It has support in [Google Workplace](https://support.google.com/a/topic/9061730) and [Outlook for Web or Exchange Server 2016, 2019](https://support.office.com/article/encrypt-messages-by-using-s-mime-in-outlook-on-the-web-878c79fc-7088-4b39-966f-14512658f480). 即使你使用OpenPGP,它也不支持 [前向加密](https://en.wikipedia.org/wiki/Forward_secrecy),这意味着如果你或收件人的私钥被盗,所有在之前使用它加密的信息都将被暴露。 这就是为什么我们推荐 [即时通讯工具](../real-time-communication.md) ,比起电子邮件,它尽可能更好地在人与人之间的通信中实现前向保密性。 @@ -23,7 +23,7 @@ description: 电子邮件在许多方面本身就不安全,以下是它不是 除了我们推荐的 [电子邮件客户端(](../email-clients.md) )支持 WKD 外,一些网络邮件提供商也支持 WKD。 *您自己的* 密钥是否发布到 WKD 供他人使用,取决于您的域配置。 如果您使用支持 WKD 的 [电子邮件提供商](../email.md#openpgp-compatible-services) (如 Proton Mail 或 Mailbox.org),他们可以为您在其域上发布 OpenPGP 密钥。 -如果使用自己的自定义域,则需要单独配置 WKD。 如果您能控制自己的域名,那么无论您的电子邮件提供商是谁,您都可以设置 WKD。 一个简单的方法是使用 keys.openpgp.org 的 "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" 功能,在 `openpgpkey` 子域上设置一个 CNAME 记录,指向 `wkd.keys.openpgp.org`,然后将密钥上传到 [keys.openpgp.org](https://keys.openpgp.org/)。 或者,您也可以 [自行将 WKD 托管在自己的网络服务器上](https://wiki.gnupg.org/WKDHosting)。 +如果使用自己的自定义域,则需要单独配置 WKD。 如果您能控制自己的域名,那么无论您的电子邮件提供商是谁,您都可以设置 WKD。 One easy way to do this is to use the "[WKD as a Service](https://keys.openpgp.org/about/usage#wkd-as-a-service)" feature from keys.openpgp.org, by setting a CNAME record on the `openpgpkey` subdomain of your domain pointed to `wkd.keys.openpgp.org`, then uploading your key to [keys.openpgp.org](https://keys.openpgp.org). 或者,您也可以 [自行将 WKD 托管在自己的网络服务器上](https://wiki.gnupg.org/WKDHosting)。 如果您使用不支持 WKD 的提供商提供的共享域名(如 @gmail.com),则无法通过此方法与他人共享 OpenPGP 密钥。 @@ -33,7 +33,7 @@ description: 电子邮件在许多方面本身就不安全,以下是它不是 ### 我如何保护我的私钥? -A smartcard (such as a [YubiKey](https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://www.nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. 然后,该信息被智能卡解密,解密后的内容被送回设备。 +A smartcard (such as a [YubiKey](https://support.yubico.com/hc/articles/360013790259-Using-Your-YubiKey-with-OpenPGP) or [Nitrokey](https://nitrokey.com)) works by receiving an encrypted email message from a device (phone, tablet, computer, etc.) running an email/webmail client. 然后,该信息被智能卡解密,解密后的内容被送回设备。 在智能卡上进行解密是很有利的,这样可以避免将你的私钥暴露给某个被攻破的设备。 diff --git a/i18n/zh/basics/multi-factor-authentication.md b/i18n/zh/basics/multi-factor-authentication.md index cab35cb9..4675cd6a 100644 --- a/i18n/zh/basics/multi-factor-authentication.md +++ b/i18n/zh/basics/multi-factor-authentication.md @@ -30,7 +30,7 @@ TOTP是目前最常见的MFA形式之一。 当你设置TOTP时,一般要求 然后,时限代码可以由共享密钥和当前时间派生。 由于代码只在很短的时间内有效,在无法获得共享密钥的情况下,对手无法生成新的代码。 -如果你有一个支持TOTP的硬件安全密钥(如YubiKey与 [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/)),我们建议你将 "共享密钥 "存储在硬件上。 YubiKey等硬件正是为了使 "共享密钥 "难以提取和复制而开发的。 YubiKey也没有连接到互联网,这与带有TOTP应用程序的手机不同。 +If you have a hardware security key with TOTP support (such as a YubiKey with [Yubico Authenticator](https://yubico.com/products/yubico-authenticator)), we recommend that you store your "shared secrets" on the hardware. YubiKey等硬件正是为了使 "共享密钥 "难以提取和复制而开发的。 YubiKey也没有连接到互联网,这与带有TOTP应用程序的手机不同。 与 [WebAuthn](#fido-fast-identity-online)不同,TOTP不提供对 [网络钓鱼](https://en.wikipedia.org/wiki/Phishing) 或重放攻击的保护。 如果对手从你那里获得一个有效的代码,他们可以随意使用,直到它过期(一般为60秒)。 @@ -122,13 +122,13 @@ WebAuthn是第二因素身份验证中的最安全、最私密的形式。 虽 ### Windows 系统 -Yubico有一个专用的 [凭据提供程序](https://docs.microsoft.com/en-us/windows/win32/secauthn/credential-providers-in-windows) ,为本地Windows帐户的用户名+密码登录流程添加质询-响应身份验证步骤。 如果你有一个支持质询-响应验证的YubiKey, 请看 [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/en-us/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), 该指南允许您在Windows计算机上设置MFA +Yubico has a dedicated [Credential Provider](https://learn.microsoft.com/windows/win32/secauthn/credential-providers-in-windows) that adds Challenge-Response authentication for the username + password login flow for local Windows accounts. If you have a YubiKey with Challenge-Response authentication support, take a look at the [Yubico Login for Windows Configuration Guide](https://support.yubico.com/hc/articles/360013708460-Yubico-Login-for-Windows-Configuration-Guide), which will allow you to set up MFA on your Windows computer. ### mac系统 macOS [原生支持](https://support.apple.com/guide/deployment/intro-to-smart-card-integration-depd0b888248/web) 使用智能卡(PIV)进行认证。 如果你有一张支持PIV接口的智能卡或硬件安全钥匙,如YubiKey,我们建议你按照你的智能卡/硬件安全供应商的文档,为你的macOS电脑设置第二要素认证。 -Yubico有一个指南 [在macOS中把YubiKey作为智能卡使用](https://support.yubico.com/hc/en-us/articles/360016649059) ,可以帮助你在macOS上设置YubiKey。 +Yubico have a guide [Using Your YubiKey as a Smart Card in macOS](https://support.yubico.com/hc/articles/360016649059) which can help you set up your YubiKey on macOS. 设置智能卡/安全密钥后,我们建议在终端中运行此命令: @@ -147,22 +147,22 @@ sudo defaults write /Library/Preferences/com.apple.loginwindow DisableFDEAutoLog
-Linux上的 `pam_u2f` 模块可以在大多数流行的Linux发行版上为登录提供双因素认证。 如果你有一个支持U2F的硬件安全密钥,你可以为你的登录设置MFA认证。 Yubico有一个指南 [Ubuntu Linux登录指南 - U2F](https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) ,它应该适用于任何发行版。 然而,软件包管理器的命令--如 `apt-get`--和软件包名称可能不同。 本指南 **不** 适用于Qubes OS。 +Linux上的 `pam_u2f` 模块可以在大多数流行的Linux发行版上为登录提供双因素认证。 如果你有一个支持U2F的硬件安全密钥,你可以为你的登录设置MFA认证。 Yubico has a guide [Ubuntu Linux Login Guide - U2F](https://support.yubico.com/hc/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F) which should work on any distribution. 然而,软件包管理器的命令--如 `apt-get`--和软件包名称可能不同。 本指南 **不** 适用于Qubes OS。 ### Qubes操作系统 -Qubes OS支持使用YubiKeys进行质询-响应身份验证。 如果您有一个支持质询-响应身份验证的YubiKey,如果您想在Qubes OS上设置MFA,请查看Qubes OS的 [YubiKey文档](https://www.qubes-os.org/doc/yubikey/)。 +Qubes OS支持使用YubiKeys进行质询-响应身份验证。 If you have a YubiKey with Challenge-Response authentication support, take a look at the Qubes OS [YubiKey documentation](https://qubes-os.org/doc/yubikey) if you want to set up MFA on Qubes OS. ### SSH #### 硬件安全密钥 -可以用多种不同的流行的硬件安全密钥验证方法来设置SSH MFA。 我们建议你查看Yubico的 [文档](https://developers.yubico.com/SSH/) 了解如何设置。 +可以用多种不同的流行的硬件安全密钥验证方法来设置SSH MFA。 We recommend that you check out Yubico's [documentation](https://developers.yubico.com/SSH) on how to set this up. #### 基于时间的一次性密码(TOTP)。 -SSH MFA也可以使用TOTP进行设置。 DigitalOcean提供了一个教程 [如何在Ubuntu 20.04上为SSH设置多因素认证](https://www.digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04)。 无论哪个发行版,大多数东西都应该是一样的,但是软件包管理器命令--例如 `apt-get`--和软件包名称可能不同。 +SSH MFA也可以使用TOTP进行设置。 DigitalOcean has provided a tutorial [How To Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04](https://digitalocean.com/community/tutorials/how-to-set-up-multi-factor-authentication-for-ssh-on-ubuntu-20-04). 无论哪个发行版,大多数东西都应该是一样的,但是软件包管理器命令--例如 `apt-get`--和软件包名称可能不同。 ### KeePass (和KeePassXC) -KeePass和KeePassXC数据库可以使用质询响应或HOTP作为第二因素身份验证进行保护。 Yubico为KeePass提供了一份文件 [Using Your YubiKey with KeePass](https://support.yubico.com/hc/en-us/articles/360013779759-Using-Your-YubiKey-with-KeePass) ,在 [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) 网站上也有一份。 +KeePass和KeePassXC数据库可以使用质询响应或HOTP作为第二因素身份验证进行保护。 Yubico has provided a document for KeePass [Using Your YubiKey with KeePass](https://support.yubico.com/hc/articles/360013779759-Using-Your-YubiKey-with-KeePass) and there is also one on the [KeePassXC](https://keepassxc.org/docs/#faq-yubikey-2fa) website. diff --git a/i18n/zh/basics/passwords-overview.md b/i18n/zh/basics/passwords-overview.md index 8dac9d16..0accddd1 100644 --- a/i18n/zh/basics/passwords-overview.md +++ b/i18n/zh/basics/passwords-overview.md @@ -54,13 +54,13 @@ Diceware是一种创建密码的方法,这种密码容易记忆,但很难猜

Note

-这里的说明步骤假定你使用[EFF的大型词汇表](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt)来生成口令,每个词需要掷五个骰子。 其他词表可能需要更多或更少的回合,也可能需要不同数量的词来实现相同的熵值。 +These instructions assume that you are using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate the passphrase, which requires five dice rolls per word. 其他词表可能需要更多或更少的回合,也可能需要不同数量的词来实现相同的熵值。
1. 掷一个六面体的骰子五次,每次掷完都记下数字。 -2. 举个例子,假设你掷出 `2-5-2-6-6`。 通过 [EFF的大词表](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) ,寻找与 `25266`相对应的词。 +2. 举个例子,假设你掷出 `2-5-2-6-6`。 Look through the [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) for the word that corresponds to `25266`. 3. 你可以得到这个词 `encrypt` 把这个词写下来。 @@ -75,20 +75,20 @@ Diceware是一种创建密码的方法,这种密码容易记忆,但很难猜 如果你没有或者不愿意使用真正的骰子,你可以使用你的密码管理器的内置密码生成器,因为除了常规密码之外,大多数密码管理器都有生成骰子密码的选项。 -我们建议使用 [EFF的大型词表](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) ,以生成你的二维码密码,因为它提供了与原始列表完全相同的安全性,同时包含更容易记忆的单词。 There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English. +We recommend using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) to generate your diceware passphrases, as it offers the exact same security as the original list, while containing words that are easier to memorize. There are also [other wordlists in different languages](https://theworld.com/~reinhold/diceware.html#Diceware%20in%20Other%20Languages|outline), if you do not want your passphrase to be in English.
Explanation of entropy and strength of diceware passphrases -To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. +To demonstrate how strong diceware passphrases are, we'll use the aforementioned seven word passphrase (`viewable fastness reluctant squishy seventeen shown pencil`) and [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) as an example. 确定双关口令强度的一个指标是它的熵值有多少。 双关口令中每个字的熵计算为$\text{log}_2(\text{WordsInList})$,口令的整体熵计算为$\text{log}_2(\text{WordsInList}^\text{WordsInPhrase})$。 因此,上述列表中的每个词都会产生~12.9比特的熵($\text{log}_2(7776)$),而由它衍生出的七个词的口令有~90.47比特的熵($\text{log}_2(7776^7)$)。 -The [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. 要计算可能的口令数量,我们所要做的就是$\text{WordsInList}^\text{WordsInPhrase}$,或者在我们的例子中,$7776^7$。 +The [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) contains 7776 unique words. 要计算可能的口令数量,我们所要做的就是$\text{WordsInList}^\text{WordsInPhrase}$,或者在我们的例子中,$7776^7$。 -Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. +Let's put all of this in perspective: A seven word passphrase using [EFF's large wordlist](https://eff.org/files/2016/07/18/eff_large_wordlist.txt) is one of ~1,719,070,799,748,422,500,000,000,000 possible passphrases. 平均而言,需要尝试所有可能的组合中的50%来猜测你的短语。 考虑到这一点,即使你的对手每秒能够猜出1,000,000,000,000次,他们仍然需要27,255,689年才能猜出你的口令。 即使以下情况属实,情况也是如此: diff --git a/i18n/zh/basics/vpn-overview.md b/i18n/zh/basics/vpn-overview.md index 934c83e5..1c693fd4 100644 --- a/i18n/zh/basics/vpn-overview.md +++ b/i18n/zh/basics/vpn-overview.md @@ -69,13 +69,13 @@ If you do use Tor then you are *probably* best off connecting to the Tor network You should not use that feature: The primary advantage of using Tor is that you do not trust your VPN provider, which is negated when you use Tor nodes hosted by your VPN instead of connecting directly to Tor from your computer. -Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. 为了弥补这一点,VPN供应商通常会将所有非TCP数据包通过其VPN服务器(你的第一跳)进行路由。 [ProtonVPN](https://protonvpn.com/support/tor-vpn/)就是这种情况。 此外,在使用这种Tor over VPN设置时, 您无法控制其他重要的Tor功能,例如 [目的地址隔离](https://www.whonix.org/wiki/Stream_Isolation) (对您访问的每个域名使用不同的Tor线路)。 +Currently, Tor only supports the TCP protocol. UDP (used by [WebRTC](https://en.wikipedia.org/wiki/WebRTC), [HTTP3/QUIC](https://en.wikipedia.org/wiki/HTTP/3), and other protocols), [ICMP](https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol), and other packets will be dropped. 为了弥补这一点,VPN供应商通常会将所有非TCP数据包通过其VPN服务器(你的第一跳)进行路由。 This is the case with [ProtonVPN](https://protonvpn.com/support/tor-vpn). Additionally, when using this Tor over VPN setup, you do not have control over other important Tor features such as [Isolated Destination Address](https://whonix.org/wiki/Stream_Isolation) (using a different Tor circuit for every domain you visit). The feature should be viewed as a *convenient* way to access hidden services on Tor, not to stay anonymous. For proper anonymity, use the actual [Tor Browser](../tor.md). ## Commercial VPN Ownership -Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. +Most VPN services are owned by the same [few companies](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies). These shady companies run lots of smaller VPN services to create the illusion that you have more choice than you actually do and to maximize profit. Typically, these providers that feed into their shell company have terrible privacy policies and shouldn't be trusted with your internet traffic. You should be very strict about which provider you decide to use. You should also be wary that many VPN review sites are merely advertising vehicles open to the highest bidder. ==Privacy Guides does not make money from recommending external products, and never uses affiliate programs.== @@ -111,8 +111,8 @@ Many dVPNs are used to push a cryptocurrency rather than to make the best servic ## VPN的相关信息 -- [VPN和隐私审查网站的问题](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites/) -- [免费VPN应用调查](https://www.top10vpn.com/free-vpn-app-investigation/) -- [揭开隐蔽VPN所有者的面纱:101个VPN产品仅由23家公司运营](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies/) -- [这家中国公司秘密地在24个流行的应用程序背后寻求危险的权限](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions/) -- [VPN -一个非常危险的叙事 ](https://schub.io/blog/2019/04/08/very-precarious-narrative.html)作者:丹尼斯·舒伯特( Dennis Schubert ) +- [VPN和隐私审查网站的问题](https://blog.privacyguides.org/2019/11/20/the-trouble-with-vpn-and-privacy-review-sites) +- [免费VPN应用调查](https://top10vpn.com/research/free-vpn-investigations/ownership) +- [揭开隐蔽VPN所有者的面纱:101个VPN产品仅由23家公司运营](https://vpnpro.com/blog/hidden-vpn-owners-unveiled-97-vpns-23-companies) +- [这家中国公司秘密地在24个流行的应用程序背后寻求危险的权限](https://vpnpro.com/blog/chinese-company-secretly-behind-popular-apps-seeking-dangerous-permissions) +- [VPN - a Very Precarious Narrative](https://overengineer.dev/blog/2019/04/08/very-precarious-narrative.html) by Dennis Schubert diff --git a/i18n/zh/basics/why-privacy-matters.md b/i18n/zh/basics/why-privacy-matters.md index 1c975ec5..8d76dad1 100644 --- a/i18n/zh/basics/why-privacy-matters.md +++ b/i18n/zh/basics/why-privacy-matters.md @@ -54,6 +54,6 @@ icon: 'material/shield-account' ## 资料来源 -- [隐私为何重要](https://www.amazon.com/Why-Privacy-Matters-Neil-Richards/dp/0190939044) (2021) 作者:Neil Richards -- [新石油:隐私和安全为何重要](https://thenewoil.org/en/guides/prologue/why/) +- [Why Privacy Matters](https://amazon.com/dp/0190939044) (2021) by Neil Richards +- [新石油:隐私和安全为何重要](https://thenewoil.org/en/guides/prologue/why) - [@Thorin-Oakenpants on Anonymity vs Privacy vs Security](https://code.privacyguides.dev/privacyguides/privacytools.io/issues/1760#issuecomment-10452) diff --git a/i18n/zh/calendar.md b/i18n/zh/calendar.md index 90389dd8..588f000c 100644 --- a/i18n/zh/calendar.md +++ b/i18n/zh/calendar.md @@ -13,7 +13,7 @@ cover: calendar.webp ![Tuta logo](assets/img/calendar/tuta.svg){ align=right } -**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison/). +**Tuta** offers a free and encrypted calendar across their supported platforms. Features include: automatic E2EE of all data, sharing features, import/export functionality, multi-factor authentication, and [more](https://tuta.com/calendar-app-comparison). 多个日历和扩展的共享功能仅限于付费用户。 @@ -21,18 +21,18 @@ cover: calendar.webp [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/tutanota/id922429609) -- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients/) -- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) +- [:simple-windows11: Windows](https://tuta.com/blog/posts/desktop-clients) +- [:simple-apple: macOS](https://tuta.com/blog/posts/desktop-clients) +- [:simple-linux: Linux](https://tuta.com/blog/posts/desktop-clients) - [:simple-flathub: Flathub](https://flathub.org/apps/com.tutanota.Tutanota) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -55,7 +55,7 @@ cover: calendar.webp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=me.proton.android.calendar) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1514709943) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1514709943) - [:octicons-browser-16: Web](https://calendar.proton.me)
diff --git a/i18n/zh/cloud.md b/i18n/zh/cloud.md index 6930c486..4d6c7539 100644 --- a/i18n/zh/cloud.md +++ b/i18n/zh/cloud.md @@ -56,15 +56,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a **Tresorit** is a Swiss-Hungarian encrypted cloud storage provider founded in 2011. Tresorit is owned by the Swiss Post, the national postal service of Switzerland. -[:octicons-home-16: Homepage](https://tresorit.com/){ class="md-button md-button--primary" } +[:octicons-home-16: Homepage](https://tresorit.com){ class="md-button md-button--primary" } [:octicons-eye-16:](https://tresorit.com/legal/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.tresorit.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.tresorit.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.tresorit.mobile) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id722163232) +- [:simple-appstore: App Store](https://apps.apple.com/app/id722163232) - [:simple-windows11: Windows](https://tresorit.com/download) - [:simple-apple: macOS](https://tresorit.com/download) - [:simple-linux: Linux](https://tresorit.com/download) @@ -75,15 +75,15 @@ Proton Drive's brand new mobile clients have not yet been publicly audited by a Tresorit has received a number of independent security audits: -- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification/): ISO/IEC 27001:2013[^1] Compliance [Certification](https://www.certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft -- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security/): Penetration Testing by Computest +- [2022](https://tresorit.com/blog/tresorit-receives-iso-27001-certification): ISO/IEC 27001:2013[^1] Compliance [Certification](https://certipedia.com/quality_marks/9108644476) by TÜV Rheinland InterCert Kft +- [2021](https://tresorit.com/blog/fresh-penetration-testing-confirms-tresorit-security): Penetration Testing by Computest - This review assessed the security of the Tresorit web client, Android app, Windows app, and associated infrastructure. - Computest discovered two vulnerabilities which have been resolved. -- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture/): Penetration Testing by Ernst & Young. +- [2019](https://tresorit.com/blog/ernst-young-review-verifies-tresorits-security-architecture): Penetration Testing by Ernst & Young. - This review analyzed the full source code of Tresorit and validated that the implementation matches the concepts described in Tresorit's [white paper](https://prodfrontendcdn.azureedge.net/202208011608/tresorit-encryption-whitepaper.pdf). - Ernst & Young additionally tested the web, mobile, and desktop clients: "Test results found no deviation from Tresorit’s data confidentiality claims." -They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.swiss-digital-initiative.org/digital-trust-label/) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria/) related to security, privacy, and reliability. +They have also received the Digital Trust Label, a certification from the [Swiss Digital Initiative](https://www.efd.admin.ch/efd/en/home/digitalisierung/swiss-digital-initiative.html) which requires passing [35 criteria](https://digitaltrust-label.swiss/criteria) related to security, privacy, and reliability. ## Criteria diff --git a/i18n/zh/cryptocurrency.md b/i18n/zh/cryptocurrency.md index fe23bc8a..47fe77dd 100644 --- a/i18n/zh/cryptocurrency.md +++ b/i18n/zh/cryptocurrency.md @@ -24,10 +24,10 @@ Many if not most cryptocurrency projects are scams. Make transactions carefully **Monero** uses a blockchain with privacy-enhancing technologies that obfuscate transactions to achieve anonymity. Every Monero transaction hides the transaction amount, sending and receiving addresses, and source of funds without any hoops to jump through, making it an ideal choice for cryptocurrency novices. -[:octicons-home-16: Homepage](https://www.getmonero.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://www.getmonero.org/resources/user-guides/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://getmonero.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://getmonero.org/resources/user-guides){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/monero-project/monero){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.getmonero.org/get-started/contributing/){ .card-link title=Contribute } +[:octicons-heart-16:](https://getmonero.org/get-started/contributing){ .card-link title=Contribute }
@@ -38,16 +38,16 @@ With Monero, outside observers cannot decipher addresses trading Monero, transac For optimal privacy, make sure to use a noncustodial wallet where the view key stays on the device. This means that only you will have the ability to spend your funds and see incoming and outgoing transactions. If you use a custodial wallet, the provider can see **everything** you do; if you use a “lightweight” wallet where the provider retains your private view key, the provider can see almost everything you do. Some noncustodial wallets include: - [Official Monero client](https://getmonero.org/downloads) (Desktop) -- [Cake Wallet](https://cakewallet.com/) (iOS, Android) - - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com/). -- [Feather Wallet](https://featherwallet.org/) (Desktop) -- [Monerujo](https://www.monerujo.io/) (Android) +- [Cake Wallet](https://cakewallet.com) (iOS, Android) + - Cake Wallet supports multiple cryptocurrencies. A Monero-only version of Cake Wallet is available at [Monero.com](https://monero.com). +- [Feather Wallet](https://featherwallet.org) (Desktop) +- [Monerujo](https://monerujo.io) (Android) For maximum privacy (even with a noncustodial wallet), you should run your own Monero node. Using another person’s node will expose some information to them, such as the IP address that you connect to it from, the timestamps that you sync your wallet, and the transactions that you send from your wallet (though no other details about those transactions). Alternatively, you can connect to someone else’s Monero node over Tor or i2p. -In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing/) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. +In August 2021, CipherTrace [announced](https://ciphertrace.com/enhanced-monero-tracing) enhanced Monero tracing capabilities for government agencies. Public postings show that the US Department of the Treasury's Financial Crimes Enforcement Network [licensed](https://sam.gov/opp/d12cbe9afbb94ca68006d0f006d355ac/view) CipherTrace's "Monero Module" in late 2022. -Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://www.wired.com/story/monero-privacy/) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. +Monero transaction graph privacy is limited by its relatively small ring signatures, especially against targeted attacks. Monero's privacy features have also been [called into question](https://web.archive.org/web/20180331203053/https://wired.com/story/monero-privacy) by some security researchers, and a number of severe vulnerabilities have been found and patched in the past, so the claims made by organizations like CipherTrace are not out of the question. While it's unlikely that Monero mass surveillance tools exist like they do for Bitcoin and others, it's certain that tracing tools assist with targeted investigations. Ultimately, Monero is the strongest contender for a privacy-friendly cryptocurrency, but its privacy claims have **not** been definitively proven one way or the other. More time and research is needed to assess whether Monero is resilient enough to attacks to always provide adequate privacy. diff --git a/i18n/zh/data-redaction.md b/i18n/zh/data-redaction.md index 404bfea5..c9a863ab 100644 --- a/i18n/zh/data-redaction.md +++ b/i18n/zh/data-redaction.md @@ -88,12 +88,12 @@ cover: data-redaction.webp **Metapho**是一个简单而干净的照片元数据查看器,如日期、文件名、大小、相机型号、快门速度和位置。 [:octicons-home-16: Homepage](https://zininworks.com/metapho){ .md-button .md-button--primary } -[:octicons-eye-16:](https://zininworks.com/privacy/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://zininworks.com/privacy){ .card-link title="Privacy Policy" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/metapho/id914457352) +- [:simple-appstore: App Store](https://apps.apple.com/app/id914457352)
@@ -107,7 +107,7 @@ cover: data-redaction.webp **PrivacyBlur**是一个免费的应用程序,它可以在网上分享之前模糊图片的敏感部分。 -[:octicons-home-16: Homepage](https://privacyblur.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://privacyblur.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacyblur.app/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/MATHEMA-GmbH/privacyblur#readme){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/MATHEMA-GmbH/privacyblur){ .card-link title="Source Code" } @@ -116,7 +116,7 @@ cover: data-redaction.webp Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.mathema.privacyblur) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/privacyblur/id1536274106) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1536274106) diff --git a/i18n/zh/desktop-browsers.md b/i18n/zh/desktop-browsers.md index 99ceee62..8f0c4311 100644 --- a/i18n/zh/desktop-browsers.md +++ b/i18n/zh/desktop-browsers.md @@ -70,8 +70,8 @@ schema: **Mullvad 浏览器** 是 [Tor 浏览器](tor.md#tor-browser) 去除了 Tor 网络的一个版本,旨在为 VPN 用户提供 Tor 浏览器的反指纹浏览器技术。 它由 Tor 项目开发,由 [Mullvad](vpn.md#mullvad) 发布,**不需要** 使用 Mullvad 的 VPN。 [:octicons-home-16: Homepage](https://mullvad.net/en/browser){ .md-button .md-button--primary } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help/tag/mullvad-browser){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/mullvad-browser){ .card-link title="Source Code" }
@@ -85,7 +85,7 @@ schema: -与 [Tor Browser](tor.md)一样,Mullvad Browser 的设计也是通过使您的浏览器指纹与所有其他 Mullvad Browser 用户完全相来了防止指纹识别。它自带了默认设置和扩展程序,这些会由设置的安全级别自动配置: *标准*, *更安全* 和 *最安全*。 因此,在调整自带的 [安全级别](https://tb-manual.torproject.org/security-settings/) 之外,请务必不要对浏览器进行任何修改。 其他修改会使您的指纹变得独一无二,从而失去使用该浏览器的意义。 如果你想对浏览器进行更多的配置而且不担心指纹识别,我们建议你使用 [Firefox](#firefox)。 +与 [Tor Browser](tor.md)一样,Mullvad Browser 的设计也是通过使您的浏览器指纹与所有其他 Mullvad Browser 用户完全相来了防止指纹识别。它自带了默认设置和扩展程序,这些会由设置的安全级别自动配置: *标准*, *更安全* 和 *最安全*。 Therefore, it is imperative that you do not modify the browser at all outside adjusting the default [security levels](https://tb-manual.torproject.org/security-settings). 其他修改会使您的指纹变得独一无二,从而失去使用该浏览器的意义。 如果你想对浏览器进行更多的配置而且不担心指纹识别,我们建议你使用 [Firefox](#firefox)。 ### 防指纹 @@ -116,17 +116,17 @@ Mullvad 浏览器将 DuckDuckGo 设置为默认的 [搜索引擎](search-engines **火狐浏览器**提供强大的隐私设置,如[增强型跟踪保护](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop),它可以帮助阻止各种[类型的跟踪](https://support.mozilla.org/kb/enhanced-tracking-protection-firefox-desktop#w_what-enhanced-tracking-protection-blocks)。 [:octicons-home-16: Homepage](https://firefox.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/firefox/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://firefox-source-docs.mozilla.org/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mozilla.org/privacy/firefox){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://firefox-source-docs.mozilla.org){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/mozilla-central){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.mozilla.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.mozilla.org){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.mozilla.org/firefox/windows) -- [:simple-apple: macOS](https://www.mozilla.org/firefox/mac) -- [:simple-linux: Linux](https://www.mozilla.org/firefox/linux) +- [:simple-windows11: Windows](https://mozilla.org/firefox/windows) +- [:simple-apple: macOS](https://mozilla.org/firefox/mac) +- [:simple-linux: Linux](https://mozilla.org/firefox/linux) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.firefox)
@@ -136,7 +136,7 @@ Mullvad 浏览器将 DuckDuckGo 设置为默认的 [搜索引擎](search-engines

警告

-Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases/). +Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug.cgi?id=1677497#c0) in downloads from Mozilla's website and uses telemetry in Firefox to send the token. The token is **not** included in releases from the [Mozilla FTP](https://ftp.mozilla.org/pub/firefox/releases).
@@ -162,7 +162,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug ##### Firefox Suggest (仅限美国) -[Firefox Suggest](https://support.mozilla.org/en-US/kb/firefox-suggest) 是一项仅在美国可用的类似于搜索建议的功能。 我们建议禁用这个功能,原因与我们建议禁用搜索建议的原因相同。 如果在 **地址栏** 标题下没有看到这些选项,则表示您没有获得这个功能,可以忽略这些设置。 +[Firefox Suggest](https://support.mozilla.org/kb/firefox-suggest) is a feature similar to search suggestions which is only available in the US. 我们建议禁用这个功能,原因与我们建议禁用搜索建议的原因相同。 如果在 **地址栏** 标题下没有看到这些选项,则表示您没有获得这个功能,可以忽略这些设置。 - [ ] 取消选中 **来自网络的建议** - [ ] 取消选中 **来自赞助商的建议** @@ -183,7 +183,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug > 火狐浏览器会向我们发送有关您的火狐浏览器版本和语言、设备操作系统和硬件配置、内存、有关崩溃和错误的基本信息以及更新、安全浏览和激活等自动处理结果的数据。 当火狐浏览器向我们发送数据时,您的IP地址会被暂时收集,作为我们服务器日志的一部分。 -此外,火狐账户服务还收集 [一些技术数据](https://www.mozilla.org/en-US/privacy/firefox/#firefox-accounts)。 如果你使用Firefox账户,你可以选择退出。 +Additionally, the Firefox Accounts service collects [some technical data](https://mozilla.org/privacy/firefox/#firefox-accounts). 如果你使用Firefox账户,你可以选择退出。 1. 在 accounts.firefox.com上打开你的 配置文件设置。 @@ -212,7 +212,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug #### 同步 -[火狐浏览器同步](https://hacks.mozilla.org/2018/11/firefox-sync-privacy/) ,使您的浏览数据(历史记录、书签等)可以在您的所有设备上访问,并通过E2EE进行保护。 +[Firefox Sync](https://hacks.mozilla.org/2018/11/firefox-sync-privacy) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices and protects it with E2EE. @@ -225,7 +225,7 @@ Firefox includes a unique [download token](https://bugzilla.mozilla.org/show_bug -[Arkenfox项目](https://github.com/arkenfox/user.js) ,为Firefox提供了一套精心考虑的选项。 如果你 [决定](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) 使用Arkenfox,有几个 [选项](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) 是主观严格的和/或可能导致一些网站不能正常工作-- [,你可以很容易地改变](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) 以满足你的需要。 我们 **,强烈建议** ,阅读其完整的 [wiki](https://github.com/arkenfox/user.js/wiki)。 Arkenfox还能支持 [容器](https://support.mozilla.org/en-US/kb/containers#w_for-advanced-users)。 +[Arkenfox项目](https://github.com/arkenfox/user.js) ,为Firefox提供了一套精心考虑的选项。 如果你 [决定](https://github.com/arkenfox/user.js/wiki/1.1-To-Arkenfox-or-Not) 使用Arkenfox,有几个 [选项](https://github.com/arkenfox/user.js/wiki/3.2-Overrides-[Common]) 是主观严格的和/或可能导致一些网站不能正常工作-- [,你可以很容易地改变](https://github.com/arkenfox/user.js/wiki/3.1-Overrides) 以满足你的需要。 我们 **,强烈建议** ,阅读其完整的 [wiki](https://github.com/arkenfox/user.js/wiki)。 Arkenfox also enables [container](https://support.mozilla.org/kb/containers#w_for-advanced-users) support. Arkenfox 的目标只是通过 canvas 随机化和 Firefox 内置的抗指纹配置设置来挫败基本的或幼稚的跟踪脚本。 它不会像 Mullvad 浏览器或 Tor 浏览器那样,让你的浏览器与一大群其他用户融为一体,所以不会阻挡进阶的指纹跟踪脚本。 当然,您可以同时使用多种浏览器,例如,您可以考虑使用 Firefox+Arkenfox 浏览一些需要保持登录状态或着您信任的网站,并使用 Mullvad 浏览器进行一般浏览。 @@ -235,25 +235,25 @@ Arkenfox 的目标只是通过 canvas 随机化和 Firefox 内置的抗指纹配
-![Brave标识](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave浏览器**包括一个内置的内容拦截器和[隐私功能](https://brave.com/privacy-features/),其中许多功能都是默认启用的。 +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave是建立在Chromium网络浏览器项目之上的,所以它应该有熟悉的感觉,而且网站兼容性问题最小。 -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
Downloads - [:simple-github: GitHub](https://github.com/brave/brave-browser/releases) -- [:simple-windows11: Windows](https://brave.com/download/) -- [:simple-apple: macOS](https://brave.com/download/) -- [:simple-linux: Linux](https://brave.com/linux/) (1) +- [:simple-windows11: Windows](https://brave.com/download) +- [:simple-apple: macOS](https://brave.com/download) +- [:simple-linux: Linux](https://brave.com/linux) (1)
@@ -282,7 +282,7 @@ Brave adds a "[referral code](https://github.com/brave/brave-browser/wiki/Brave% ##### 盾 -Brave在其 [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) 功能中包括一些防指纹的措施。 我们建议将这些选项配置为 [,在你访问的所有页面上全局](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-)。 +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. Shields的选项可以根据需要在每个站点的基础上进行降级,但在默认情况下,我们建议设置以下内容。 @@ -306,7 +306,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. 2. If you wish to stay logged in to a particular site you visit often, you can set exceptions on a per-site basis by clicking on the Shield icon in the address bar. @@ -315,7 +315,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP Handling Policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Use Google services for push messaging** - [ ] Uncheck **Allow privacy-preserving product analytics (P3A)** - [ ] Uncheck **Automatically send daily usage ping to Brave** @@ -324,7 +324,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. Brave 对指纹的抵抗力**不如** Tor 浏览器,而且使用 Brave 的 Tor 功能的人要少得多,所以你的指纹会突出。 在 [需要强大的匿名性的地方](https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-) ,使用 [Tor 浏览器](tor.md#tor-browser)。 +1. Brave 对指纹的抵抗力**不如** Tor 浏览器,而且使用 Brave 的 Tor 功能的人要少得多,所以你的指纹会突出。 Where [strong anonymity is required](https://support.brave.com/hc/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity) use the [Tor Browser](tor.md#tor-browser).

Sanitizing on close

@@ -367,7 +367,7 @@ Brave 的 Web3 功能可能会增加浏览器指纹和攻击面。 如果您不 #### 同步 -[Brave 同步](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) 允许你的浏览数据(历史记录、书签等)在你所有的设备上访问,而不需要账户,并以E2EE进行保护。 +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. @@ -401,7 +401,7 @@ In general, we recommend keeping your browser extensions to a minimum to decreas
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/ublock-origin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/ublock-origin/odfafepnkmbhccpbejgmiehpchacaeak) @@ -440,7 +440,7 @@ uBlock Origin also has a "Lite" version of their extension, which offers a very
Downloads -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/addon/ublock-origin-lite) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/ublock-origin-lite/ddkjiahejlhfcafbddmgiahcphecmpfh)
@@ -476,7 +476,7 @@ We are working on establishing defined criteria for every section of our site, a - 可用于Linux、macOS和Windows。 - 为使浏览器更加尊重隐私所需的任何改变都不应该对用户体验产生负面影响。 - 默认情况下阻止第三方的cookies。 -- Supports [state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] +- Supports [state partitioning](https://developer.mozilla.org/docs/Web/Privacy/State_Partitioning) to mitigate cross-site tracking.[^2] @@ -485,7 +485,7 @@ We are working on establishing defined criteria for every section of our site, a 我们的最佳情况代表了我们希望从这个类别中的完美项目中看到的东西。 我们的推荐可能不包括任何或所有这些功能,但那些包含这些功能的推荐可能比本页面上的其他推荐排名更高。 - 包括内置的内容拦截功能。 -- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/en-US/kb/containers)). +- Supports cookie compartmentalization (à la [Multi-Account Containers](https://support.mozilla.org/kb/containers)). - Supports Progressive Web Apps. PWAs enable you to install certain websites as if they were native apps on your computer. This can have advantages over installing Electron-based apps, because you benefit from your browser's regular security updates. - 不包括不增强用户隐私的累赘功能。 @@ -508,4 +508,4 @@ We are working on establishing defined criteria for every section of our site, a [^2]: - Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state/). + Brave's implementation is detailed at [Brave Privacy Updates: Partitioning network-state for privacy](https://brave.com/privacy-updates/14-partitioning-network-state). diff --git a/i18n/zh/desktop.md b/i18n/zh/desktop.md index 6b2d46cd..76ad19c2 100644 --- a/i18n/zh/desktop.md +++ b/i18n/zh/desktop.md @@ -17,17 +17,17 @@ cover: desktop.webp ![Fedora logo](assets/img/linux-desktop/fedora.svg){ align=right } -**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora通常在其他发行版之前采用较新的技术,例如: [Wayland](https://wayland.freedesktop.org/), [PipeWire](https://pipewire.org)。 这些新技术往往伴随着安全、隐私和总体可用性的改进。 +**Fedora Workstation** is our recommended distribution for people new to Linux. Fedora generally adopts newer technologies before other distributions e.g., [Wayland](https://wayland.freedesktop.org), [PipeWire](https://pipewire.org). 这些新技术往往伴随着安全、隐私和总体可用性的改进。 -[:octicons-home-16: Homepage](https://fedoraproject.org/workstation/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=Documentation} -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/workstation){ .md-button .md-button--primary } +[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs){ .card-link title=Documentation} +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute }
-Fedora有一个半滚动的发布周期。 虽然有些软件包如 [GNOME](https://www.gnome.org) 被冻结到下一个 Fedora 版本,但大多数软件包(包括内核)在整个发行期都会频繁更新。 每个Fedora版本都支持一年,每6个月发布一个新版本。 +Fedora有一个半滚动的发布周期。 While some packages like [GNOME](https://gnome.org) are frozen until the next Fedora release, most packages (including the kernel) are updated frequently throughout the lifespan of the release. 每个Fedora版本都支持一年,每6个月发布一个新版本。 ### openSUSE Tumbleweed @@ -37,11 +37,11 @@ Fedora有一个半滚动的发布周期。 虽然有些软件包如 [GNOME](http **openSUSE Tumbleweed**是一个稳定的滚动发布版本。 -openSUSE Tumbleweed 有一个 [事务性更新](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates/) 系统,使用 [Btrfs](https://en.wikipedia.org/wiki/Btrfs) 和 [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) 来确保快照在出现问题时可以回滚。 +openSUSE Tumbleweed has a [transactional update](https://kubic.opensuse.org/blog/2018-04-04-transactionalupdates) system that uses [Btrfs](https://en.wikipedia.org/wiki/Btrfs) and [Snapper](https://en.opensuse.org/openSUSE:Snapper_Tutorial) to ensure that snapshots can be rolled back should there be a problem. -[:octicons-home-16: 主页](https://getfedora.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=文档} -[:octicons-heart-16:](https://shop.opensuse.org/){ .card-link title=贡献 } +[:octicons-home-16: Homepage](https://get.opensuse.org/tumbleweed){ .md-button .md-button--primary } +[:octicons-info-16:](https://doc.opensuse.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://shop.opensuse.org){ .card-link title=Contribute }
@@ -57,9 +57,9 @@ Tumbleweed采用的是滚动发布模式,每次更新都是以快照的形式 **Arch Linux**是一个轻量级的、自己动手的(DIY)发行版,意味着你只得到你所安装的东西。 更多信息见他们的 [FAQ](https://wiki.archlinux.org/title/Frequently_asked_questions)。 -[:octicons-home-16: 主页](https://getfedora.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://docs.fedoraproject.org/en-US/docs/){ .card-link title=文档} -[:octicons-heart-16:](https://archlinux.org/donate/){ .card-link title=贡献 } +[:octicons-home-16: Homepage](https://archlinux.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://wiki.archlinux.org){ .card-link title=Documentation} +[:octicons-heart-16:](https://archlinux.org/donate){ .card-link title=Contribute } @@ -83,22 +83,22 @@ Arch Linux有一个滚动的发布周期。 没有固定的发布时间表,软 **Fedora Atomic Desktops** are variants of Fedora which use the `rpm-ostree` package manager and have a strong focus on containerized workflows and Flatpak for desktop applications. All of these variants follow the same release schedule as Fedora Workstation, benefiting from the same fast updates and staying very close to upstream. -[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops/){ .md-button .md-button--primary } -[:octicons-heart-16:](https://whatcanidoforfedora.org/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://fedoraproject.org/atomic-desktops){ .md-button .md-button--primary } +[:octicons-heart-16:](https://whatcanidoforfedora.org){ .card-link title=Contribute } -The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops/) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://www.gnome.org/)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org/)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). +The [Fedora Atomic Desktops](https://fedoramagazine.org/introducing-fedora-atomic-desktops) come in a variety of flavors depending on the desktop environment you prefer, such as **Fedora Silverblue** (which comes with [GNOME](https://gnome.org)), **Fedora Kinoite**, (which comes with [KDE](https://kde.org)), **Fedora Sway Atomic**, or **Fedora Budgie Atomic**. However, we don't recommend the last of these as the Budgie desktop environment [still requires X11](https://buddiesofbudgie.org/blog/wayland). -These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf/) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree/). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. +These operating systems differ from Fedora Workstation as they replace the [DNF](https://docs.fedoraproject.org/en-US/quick-docs/dnf) package manager with a much more advanced alternative called [`rpm-ostree`](https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-guide/package-management/rpm-ostree). The `rpm-ostree` package manager works by downloading a base image for the system, then overlaying packages over it in a [git](https://en.wikipedia.org/wiki/Git)-like commit tree. When the system is updated, a new base image is downloaded and the overlays will be applied to that new image. After the update is complete you will reboot the system into the new deployment. `rpm-ostree` keeps two deployments of the system so that you can easily rollback if something breaks in the new deployment. There is also the option to pin more deployments as needed. -[Flatpak](https://www.flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. +[Flatpak](https://flatpak.org) is the primary package installation method on these distributions, as `rpm-ostree` is only meant to overlay packages that cannot stay inside of a container on top of the base image. -As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox/) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. +As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fedoraproject.org/en-US/fedora-silverblue/toolbox) to create [Podman](https://podman.io) containers with a shared home directory with the host operating system and mimic a traditional Fedora environment, which is a [useful feature](https://containertoolbx.org) for the discerning developer. ### NixOS @@ -108,9 +108,9 @@ As an alternative to Flatpaks, there is the option of [Toolbox](https://docs.fed NixOS是一个基于Nix软件包管理器的独立发行版,注重可重复性和可靠性。 -[:octicons-home-16: 主页](https://nixos.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=文档} -[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=贡献 } +[:octicons-home-16: Homepage](https://nixos.org){ .md-button .md-button--primary } +[:octicons-info-16:](https://nixos.org/learn.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://nixos.org/donate.html){ .card-link title=Contribute } @@ -136,10 +136,10 @@ Nix is a source-based package manager; if there’s no pre-built available in th **Whonix** is based on [Kicksecure](#kicksecure), a security-focused fork of Debian. 它的目的是在互联网上提供隐私、安全和匿名性。 Whonix最好与[Qubes OS](#qubes-os)一起使用。 -[:octicons-home-16: 主页](https://www.whonix.org/){ .md-button .md-button--primary } -[:simple-torbrowser:](http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="洋葱服务" } -[:octicons-info-16:](https://www.whonix.org/wiki/Documentation){ .card-link title=文档} -[:octicons-heart-16:](https://www.whonix.org/wiki/Donate){ .card-link title=贡献 } +[:octicons-home-16: Homepage](https://whonix.org){ .md-button .md-button--primary } +[:simple-torbrowser:](http://dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion){ .card-link title="Onion Service" } +[:octicons-info-16:](https://whonix.org/wiki/Documentation){ .card-link title=Documentation} +[:octicons-heart-16:](https://whonix.org/wiki/Donate){ .card-link title=Contribute } @@ -147,9 +147,9 @@ Nix is a source-based package manager; if there’s no pre-built available in th Whonix is meant to run as two virtual machines: a “Workstation” and a Tor “Gateway.” All communications from the Workstation must go through the Tor gateway. This means that even if the Workstation is compromised by malware of some kind, the true IP address remains hidden. -Some of its features include Tor Stream Isolation, [keystroke anonymization](https://www.whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://www.whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. +Some of its features include Tor Stream Isolation, [keystroke anonymization](https://whonix.org/wiki/Keystroke_Deanonymization#Kloak), [encrypted swap](https://github.com/Whonix/swap-file-creator), and a hardened memory allocator. Future versions of Whonix will likely include [full system AppArmor policies](https://github.com/Whonix/apparmor-profile-everything) and a [sandbox app launcher](https://whonix.org/wiki/Sandbox-app-launcher) to fully confine all processes on the system. -Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. +Whonix is best used [in conjunction with Qubes](https://whonix.org/wiki/Qubes/Why_use_Qubes_over_other_Virtualizers). We have a [recommended guide](os/qubes-overview.md#connecting-to-tor-via-a-vpn) on configuring Whonix in conjunction with a VPN ProxyVM in Qubes to hide your Tor activities from your ISP. ### Tails @@ -159,9 +159,9 @@ Whonix is best used [in conjunction with Qubes](https://www.whonix.org/wiki/Qube **Tails**是一个基于Debian的实时操作系统,它通过Tor路由所有的通信,它可以从DVD、U盘或SD卡安装在几乎任何电脑上启动。 它使用 [Tor](tor.md)来保护隐私和匿名,同时规避审查制度,而且在关闭电源后,它不会在其使用的计算机上留下任何痕迹。 -[:octicons-home-16: 主页](https://tails.boum.org/){ .md-button .md-button--primary } -[:octicons-info-16:](https://tails.boum.org/doc/index.en.html){ .card-link title=文档} -[:octicons-heart-16:](https://tails.boum.org/donate/){ .card-link title=贡献 } +[:octicons-home-16: Homepage](https://tails.net){ .md-button .md-button--primary } +[:octicons-info-16:](https://tails.net/doc/index.en.html){ .card-link title=Documentation} +[:octicons-heart-16:](https://tails.net/donate){ .card-link title=Contribute } @@ -178,7 +178,7 @@ Tails is great for counter forensics due to amnesia (meaning nothing is written Tails includes [uBlock Origin](desktop-browsers.md#ublock-origin) in Tor Browser by default, which may potentially make it easier for adversaries to fingerprint Tails users. [Whonix](desktop.md#whonix) virtual machines may be more leak-proof, however they are not amnesic, meaning data may be recovered from your storage device. -By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.boum.org/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. +By design, Tails is meant to completely reset itself after each reboot. Encrypted [persistent storage](https://tails.net/doc/persistent_storage/index.en.html) can be configured to store some data between reboots. ## 以安全为重点的发行版 @@ -190,12 +190,12 @@ By design, Tails is meant to completely reset itself after each reboot. Encrypte **Qubes OS** is an open-source operating system designed to provide strong security for desktop computing through secure virtual machines (or "qubes"). Qubes is based on Xen, the X Window System, and Linux. It can run most Linux applications and use most of the Linux drivers. -[:octicons-home-16: Homepage](https://www.qubes-os.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://qubes-os.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://www.qubes-os.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.qubes-os.org/doc/){ .card-link title=Documentation } -[:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribute } +[:octicons-eye-16:](https://qubes-os.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://qubes-os.org/doc){ .card-link title=Documentation } +[:octicons-code-16:](https://github.com/QubesOS){ .card-link title="Source Code" } +[:octicons-heart-16:](https://qubes-os.org/donate){ .card-link title=Contribute } @@ -215,11 +215,11 @@ While we [recommend against](os/linux-overview.md#release-cycle) "perpetually ou **Kicksecure**—in oversimplified terms—is a set of scripts, configurations, and packages that substantially reduce the attack surface of Debian. 它默认涵盖了大量的隐私和加固建议。 It also serves as the base OS for [Whonix](#whonix). -[:octicons-home-16: Homepage](https://www.kicksecure.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kicksecure.com/wiki/Documentation){ .card-link title=Documentation } +[:octicons-home-16: Homepage](https://kicksecure.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kicksecure.com/wiki/Privacy_Policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kicksecure.com/wiki/Documentation){ .card-link title=Documentation } [:octicons-code-16:](https://github.com/Kicksecure){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kicksecure.com/wiki/Donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kicksecure.com/wiki/Donate){ .card-link title=Contribute } diff --git a/i18n/zh/device-integrity.md b/i18n/zh/device-integrity.md index 2b9c23a7..390009a9 100644 --- a/i18n/zh/device-integrity.md +++ b/i18n/zh/device-integrity.md @@ -26,7 +26,7 @@ This means an attacker would have to regularly re-infect your device to retain a If any of the following tools indicate a potential compromise by spyware such as Pegasus, Predator, or KingsPawn, we advise that you contact: -- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us/) +- If you are a human rights defender, journalist, or from a civil society organization: [Amnesty International's Security Lab](https://securitylab.amnesty.org/contact-us) - If a business or government device is compromised: Contact the appropriate security liason at your enterprise, department, or agency - Local law enforcement @@ -54,7 +54,7 @@ Public indicators of compromise are insufficient to determine that a device is " Reliable and comprehensive digital forensic support and triage requires access to non-public indicators, research and threat intelligence. -Such support is available to civil society through [Amnesty International's Security Lab](https://www.amnesty.org/en/tech/) or [Access Now’s Digital Security Helpline](https://www.accessnow.org/help/). +Such support is available to civil society through [Amnesty International's Security Lab](https://amnesty.org/en/tech) or [Access Now’s Digital Security Helpline](https://accessnow.org/help). @@ -66,16 +66,16 @@ These tools can trigger false-positives. If any of these tools finds indicators ![MVT logo](assets/img/device-integrity/mvt.webp){ align=right } -**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project/). +**Mobile Verification Toolkit** (**MVT**) is a collection of utilities which simplifies and automates the process of scanning mobile devices for potential traces of targeting or infection by known spyware campaigns. MVT was developed by Amnesty International and released in 2021 in the context of the [Pegasus Project](https://forbiddenstories.org/about-the-pegasus-project). -[:octicons-home-16: Homepage](https://mvt.re/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://mvt.re){ .md-button .md-button--primary } [:octicons-code-16:](https://github.com/mvt-project/mvt){ .card-link title="Source Code" }
Downloads -- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install/) -- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install/) +- [:simple-apple: macOS](https://docs.mvt.re/en/latest/install) +- [:simple-linux: Linux](https://docs.mvt.re/en/latest/install)
@@ -110,7 +110,7 @@ MVT allows you to perform deeper scans/analysis if your device is jailbroken. Un **iMazing** provides a free spyware analyzer tool for iOS devices which acts as a GUI-wrapper for [MVT](#mobile-verification-toolkit). This can be much easier to run compared to MVT itself, which is a command-line tool designed for technologists and forensic investigators. -[:octicons-home-16: Homepage](https://imazing.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://imazing.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://imazing.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://imazing.com/spyware-analyzer){ .card-link title=Documentation} @@ -167,7 +167,7 @@ Auditor is not a scanning/analysis tool like some other tools on this page, rath Auditor performs attestation and intrusion detection with **two** devices, an _auditee_ (the device being verified) and an _auditor_ (the device performing the verification). The auditor can be any Android 10+ device (or a remote web service operated by [GrapheneOS](android.md#grapheneos)), while the auditee must be a specifically [supported device](https://attestation.app/about#device-support). Auditor works by: -- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the _Auditor_. +- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an _auditor_ and _auditee_, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore) of the _Auditor_. - The _auditor_ can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app). - The _auditor_ records the current state and configuration of the _auditee_. - Should tampering with the operating system of the _auditee_ happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations. @@ -207,13 +207,13 @@ Using these apps is insufficient to determine that a device is "clean", and not
Downloads -- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner/) +- [:simple-android: F-Droid](https://f-droid.org/packages/us.spotco.malwarescanner)
-Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors/) for advice. +Hypatia is particularly good at detecting common stalkerware: If you suspect you are a victim of stalkerware, you should [visit this page](https://stopstalkerware.org/information-for-survivors) for advice. ### iVerify (iOS) @@ -223,14 +223,14 @@ Hypatia is particularly good at detecting common stalkerware: If you suspect you **iVerify** is an iOS app which automatically scans your device to check configuration settings, patch level, and other areas of security. It also checks your device for indicators of compromise by jailbreak tools or spyware such as Pegasus. -[:octicons-home-16: Homepage](https://www.iverify.io/consumer){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.iverify.io/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://iverify.io/consumer){ .md-button .md-button--primary } +[:octicons-eye-16:](https://iverify.io/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://iverify.io/frequently-asked-questions#iVerify-General){ .card-link title=Documentation}
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/iverify/id1466120520) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1466120520)
diff --git a/i18n/zh/dns.md b/i18n/zh/dns.md index 0dd9d017..b8bc74f4 100644 --- a/i18n/zh/dns.md +++ b/i18n/zh/dns.md @@ -11,14 +11,14 @@ Encrypted DNS with third-party servers should only be used to get around basic [ ## 推荐的供应商 -| DNS供应商 | 隐私政策 | 协议 | 日志记录 | ECS | 筛选 | -| ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------ | --- | ---------------------------------------------------------------------------------------------------------------------------- | -| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | 一些[^1] | Yes | Based on personal configuration. 正在使用的过滤器列表可以在这里找到。 [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | -| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setting-up-1.1.1.1/) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) | Cleartext
DoH/3
DoT | 一些[^2] | No | Based on personal configuration. | -| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | 可选[^3] | No | Based on personal configuration. | -| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy/) | DoH
DoT | No[^4] | No | Based on personal configuration. 正在使用的过滤器列表可以在这里找到。 [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | -| [**NextDNS**](https://www.nextdns.io) | [:octicons-link-external-24:](https://www.nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | 可选[^5] | 可选 | Based on personal configuration. | -| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy/) | Cleartext
DoH
DoT
DNSCrypt | 一些[^6] | 可选 | Based on personal configuration, Malware blocking by default. | +| DNS供应商 | 隐私政策 | 协议 | 日志记录 | ECS | 筛选 | +| -------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------ | --- | ---------------------------------------------------------------------------------------------------------------------------- | +| [**AdGuard**](https://adguard.com/en/adguard-dns/overview.html) | [:octicons-link-external-24:](https://adguard.com/en/privacy/dns.html) | Cleartext
DoH/3
DoT
DoQ
DNSCrypt | 一些[^1] | Yes | Based on personal configuration. 正在使用的过滤器列表可以在这里找到。 [:octicons-link-external-24:](https://github.com/AdguardTeam/AdGuardDNS) | +| [**Cloudflare**](https://developers.cloudflare.com/1.1.1.1/setup) | [:octicons-link-external-24:](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) | Cleartext
DoH/3
DoT | 一些[^2] | No | Based on personal configuration. | +| [**Control D**](https://controld.com/free-dns) | [:octicons-link-external-24:](https://controld.com/privacy) | Cleartext
DoH/3
DoT
DoQ | 可选[^3] | No | Based on personal configuration. | +| [**Mullvad**](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) | [:octicons-link-external-24:](https://mullvad.net/en/help/no-logging-data-policy) | DoH
DoT | No[^4] | No | Based on personal configuration. 正在使用的过滤器列表可以在这里找到。 [:octicons-link-external-24:](https://github.com/mullvad/dns-adblock) | +| [**NextDNS**](https://nextdns.io) | [:octicons-link-external-24:](https://nextdns.io/privacy) | Cleartext
DoH/3
DoT
DoQ | 可选[^5] | 可选 | Based on personal configuration. | +| [**Quad9**](https://quad9.net) | [:octicons-link-external-24:](https://quad9.net/privacy/policy) | Cleartext
DoH
DoT
DNSCrypt | 一些[^6] | 可选 | Based on personal configuration, Malware blocking by default. | ### Criteria @@ -50,7 +50,7 @@ Encrypted DNS with third-party servers should only be used to get around basic [ #### 已签名的配置文件 -苹果公司没有为创建加密的DNS配置文件提供本地接口。 [安全DNS配置文件创建者](https://dns.notjakob.com/tool.html) 是一个非官方的工具,用于创建你自己的加密DNS配置文件,然而它们将不会被签署。 签名的档案是首选;签名验证了档案的来源,有助于确保档案的完整性。 绿色的 "已验证 "标签被赋予已签署的配置文件。 关于代码签名的更多信息,见 [关于代码签名](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html)。 ** [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html)、 [NextDNS](https://apple.nextdns.io)和 [Quad9](https://www.quad9.net/news/blog/ios-mobile-provisioning-profiles/)提供了签名的配置文件**。 +苹果公司没有为创建加密的DNS配置文件提供本地接口。 [安全DNS配置文件创建者](https://dns.notjakob.com/tool.html) 是一个非官方的工具,用于创建你自己的加密DNS配置文件,然而它们将不会被签署。 签名的档案是首选;签名验证了档案的来源,有助于确保档案的完整性。 绿色的 "已验证 "标签被赋予已签署的配置文件。 关于代码签名的更多信息,见 [关于代码签名](https://developer.apple.com/library/archive/documentation/Security/Conceptual/CodeSigningGuide/Introduction/Introduction.html)。 **Signed profiles** are offered by [AdGuard](https://adguard.com/en/blog/encrypted-dns-ios-14.html), [NextDNS](https://apple.nextdns.io), and [Quad9](https://quad9.net/news/blog/ios-mobile-provisioning-profiles).

信息

@@ -74,7 +74,7 @@ Encrypted DNS with third-party servers should only be used to get around basic [ [:octicons-home-16: Homepage](https://rethinkdns.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://rethinkdns.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.rethinkdns.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.rethinkdns.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/celzero/rethink-app){ .card-link title="Source Code" }
@@ -123,9 +123,9 @@ Encrypted DNS with third-party servers should only be used to get around basic [
-![AdGuard Home标识](assets/img/dns/adguard-home.svg){ align=right } +![AdGuard Home logo](assets/img/dns/adguard-home.svg){ align=right } -**AdGuard Home**是一个开源的 [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole),它使用[DNS过滤](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/)来阻止不需要的网络内容,如广告。 +**AdGuard Home** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. AdGuard Home有一个精致的网络界面,可以查看洞察力和管理被阻止的内容。 @@ -142,25 +142,25 @@ AdGuard Home有一个精致的网络界面,可以查看洞察力和管理被
-! [Pi-hole标志](assets/img/dns/pi-hole.svg){ align=right } +![Pi-hole logo](assets/img/dns/pi-hole.svg){ align=right } -**Pi-hole**是一个开源的 [DNS-sinkhole](https://wikipedia.org/wiki/DNS_sinkhole),它使用[DNS过滤](https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/)来阻止不需要的网络内容,如广告。 +**Pi-hole** is an open-source [DNS-sinkhole](https://en.wikipedia.org/wiki/DNS_sinkhole) which uses [DNS filtering](https://cloudflare.com/learning/access-management/what-is-dns-filtering) to block unwanted web content, such as advertisements. Pi-hole被设计为在Raspberry Pi上托管,但它并不局限于这种硬件。 该软件具有一个友好的网络界面,可以查看洞察力和管理封锁的内容。 -[:octicons-home-16: 主页](https://pi-hole.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://pi-hole.net/privacy/){ .card-link title="隐私政策" } -[:octicons-info-16:](https://docs.pi-hole.net/){ .card-link title=文档} -[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="源代码" } -[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title="贡献" } +[:octicons-home-16: Homepage](https://pi-hole.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://pi-hole.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.pi-hole.net){ .card-link title=Documentation} +[:octicons-code-16:](https://github.com/pi-hole/pi-hole){ .card-link title="Source Code" } +[:octicons-heart-16:](https://pi-hole.net/donate){ .card-link title=Contribute }
[^1]: AdGuard存储其DNS服务器的汇总性能指标,即对特定服务器的完整请求数、被阻止的请求数和处理请求的速度。 他们还保留并存储了过去24小时内请求的域名数据库。 "我们需要这些信息来识别和阻止新的追踪者和威胁。" "我们还记录了这个或那个追踪器被封锁的次数。 我们需要这些信息来从我们的过滤器中删除过时的规则"。 [https://adguard.com/en/privacy/dns.html](https://adguard.com/en/privacy/dns.html) -[^2]: Cloudflare只收集和存储发送到1.1.1.1解析器的有限DNS查询数据。 1.1.1.1解析器服务不记录个人数据,而且大部分有限的非个人识别的查询数据只存储25小时。 [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/) +[^2]: Cloudflare只收集和存储发送到1.1.1.1解析器的有限DNS查询数据。 1.1.1.1解析器服务不记录个人数据,而且大部分有限的非个人识别的查询数据只存储25小时。 [https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/](https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver) [^3]: Control D只记录具有自定义DNS配置文件的高级解析器。 自由解析器不记录数据。 [https://controld.com/privacy](https://controld.com/privacy) -[^4]: Mullvad的DNS服务对Mullvad VPN的订阅者和非订阅者都适用。 他们的隐私政策明确声称他们不会以任何方式记录DNS请求。 [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy/) +[^4]: Mullvad的DNS服务对Mullvad VPN的订阅者和非订阅者都适用。 他们的隐私政策明确声称他们不会以任何方式记录DNS请求。 [https://mullvad.net/en/help/no-logging-data-policy/](https://mullvad.net/en/help/no-logging-data-policy) [^5]: NextDNS can provide insights and logging features on an opt-out basis. 你可以为你选择保留的任何日志选择保留时间和日志存储位置。 如果没有特别要求,就不记录数据。 [https://nextdns.io/privacy](https://nextdns.io/privacy) -[^6]: Quad9收集了一些数据,用于威胁监测和应对。 然后,这些数据可能被重新混合和共享,例如为了安全研究的目的。 Quad9不会收集或记录IP地址或其他他们认为可以识别个人身份的数据。 [https://www.quad9.net/privacy/policy/](https://www.quad9.net/privacy/policy/) +[^6]: Quad9收集了一些数据,用于威胁监测和应对。 然后,这些数据可能被重新混合和共享,例如为了安全研究的目的。 Quad9不会收集或记录IP地址或其他他们认为可以识别个人身份的数据。 [https://quad9.net/privacy/policy](https://quad9.net/privacy/policy) diff --git a/i18n/zh/email-clients.md b/i18n/zh/email-clients.md index 5354c7ea..e054a7fb 100644 --- a/i18n/zh/email-clients.md +++ b/i18n/zh/email-clients.md @@ -28,17 +28,17 @@ OpenPGP also does not support [forward secrecy](https://en.wikipedia.org/wiki/Fo **Thunderbird** is a free, open-source, cross-platform email, newsgroup, news feed, and chat (XMPP, IRC, Matrix) client developed by the Thunderbird community, and previously by the Mozilla Foundation. -[:octicons-home-16: Homepage](https://www.thunderbird.net){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://thunderbird.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mozilla.org/privacy/thunderbird){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.mozilla.org/products/thunderbird){ .card-link title=Documentation} [:octicons-code-16:](https://hg.mozilla.org/comm-central){ .card-link title="Source Code" }
Downloads -- [:simple-windows11: Windows](https://www.thunderbird.net) -- [:simple-apple: macOS](https://www.thunderbird.net) -- [:simple-linux: Linux](https://www.thunderbird.net) +- [:simple-windows11: Windows](https://thunderbird.net) +- [:simple-apple: macOS](https://thunderbird.net) +- [:simple-linux: Linux](https://thunderbird.net) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.mozilla.Thunderbird)
@@ -75,7 +75,7 @@ We recommend changing some of these settings to make Thunderbird a little more p **Apple Mail** is included in macOS and can be extended to have OpenPGP support with [GPG Suite](encryption.md#gpg-suite), which adds the ability to send PGP-encrypted email. [:octicons-home-16: Homepage](https://support.apple.com/guide/mail/welcome/mac){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/en-ww/){ .card-link title="Privacy Policy" } +[:octicons-eye-16:](https://apple.com/legal/privacy/en-ww){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/mail){ .card-link title=Documentation} @@ -94,7 +94,7 @@ Apple Mail has the ability to load remote content in the background or block it [:octicons-home-16: Homepage](https://canarymail.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://canarymail.io/privacy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://canarymail.zendesk.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://canarymail.zendesk.com){ .card-link title=Documentation}
Downloads @@ -128,7 +128,7 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f [:octicons-eye-16:](https://github.com/M66B/FairEmail/blob/master/PRIVACY.md){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/M66B/FairEmail/blob/master/FAQ.md){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/M66B/FairEmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://email.faircode.eu/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://email.faircode.eu/donate){ .card-link title=Contribute }
Downloads @@ -146,13 +146,13 @@ Canary Mail is closed-source. We recommend it due to the few choices there are f ![Evolution logo](assets/img/email-clients/evolution.svg){ align=right } -**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable/) to help you get started. +**Evolution** is a personal information management application that provides integrated mail, calendaring and address book functionality. Evolution has extensive [documentation](https://help.gnome.org/users/evolution/stable) to help you get started. [:octicons-home-16: Homepage](https://wiki.gnome.org/Apps/Evolution){ .md-button .md-button--primary } [:octicons-eye-16:](https://wiki.gnome.org/Apps/Evolution/PrivacyPolicy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.gnome.org/users/evolution/stable/){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution/){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.gnome.org/donate/){ .card-link title=Contribute } +[:octicons-info-16:](https://help.gnome.org/users/evolution/stable){ .card-link title=Documentation} +[:octicons-code-16:](https://gitlab.gnome.org/GNOME/evolution){ .card-link title="Source Code" } +[:octicons-heart-16:](https://gnome.org/donate){ .card-link title=Contribute }
Downloads @@ -175,7 +175,7 @@ In the future, K-9 Mail will be the [officially branded](https://k9mail.app/2022 [:octicons-home-16: Homepage](https://k9mail.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://k9mail.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.k9mail.app/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.k9mail.app){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/thundernest/k-9){ .card-link title="Source Code" } [:octicons-heart-16:](https://k9mail.app/contribute){ .card-link title=Contribute } @@ -206,9 +206,9 @@ When replying to someone on a mailing list the "reply" option may also include t [:octicons-home-16: Homepage](https://kontact.kde.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://kontact.kde.org/users/){ .card-link title=Documentation} +[:octicons-info-16:](https://kontact.kde.org/users){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/kmail){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -228,8 +228,8 @@ When replying to someone on a mailing list the "reply" option may also include t **Mailvelope** is a browser extension that enables the exchange of encrypted emails following the OpenPGP encryption standard. -[:octicons-home-16: Homepage](https://www.mailvelope.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.mailvelope.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://mailvelope.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://mailvelope.com/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://mailvelope.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailvelope/mailvelope){ .card-link title="Source Code" } @@ -255,9 +255,9 @@ When replying to someone on a mailing list the "reply" option may also include t NeoMutt is a text-based client that has a steep learning curve. It is however, very customizable. [:octicons-home-16: Homepage](https://neomutt.org){ .md-button .md-button--primary } -[:octicons-info-16:](https://neomutt.org/guide/){ .card-link title=Documentation} +[:octicons-info-16:](https://neomutt.org/guide){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/neomutt/neomutt){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.paypal.com/paypalme/russon/){ .card-link title=Contribute } +[:octicons-heart-16:](https://paypal.com/paypalme/russon){ .card-link title=Contribute }
Downloads diff --git a/i18n/zh/email.md b/i18n/zh/email.md index b1d4351a..fd8c055c 100644 --- a/i18n/zh/email.md +++ b/i18n/zh/email.md @@ -55,7 +55,7 @@ These providers natively support OpenPGP encryption/decryption and the [Web Key Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -74,7 +74,7 @@ These providers natively support OpenPGP encryption/decryption and the [Web Key #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [subaddressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. +Paid Proton Mail subscribers can use their own domain with the service or a [catch-all](https://proton.me/support/catch-all) address. Proton Mail also supports [sub-addressing](https://proton.me/support/creating-aliases), which is useful for people who don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -129,7 +129,7 @@ Proton Mail不提供数字遗留功能。 #### :material-check:{ .pg-green } Custom Domains and Aliases -Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/display/MBOKBEN/Using+catch-all+alias+with+own+domain) addresses. Mailbox.org also supports [subaddressing](https://kb.mailbox.org/display/BMBOKBEN/What+is+an+alias+and+how+do+I+use+it), which is useful if you don't want to purchase a domain. +Mailbox.org lets you use your own domain, and they support [catch-all](https://kb.mailbox.org/en/private/custom-domains/how-to-set-up-a-catch-all-alias-with-a-custom-domain-name) addresses. Mailbox.org also supports [sub-addressing](https://kb.mailbox.org/en/private/account-article/what-is-an-alias-and-how-do-i-use-it), which is useful if you don't want to purchase a domain. #### :material-check:{ .pg-green } Private Payment Methods @@ -137,17 +137,17 @@ Mailbox.org doesn't accept any cryptocurrencies as a result of their payment pro #### :material-check:{ .pg-green } Account Security -Mailbox.org supports [two factor authentication](https://kb.mailbox.org/display/MBOKBEN/How+to+use+two-factor+authentication+-+2FA) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://www.yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. +Mailbox.org supports [two factor authentication](https://kb.mailbox.org/en/private/account-article/how-to-use-two-factor-authentication-2fa) for their webmail only. You can use either TOTP or a [YubiKey](https://en.wikipedia.org/wiki/YubiKey) via the [YubiCloud](https://yubico.com/products/services-software/yubicloud). Web standards such as [WebAuthn](https://en.wikipedia.org/wiki/WebAuthn) are not yet supported. #### :material-information-outline:{ .pg-blue } Data Security -Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/display/MBOKBEN/The+Encrypted+Mailbox). New messages that you receive will then be immediately encrypted with your public key. +Mailbox.org allows for encryption of incoming mail using their [encrypted mailbox](https://kb.mailbox.org/en/private/e-mail-article/your-encrypted-mailbox). New messages that you receive will then be immediately encrypted with your public key. -However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/display/BMBOKBEN/Encryption+of+calendar+and+address+book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. +However, [Open-Exchange](https://en.wikipedia.org/wiki/Open-Xchange), the software platform used by Mailbox.org, [does not support](https://kb.mailbox.org/en/private/security-privacy-article/encryption-of-calendar-and-address-book) the encryption of your address book and calendar. A [standalone option](calendar.md) may be more appropriate for that information. #### :material-check:{ .pg-green } Email Encryption -Mailbox.org has [integrated encryption](https://kb.mailbox.org/display/MBOKBEN/Send+encrypted+e-mails+with+Guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/display/MBOKBEN/My+recipient+does+not+use+PGP) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. +Mailbox.org has [integrated encryption](https://kb.mailbox.org/en/private/e-mail-article/send-encrypted-e-mails-with-guard) in their webmail, which simplifies sending messages to people with public OpenPGP keys. They also allow [remote recipients to decrypt an email](https://kb.mailbox.org/en/private/e-mail-article/my-recipient-does-not-use-pgp) on Mailbox.org's servers. This feature is useful when the remote recipient does not have OpenPGP and cannot decrypt a copy of the email in their own mailbox. Mailbox.org also supports the discovery of public keys via HTTP from their [Web Key Directory (WKD)](https://wiki.gnupg.org/WKD). This allows people outside of Mailbox.org to find the OpenPGP keys of Mailbox.org accounts easily, for cross-provider E2EE. This only applies to email addresses ending in one of Mailbox.org's own domains, like @mailbox.org. If you use a custom domain, you must [configure WKD](./basics/email-security.md#what-is-the-web-key-directory-standard) separately. @@ -157,9 +157,9 @@ Your account will be set to a restricted user account when your contract ends, a #### :material-information-outline:{ .pg-blue } Additional Functionality -You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/display/MBOKBEN/The+Tor+exit+node+of+mailbox.org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. +You can access your Mailbox.org account via IMAP/SMTP using their [.onion service](https://kb.mailbox.org/en/private/faq-article/the-tor-exit-node-of-mailbox-org). However, their webmail interface cannot be accessed via their .onion service and you may experience TLS certificate errors. -All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/display/MBOKBEN/Encrypt+files+on+your+Drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/display/MBOKBEN/Ensuring+E-Mails+are+Sent+Securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. +All accounts come with limited cloud storage that [can be encrypted](https://kb.mailbox.org/en/private/drive-article/encrypt-files-on-your-drive). Mailbox.org also offers the alias [@secure.mailbox.org](https://kb.mailbox.org/en/private/e-mail-article/ensuring-e-mails-are-sent-securely), which enforces the TLS encryption on the connection between mail servers, otherwise the message will not be sent at all. Mailbox.org also supports [Exchange ActiveSync](https://en.wikipedia.org/wiki/Exchange_ActiveSync) in addition to standard access protocols like IMAP and POP3. Mailbox.org has a digital legacy feature for all plans. You can choose whether you want any of your data to be passed to heirs providing that they apply and provide your testament. Alternatively, you can nominate a person by name and address. @@ -185,18 +185,18 @@ These providers store your emails with zero-knowledge encryption, making them gr [:octicons-eye-16:](https://tuta.com/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://tuta.com/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/tutao/tutanota){ .card-link title="Source Code" } -[:octicons-heart-16:](https://tuta.com/community/){ .card-link title=Contribute } +[:octicons-heart-16:](https://tuta.com/community){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=de.tutao.tutanota) -- [:simple-appstore: App Store](https://apps.apple.com/app/tutanota/id922429609) +- [:simple-appstore: App Store](https://apps.apple.com/app/id922429609) - [:simple-github: GitHub](https://github.com/tutao/tutanota/releases) - [:simple-windows11: Windows](https://tuta.com/#download) - [:simple-apple: macOS](https://tuta.com/#download) - [:simple-linux: Linux](https://tuta.com/#download) -- [:octicons-browser-16: Web](https://app.tuta.com/) +- [:octicons-browser-16: Web](https://app.tuta.com)
@@ -206,7 +206,7 @@ Tuta doesn't support the [IMAP protocol](https://tuta.com/faq/#imap) or the use #### :material-check:{ .pg-green } Custom Domains and Aliases -Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [subaddressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. +Paid Tuta accounts can use either 15 or 30 aliases depending on their plan and unlimited aliases on [custom domains](https://tuta.com/faq#custom-domain). Tuta doesn't allow for [sub-addressing (plus addresses)](https://tuta.com/faq#plus), but you can use a [catch-all](https://tuta.com/howto#settings-global) with a custom domain. #### :material-information-outline:{ .pg-blue } Private Payment Methods @@ -232,7 +232,7 @@ Tuta will [delete inactive free accounts](https://tuta.com/faq#inactive-accounts Tuta offers the business version of [Tuta to non-profit organizations](https://tuta.com/blog/posts/secure-email-for-non-profit) for free or with a heavy discount. -Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect/). This ensures customer contact to the business uses E2EE. The feature costs €240/y. +Tuta also has a business feature called [Secure Connect](https://tuta.com/secure-connect). This ensures customer contact to the business uses E2EE. The feature costs €240/y. Tuta doesn't offer a digital legacy feature. @@ -284,14 +284,14 @@ Using an aliasing service requires trusting both your email provider and your al - [:simple-android: Android](https://addy.io/faq/#is-there-an-android-app) - [:material-apple-ios: iOS](https://addy.io/faq/#is-there-an-ios-app) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/addy_io) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/addyio-anonymous-email-fo/iadbdpnoknmbdeolbapdackdcogdmjpe)
-The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit/) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). +The number of shared aliases (which end in a shared domain like @addy.io) that you can create is limited to 10 on addy.io's free plan, 50 on their $1/month plan and unlimited on the $4/month plan (billed $3 for a year). You can create unlimited standard aliases (which end in a domain like @[username].addy.io or a custom domain on paid plans), however, as previously mentioned, this can be detrimental to privacy because people can trivially tie your standard aliases together based on the domain name alone. They are useful where a shared domain might be blocked by a service. Securitum [audited](https://addy.io/blog/addy-io-passes-independent-security-audit) addy.io in September 2023 and no significant vulnerabilities [were identified](https://addy.io/addy-io-security-audit.pdf). Notable free features: @@ -310,8 +310,8 @@ Notable free features: **SimpleLogin** is a free service which provides email aliases on a variety of shared domain names, and optionally provides paid features like unlimited aliases and custom domains. [:octicons-home-16: Homepage](https://simplelogin.io){ .md-button .md-button--primary } -[:octicons-eye-16:](https://simplelogin.io/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://simplelogin.io/docs/){ .card-link title=Documentation} +[:octicons-eye-16:](https://simplelogin.io/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://simplelogin.io/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/simple-login){ .card-link title="Source Code" }
@@ -320,16 +320,16 @@ Notable free features: - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.simplelogin.android) - [:simple-appstore: App Store](https://apps.apple.com/app/id1494359858) - [:simple-github: GitHub](https://github.com/simple-login/Simple-Login-Android/releases) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/simplelogin) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/dphilobhebphkdjbpfohgikllaljmgbn) - [:simple-microsoftedge: Edge](https://microsoftedge.microsoft.com/addons/detail/simpleloginreceive-sen/diacfpipniklenphgljfkmhinphjlfff) -- [:simple-safari: Safari](https://apps.apple.com/app/id1494051017) +- [:simple-safari: Safari](https://apps.apple.com/app/id6475835429)
-SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit/) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). +SimpleLogin was [acquired by Proton AG](https://proton.me/news/proton-and-simplelogin-join-forces) as of April 8, 2022. If you use Proton Mail for your primary mailbox, SimpleLogin is a great choice. As both products are now owned by the same company you now only have to trust a single entity. We also expect that SimpleLogin will be more tightly integrated with Proton's offerings in the future. SimpleLogin continues to support forwarding to any email provider of your choosing. Securitum [audited](https://simplelogin.io/blog/security-audit) SimpleLogin in early 2022 and all issues [were addressed](https://simplelogin.io/audit2022/web.pdf). You can link your SimpleLogin account in the settings with your Proton account. If you have the Proton Unlimited, Business, or Visionary Plan, you will have SimpleLogin Premium for free. @@ -352,9 +352,9 @@ Advanced system administrators may consider setting up their own email server. M **Mailcow** is a more advanced mail server perfect for those with a bit more Linux experience. It has everything you need in a Docker container: A mail server with DKIM support, antivirus and spam monitoring, webmail and ActiveSync with SOGo, and web-based administration with 2FA support. [:octicons-home-16: Homepage](https://mailcow.email){ .md-button .md-button--primary } -[:octicons-info-16:](https://mailcow.github.io/mailcow-dockerized-docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.mailcow.email){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mailcow/mailcow-dockerized){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } +[:octicons-heart-16:](https://servercow.de/mailcow?lang=en#sal){ .card-link title=Contribute } @@ -372,8 +372,8 @@ Advanced system administrators may consider setting up their own email server. M For a more manual approach we've picked out these two articles: -- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd/) (2019) -- [How To Run Your Own Mail Server](https://www.c0ffee.net/blog/mail-server-guide/) (August 2017) +- [Setting up a mail server with OpenSMTPD, Dovecot and Rspamd](https://poolp.org/posts/2019-09-14/setting-up-a-mail-server-with-opensmtpd-dovecot-and-rspamd) (2019) +- [How To Run Your Own Mail Server](https://c0ffee.net/blog/mail-server-guide) (August 2017) ## Criteria @@ -386,7 +386,7 @@ We regard these features as important in order to provide a safe and optimal ser **符合条件的最低要求。** - Encrypts email account data at rest with zero-access encryption. -- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322/) standard. +- Export capability as [Mbox](https://en.wikipedia.org/wiki/Mbox) or individual .eml with [RFC5322](https://datatracker.ietf.org/doc/rfc5322) standard. - Allow users to use their own [domain name](https://en.wikipedia.org/wiki/Domain_name). Custom domain names are important to users because it allows them to maintain their agency from the service, should it turn bad or be acquired by another company which doesn't prioritize privacy. - Operates on owned infrastructure, i.e. not built upon third-party email service providers. @@ -397,7 +397,7 @@ We regard these features as important in order to provide a safe and optimal ser - Support for [WKD](https://wiki.gnupg.org/WKD) to allow improved discovery of public OpenPGP keys via HTTP. GnuPG users can get a key by typing: `gpg --locate-key example_user@example.com` - Support for a temporary mailbox for external users. This is useful when you want to send an encrypted email, without sending an actual copy to your recipient. These emails usually have a limited lifespan and then are automatically deleted. They also don't require the recipient to configure any cryptography like OpenPGP. - Availability of the email provider's services via an [onion service](https://en.wikipedia.org/wiki/.onion). -- [Subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing) support. +- [Sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) support. - Catch-all or alias functionality for those who own their own domains. - Use of standard email access protocols such as IMAP, SMTP or [JMAP](https://en.wikipedia.org/wiki/JSON_Meta_Application_Protocol). Standard access protocols ensure customers can easily download all of their email, should they want to switch to another provider. @@ -425,13 +425,13 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Protection of webmail with 2FA, such as TOTP. - Zero access encryption, builds on encryption at rest. The provider does not have the decryption keys to the data they hold. This prevents a rogue employee leaking data they have access to or remote adversary from releasing data they have stolen by gaining unauthorized access to the server. - [DNSSEC](https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions) support. -- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://www.hardenize.com/), [testssl.sh](https://testssl.sh/), or [Qualys SSL Labs](https://www.ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). +- No TLS errors or vulnerabilities when being profiled by tools such as [Hardenize](https://hardenize.com), [testssl.sh](https://testssl.sh), or [Qualys SSL Labs](https://ssllabs.com/ssltest); this includes certificate related errors and weak DH parameters, such as those that led to [Logjam](https://en.wikipedia.org/wiki/Logjam_(computer_security)). - A server suite preference (optional on TLSv1.3) for strong cipher suites which support forward secrecy and authenticated encryption. - A valid [MTA-STS](https://tools.ietf.org/html/rfc8461) and [TLS-RPT](https://tools.ietf.org/html/rfc8460) policy. - Valid [DANE](https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Named_Entities) records. - Valid [SPF](https://en.wikipedia.org/wiki/Sender_Policy_Framework) and [DKIM](https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail) records. - Have a proper [DMARC](https://en.wikipedia.org/wiki/DMARC) record and policy or use [ARC](https://en.wikipedia.org/wiki/Authenticated_Received_Chain) for authentication. If DMARC authentication is being used, the policy must be set to `reject` or `quarantine`. -- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996/). +- A server suite preference of TLS 1.2 or later and a plan for [RFC8996](https://datatracker.ietf.org/doc/rfc8996). - [SMTPS](https://en.wikipedia.org/wiki/SMTPS) submission, assuming SMTP is used. - Website security standards such as: - [HTTP Strict Transport Security](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) @@ -446,7 +446,7 @@ Email servers deal with a lot of very sensitive data. We expect that providers w - Bug-bounty programs and/or a coordinated vulnerability-disclosure process. - Website security standards such as: - [Content Security Policy (CSP)](https://en.wikipedia.org/wiki/Content_Security_Policy) - - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163/) + - [RFC9163 Expect-CT](https://datatracker.ietf.org/doc/rfc9163) ### Trust diff --git a/i18n/zh/encryption.md b/i18n/zh/encryption.md index cd6aceb0..eccbc26c 100644 --- a/i18n/zh/encryption.md +++ b/i18n/zh/encryption.md @@ -22,15 +22,15 @@ cover: encryption.webp [:octicons-home-16: Homepage](https://cryptomator.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://cryptomator.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptomator.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.cryptomator.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/cryptomator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://cryptomator.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://cryptomator.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.cryptomator) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/cryptomator-2/id1560822163) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1560822163) - [:simple-android: Android](https://cryptomator.org/android) - [:simple-windows11: Windows](https://cryptomator.org/downloads) - [:simple-apple: macOS](https://cryptomator.org/downloads) @@ -45,7 +45,7 @@ Cryptomator使用AES-256加密,对文件和文件名进行加密。 Cryptomato Some Cryptomator cryptographic libraries have been [audited](https://community.cryptomator.org/t/has-there-been-a-security-review-audit-of-cryptomator/44) by Cure53. The scope of the audited libraries includes: [cryptolib](https://github.com/cryptomator/cryptolib), [cryptofs](https://github.com/cryptomator/cryptofs), [siv-mode](https://github.com/cryptomator/siv-mode) and [cryptomator-objc-cryptor](https://github.com/cryptomator/cryptomator-objc-cryptor). The audit did not extend to [cryptolib-swift](https://github.com/cryptomator/cryptolib-swift), which is a library used by Cryptomator for iOS. -Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target/), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture/), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices/) for use in further detail. +Cryptomator's documentation details its intended [security target](https://docs.cryptomator.org/en/latest/security/security-target), [security architecture](https://docs.cryptomator.org/en/latest/security/architecture), and [best practices](https://docs.cryptomator.org/en/latest/security/best-practices) for use in further detail. ### Picocrypt (File) @@ -81,15 +81,15 @@ Cryptomator's documentation details its intended [security target](https://docs. [:octicons-home-16: Homepage](https://veracrypt.fr){ .md-button .md-button--primary } [:octicons-info-16:](https://veracrypt.fr/en/Documentation.html){ .card-link title=Documentation} -[:octicons-code-16:](https://veracrypt.fr/code/){ .card-link title="Source Code" } +[:octicons-code-16:](https://veracrypt.fr/code){ .card-link title="Source Code" } [:octicons-heart-16:](https://veracrypt.fr/en/Donation.html){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-apple: macOS](https://www.veracrypt.fr/en/Downloads.html) -- [:simple-linux: Linux](https://www.veracrypt.fr/en/Downloads.html) +- [:simple-windows11: Windows](https://veracrypt.fr/en/Downloads.html) +- [:simple-apple: macOS](https://veracrypt.fr/en/Downloads.html) +- [:simple-linux: Linux](https://veracrypt.fr/en/Downloads.html)
@@ -111,15 +111,15 @@ For encrypting the drive your operating system boots from, we generally recommen ![BitLocker logo](assets/img/encryption-software/bitlocker.png){ align=right } -**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection/). +**BitLocker** is the full volume encryption solution bundled with Microsoft Windows. The main reason we recommend it for encrypting your boot drive is because of its [use of TPM](https://learn.microsoft.com/windows/security/information-protection/tpm/how-windows-uses-the-tpm). ElcomSoft, a forensics company, has written about this feature in [Understanding BitLocker TPM Protection](https://blog.elcomsoft.com/2021/01/understanding-BitLocker-tpm-protection). -[:octicons-info-16:](https://docs.microsoft.com/en-us/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation} +[:octicons-info-16:](https://learn.microsoft.com/windows/security/information-protection/BitLocker/BitLocker-overview){ .card-link title=Documentation}
-BitLocker is [only supported](https://support.microsoft.com/en-us/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites. +BitLocker is [only supported](https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838) on Pro, Enterprise and Education editions of Windows. It can be enabled on Home editions provided that they meet the prerequisites.
Enabling BitLocker on Windows Home @@ -136,7 +136,7 @@ To enable BitLocker on "Home" editions of Windows, you must have partitions form powershell Get-WmiObject -Namespace "root/cimv2/security/microsofttpm" -Class WIN32_tpm ``` -3. Access [Advanced Startup Options](https://support.microsoft.com/en-us/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. +3. Access [Advanced Startup Options](https://support.microsoft.com/windows/advanced-startup-options-including-safe-mode-b90e7808-80b5-a291-d4b8-1a1af602b617). You need to reboot while pressing the F8 key before Windows starts and go into the *command prompt* in **Troubleshoot** → **Advanced Options** → **Command Prompt**. 4. Login with your admin account and type this in the command prompt to start encryption: ```powershell manage-bde -on c: -used @@ -185,7 +185,7 @@ We recommend storing a local recovery key in a secure place as opposed to using [:octicons-home-16: Homepage](https://gitlab.com/cryptsetup/cryptsetup/-/blob/main/README.md){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.com/cryptsetup/cryptsetup/-/wikis/home){ .card-link title=Documentation} -[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup/){ .card-link title="Source Code" } +[:octicons-code-16:](https://gitlab.com/cryptsetup/cryptsetup){ .card-link title="Source Code" }
@@ -231,20 +231,20 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht ![Kryptor logo](assets/img/encryption-software/kryptor.png){ align=right } -**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign/) to provide a simple, easier alternative to GPG. +**Kryptor** is a free and open-source file encryption and signing tool that makes use of modern and secure cryptographic algorithms. It aims to be a better version of [age](https://github.com/FiloSottile/age) and [Minisign](https://jedisct1.github.io/minisign) to provide a simple, easier alternative to GPG. -[:octicons-home-16: Homepage](https://www.kryptor.co.uk){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.kryptor.co.uk/tutorial){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://kryptor.co.uk){ .md-button .md-button--primary } +[:octicons-eye-16:](https://kryptor.co.uk/features#privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://kryptor.co.uk/tutorial){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/samuel-lucas6/Kryptor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.kryptor.co.uk/#donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://kryptor.co.uk/#donate){ .card-link title=Contribute }
Downloads -- [:simple-windows11: Windows](https://www.kryptor.co.uk) -- [:simple-apple: macOS](https://www.kryptor.co.uk) -- [:simple-linux: Linux](https://www.kryptor.co.uk) +- [:simple-windows11: Windows](https://kryptor.co.uk) +- [:simple-apple: macOS](https://kryptor.co.uk) +- [:simple-linux: Linux](https://kryptor.co.uk)
@@ -258,10 +258,10 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht **Tomb** is a command-line shell wrapper for LUKS. It supports steganography via [third-party tools](https://github.com/dyne/Tomb#how-does-it-work). -[:octicons-home-16: Homepage](https://www.dyne.org/software/tomb){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://dyne.org/software/tomb){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/dyne/Tomb/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/dyne/Tomb){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.dyne.org/donate){ .card-link title=Contribute } +[:octicons-heart-16:](https://dyne.org/donate){ .card-link title=Contribute }
@@ -271,12 +271,12 @@ Tools with command-line interfaces are useful for integrating [shell scripts](ht OpenPGP is sometimes needed for specific tasks such as digitally signing and encrypting email. PGP has many features and is [complex](https://latacora.micro.blog/2019/07/16/the-pgp-problem.html) as it has been around a long time. For tasks such as signing or encrypting files, we suggest the above options. -When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://www.gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf). +When encrypting with PGP, you have the option to configure different options in your `gpg.conf` file. We recommend staying with the standard options specified in the [GnuPG user FAQ](https://gnupg.org/faq/gnupg-faq.html#new_user_gpg_conf).

Use future defaults when generating a key

-When [generating keys](https://www.gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to/): +When [generating keys](https://gnupg.org/gph/en/manual/c14.html) we suggest using the `future-default` command as this will instruct GnuPG use modern cryptography such as [Curve25519](https://en.wikipedia.org/wiki/Curve25519#History) and [Ed25519](https://ed25519.cr.yp.to): ```bash gpg --quick-gen-key alice@example.com future-default @@ -290,7 +290,7 @@ gpg --quick-gen-key alice@example.com future-default ![GNU Privacy Guard logo](assets/img/encryption-software/gnupg.svg){ align=right } -**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. +**GnuPG** is a GPL-licensed alternative to the PGP suite of cryptographic software. GnuPG is compliant with [RFC 4880](https://tools.ietf.org/html/rfc4880), which is the current IETF specification of OpenPGP. The GnuPG project has been working on an [updated draft](https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh) in an attempt to modernize OpenPGP. GnuPG is a part of the Free Software Foundation's GNU software project and has received major [funding](https://gnupg.org/blog/20220102-a-new-future-for-gnupg.html) from the German government. [:octicons-home-16: Homepage](https://gnupg.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://gnupg.org/privacy-policy.html){ .card-link title="Privacy Policy" } @@ -369,11 +369,11 @@ We recommend taking a look at their [First steps](https://gpgtools.tenderapp.com ![OpenKeychain logo](assets/img/encryption-software/openkeychain.svg){ align=right } -**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://www.openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). +**OpenKeychain** is an Android implementation of GnuPG. It's commonly required by mail clients such as [K-9 Mail](email-clients.md#k-9-mail) and [FairEmail](email-clients.md#fairemail) and other Android apps to provide encryption support. Cure53 completed a [security audit](https://openkeychain.org/openkeychain-3-6) of OpenKeychain 3.6 in October 2015. Technical details about the audit and OpenKeychain's solutions can be found [here](https://github.com/open-keychain/open-keychain/wiki/cure53-Security-Audit-2015). -[:octicons-home-16: Homepage](https://www.openkeychain.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.openkeychain.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://openkeychain.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://openkeychain.org/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://openkeychain.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/open-keychain/open-keychain){ .card-link title="Source Code" }
diff --git a/i18n/zh/file-sharing.md b/i18n/zh/file-sharing.md index 434f5fb2..cc2e5875 100644 --- a/i18n/zh/file-sharing.md +++ b/i18n/zh/file-sharing.md @@ -15,7 +15,7 @@ Discover how to privately share your files between your devices, with your frien ![Send logo](assets/img/file-sharing-sync/send.svg){ align=right } -**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee/). You can use other public instances, or you can host Send yourself. +**Send** is a fork of Mozilla’s discontinued Firefox Send service which allows you to send files to others with a link. Files are encrypted on your device so that they cannot be read by the server, and they can be optionally password-protected as well. The maintainer of Send hosts a [public instance](https://send.vis.ee). You can use other public instances, or you can host Send yourself. [:octicons-home-16: Homepage](https://send.vis.ee){ .md-button .md-button--primary } [:octicons-server-16:](https://github.com/timvisee/send-instances){ .card-link title="Public Instances"} @@ -83,7 +83,7 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://freedombox.org){ .md-button .md-button--primary } [:octicons-info-16:](https://wiki.debian.org/FreedomBox/Manual){ .card-link title=Documentation} [:octicons-code-16:](https://salsa.debian.org/freedombox-team/freedombox){ .card-link title="Source Code" } -[:octicons-heart-16:](https://freedomboxfoundation.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://freedomboxfoundation.org/donate){ .card-link title=Contribute }
@@ -101,9 +101,9 @@ We are working on establishing defined criteria for every section of our site, a [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -137,16 +137,16 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e [:octicons-home-16: Homepage](https://syncthing.net){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.syncthing.net){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/syncthing){ .card-link title="Source Code" } -[:octicons-heart-16:](https://syncthing.net/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://syncthing.net/donations){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.nutomic.syncthingandroid) -- [:simple-windows11: Windows](https://syncthing.net/downloads/) -- [:simple-apple: macOS](https://syncthing.net/downloads/) -- [:simple-linux: Linux](https://syncthing.net/downloads/) -- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads/) +- [:simple-windows11: Windows](https://syncthing.net/downloads) +- [:simple-apple: macOS](https://syncthing.net/downloads) +- [:simple-linux: Linux](https://syncthing.net/downloads) +- [:simple-freebsd: FreeBSD](https://syncthing.net/downloads)
diff --git a/i18n/zh/financial-services.md b/i18n/zh/financial-services.md index 60641cd0..76825877 100644 --- a/i18n/zh/financial-services.md +++ b/i18n/zh/financial-services.md @@ -30,7 +30,7 @@ Many banks and credit card providers offer native virtual card functionality. If [:octicons-home-16: Homepage](https://privacy.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://privacy.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.privacy.com/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.privacy.com){ .card-link title=Documentation}
@@ -47,9 +47,9 @@ Privacy.com gives information about the merchants you purchase from to your bank **MySudo** provides up to 9 virtual cards depending on the plan you purchase. Their paid plans additionally include functionality which may be useful for making purchases privately, such as virtual phone numbers and email addresses, although we typically recommend other [email aliasing providers](email.md) for extensive email aliasing use. -[:octicons-home-16: Homepage](https://mysudo.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://anonyome.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.mysudo.com/hc/en-us){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://mysudo.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://anonyome.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.mysudo.com){ .card-link title=Documentation}
@@ -83,9 +83,9 @@ These services allow you to purchase gift cards for a variety of merchants onlin **CoinCards** (available in the US and Canada) allows you to purchase gift cards for a large variety of merchants. -[:octicons-home-16: Homepage](https://coincards.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://coincards.com/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://coincards.com/frequently-asked-questions/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://coincards.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://coincards.com/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://coincards.com/frequently-asked-questions){ .card-link title=Documentation}
diff --git a/i18n/zh/frontends.md b/i18n/zh/frontends.md index 7a05090f..7bba4629 100644 --- a/i18n/zh/frontends.md +++ b/i18n/zh/frontends.md @@ -19,7 +19,7 @@ When you are using an instance run by someone else, make sure to read the privac ![ProxiTok logo](assets/img/frontends/proxitok.svg){ align=right } -**ProxiTok** is an open-source frontend to the [TikTok](https://www.tiktok.com) website that is also self-hostable. +**ProxiTok** is an open-source frontend to the [TikTok](https://tiktok.com) website that is also self-hostable. There are a number of public instances, with some instances having [Tor](tor.md) onion services support. @@ -53,7 +53,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op [:octicons-home-16: Homepage](https://freetubeapp.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://freetubeapp.io/privacy.php){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.freetubeapp.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.freetubeapp.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/FreeTubeApp/FreeTube){ .card-link title="Source Code" } [:octicons-heart-16:](https://liberapay.com/FreeTube){ .card-link title=Contribute } @@ -72,7 +72,7 @@ By default, FreeTube blocks all YouTube advertisements. In addition, FreeTube op

警告

-When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using FreeTube, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -84,7 +84,7 @@ When using FreeTube, your IP address may still be known to YouTube, [Invidious]( **Yattee** is a free and open-source privacy oriented video player for iOS, tvOS and macOS for [YouTube](https://youtube.com). When using Yattee, your subscription list are saved locally on your device. -You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/) before you can use Yattee to watch YouTube, due to App Store restrictions. +You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee) before you can use Yattee to watch YouTube, due to App Store restrictions. [:octicons-home-16: Homepage](https://github.com/yattee/yattee){ .md-button .md-button--primary } [:octicons-eye-16:](https://r.yattee.stream/docs/privacy.html){ .card-link title="Privacy Policy" } @@ -95,7 +95,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)
Downloads -- [:simple-apple: App Store](https://apps.apple.com/us/app/yattee/id1595136629) +- [:simple-apple: App Store](https://apps.apple.com/app/id1595136629) - [:simple-github: GitHub](https://github.com/yattee/yattee/releases)
@@ -105,7 +105,7 @@ You will need to take a few [extra steps](https://gonzoknows.com/posts/Yattee/)

警告

-When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using Yattee, your IP address may still be known to YouTube, [Invidious](https://instances.invidious.io), [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -139,7 +139,7 @@ LibreTube allows you to store your subscription list and playlists locally on yo

警告

-When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app/) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address. +When using LibreTube, your IP address will be visible to the [Piped](https://github.com/TeamPiped/Piped/wiki/Instances) instance you choose and/or [SponsorBlock](https://sponsor.ajay.app) depending on your configuration. Consider using a [VPN](vpn.md) or [Tor](tor.md) if your [threat model](basics/threat-modeling.md) requires hiding your IP address.
@@ -151,15 +151,15 @@ By default, LibreTube blocks all YouTube advertisements. Additionally, Libretube ![Newpipe logo](assets/img/frontends/newpipe.svg){ align=right } -**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org/) (1). +**NewPipe** is a free and open-source Android application for [YouTube](https://youtube.com), [SoundCloud](https://soundcloud.com), [media.ccc.de](https://media.ccc.de), [Bandcamp](https://bandcamp.com), and [PeerTube](https://joinpeertube.org) (1). Your subscription list and playlists are saved locally on your Android device. [:octicons-home-16: Homepage](https://newpipe.net){ .md-button .md-button--primary } [:octicons-eye-16:](https://newpipe.net/legal/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://teamnewpipe.github.io/documentation/){ .card-link title=Documentation} +[:octicons-info-16:](https://teamnewpipe.github.io/documentation){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamNewPipe/NewPipe){ .card-link title="Source Code" } -[:octicons-heart-16:](https://newpipe.net/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://newpipe.net/donate){ .card-link title=Contribute }
Downloads @@ -170,7 +170,7 @@ Your subscription list and playlists are saved locally on your Android device. -1. The default instance is [FramaTube](https://framatube.org/), however more can be added via **Settings** → **Content** → **PeerTube instances** +1. The default instance is [FramaTube](https://framatube.org), however more can be added via **Settings** → **Content** → **PeerTube instances**

警告

@@ -192,9 +192,9 @@ There are a number of public instances, with some instances having [Tor](tor.md) [:octicons-home-16: Homepage](https://invidious.io){ .md-button .md-button--primary } [:octicons-server-16:](https://instances.invidious.io){ .card-link title="Public Instances"} -[:octicons-info-16:](https://docs.invidious.io/){ .card-link title=Documentation} +[:octicons-info-16:](https://docs.invidious.io){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/iv-org/invidious){ .card-link title="Source Code" } -[:octicons-heart-16:](https://invidious.io/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://invidious.io/donate){ .card-link title=Contribute }
@@ -226,7 +226,7 @@ Piped requires JavaScript in order to function and there are a number of public [:octicons-repo-16: Repository](https://github.com/TeamPiped/Piped){ .md-button .md-button--primary } [:octicons-server-16:](https://piped.kavin.rocks/preferences#ddlInstanceSelection){ .card-link title="Public Instances"} -[:octicons-info-16:](https://piped-docs.kavin.rocks/){ .card-link title=Documentation} +[:octicons-info-16:](https://piped-docs.kavin.rocks){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/TeamPiped/Piped){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/TeamPiped/Piped#donations){ .card-link title=Contribute } diff --git a/i18n/zh/index.md b/i18n/zh/index.md index f2959b99..5f6dea05 100644 --- a/i18n/zh/index.md +++ b/i18n/zh/index.md @@ -62,7 +62,7 @@ Trying to protect all your data from everyone all the time is impractical, expen ## We need you! Here's how to get involved: -[:simple-discourse:](https://discuss.privacyguides.net/){ title="Join our Forum" } +[:simple-discourse:](https://discuss.privacyguides.net){ title="Join our Forum" } [:simple-mastodon:](https://mastodon.neat.computer/@privacyguides){ rel=me title="Follow us on Mastodon" } [:material-book-edit:](https://github.com/privacyguides/privacyguides.org){ title="Contribute to this website" } [:material-translate:](https://matrix.to/#/#pg-i18n:aragon.sh){ title="Help translate this website" } diff --git a/i18n/zh/kb-archive.md b/i18n/zh/kb-archive.md index 92daee33..4b64288b 100644 --- a/i18n/zh/kb-archive.md +++ b/i18n/zh/kb-archive.md @@ -8,10 +8,10 @@ description: Some pages that used to be in our knowledge base can now be found o Some pages that used to be in our knowledge base can now be found on our blog: -- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/) -- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) -- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening/) -- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing/) -- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) -- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal/) -- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide/) +- [GrapheneOS vs. CalyxOS](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos) +- [Signal Configuration Hardening](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) +- [Linux - System Hardening](https://blog.privacyguides.org/2022/04/22/linux-system-hardening) +- [Linux - Application Sandboxing](https://blog.privacyguides.org/2022/04/22/linux-application-sandboxing) +- [Secure Data Erasure](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) +- [Integrating Metadata Removal](https://blog.privacyguides.org/2022/04/09/integrating-metadata-removal) +- [iOS Configuration Guide](https://blog.privacyguides.org/2022/10/22/ios-configuration-guide) diff --git a/i18n/zh/meta/admonitions.md b/i18n/zh/meta/admonitions.md index 503b0405..bcbdee57 100644 --- a/i18n/zh/meta/admonitions.md +++ b/i18n/zh/meta/admonitions.md @@ -165,11 +165,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -188,11 +188,11 @@ This format is used to generate recommendation cards. Notably it is missing the ![PhotoPrism logo](../assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
@@ -215,7 +215,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) @@ -231,7 +231,7 @@ This is a special type of collapsible admonition, used to generate the download Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonmail.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id979659905) +- [:simple-appstore: App Store](https://apps.apple.com/app/id979659905) - [:simple-github: GitHub](https://github.com/ProtonMail/proton-mail-android/releases) - [:simple-windows11: Windows](https://proton.me/mail/bridge#download) - [:simple-apple: macOS](https://proton.me/mail/bridge#download) diff --git a/i18n/zh/meta/translations.md b/i18n/zh/meta/translations.md index 46e8e20e..64c6d1a5 100644 --- a/i18n/zh/meta/translations.md +++ b/i18n/zh/meta/translations.md @@ -2,9 +2,9 @@ title: Translations --- -Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro/) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. +Crowdin has good documentation, and we suggest looking at their [Getting Started](https://support.crowdin.com/crowdin-intro) guide. Our site is largely written in [Markdown](https://en.wikipedia.org/wiki/Markdown), so it should be easy to contribute. This page contains some helpful pointers for translating some specific syntax you may encounter on our site. -Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement/) for additional information about the project. +Please join our localization room on Matrix ([#pg-i18n:aragon.sh](https://matrix.to/#/%23pg-i18n:aragon.sh)) if you have any additional questions, and read our [announcement blog post](https://blog.privacyguides.org/2023/02/26/i18n-announcement) for additional information about the project. Note that the English version of the site is the primary version, meaning changes occur there first. If you notice a language falling behind the English version, please help out. We cannot guarantee the accuracy of all our translations. If you have a suggestion about content specific to your region, please open an issue or pull request to our [main repository](https://github.com/privacyguides/privacyguides.org). @@ -78,4 +78,4 @@ CJK writing systems tend to use alternative "fullwidth" variants of common symbo - Links must use regular parenthesis ie `(` (Left Parenthesis U+0028) and `)` (Right Parenthesis U+0029) and not `(` (Fullwidth Left Parenthesis U+FF08) or `)` (Fullwidth Right Parenthesis U+FF09) - Indented quoted text must use `:` (Colon U+003A) and not `:` (Fullwidth Colon U+FF1A) -- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) +- Pictures must use `!` (Exclamation Mark U+0021) and not `!` (Fullwidth Exclamation Mark U+FF01) diff --git a/i18n/zh/meta/uploading-images.md b/i18n/zh/meta/uploading-images.md index 55f136f8..44c5833d 100644 --- a/i18n/zh/meta/uploading-images.md +++ b/i18n/zh/meta/uploading-images.md @@ -17,7 +17,7 @@ Company logos have canvas size of: ### PNG -Use the [OptiPNG](https://sourceforge.net/projects/optipng/) to optimize the PNG image: +Use the [OptiPNG](https://sourceforge.net/projects/optipng) to optimize the PNG image: ```bash optipng -o7 file.png diff --git a/i18n/zh/meta/writing-style.md b/i18n/zh/meta/writing-style.md index b9e47a71..739ca47e 100644 --- a/i18n/zh/meta/writing-style.md +++ b/i18n/zh/meta/writing-style.md @@ -4,11 +4,11 @@ title: Writing Style Privacy Guides is written in American English, and you should refer to [APA Style guidelines](https://apastyle.apa.org/style-grammar-guidelines/grammar) when in doubt. -In general the [United States federal plain language guidelines](https://www.plainlanguage.gov/guidelines/) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. +In general the [United States federal plain language guidelines](https://plainlanguage.gov/guidelines) provide a good overview of how to write clearly and concisely. We highlight a few important notes from these guidelines below. ## Writing for our audience -Privacy Guides' intended [audience](https://www.plainlanguage.gov/guidelines/audience/) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. +Privacy Guides' intended [audience](https://plainlanguage.gov/guidelines/audience) is primarily average, technology using adults. Don't dumb down content as if you are addressing a middle-school class, but don't overuse complicated terminology about concepts average computer users wouldn't be familiar with. ### Address only what people want to know @@ -24,7 +24,7 @@ We're writing *for* a wide variety of people, but we are writing *to* the person > > When you use “you” to address users, they are more likely to understand what their responsibility is. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/audience/address-the-user/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/audience/address-the-user) ### Avoid "users" @@ -37,7 +37,7 @@ Organization is key. Content should flow from most to least important informatio - Limit the document to around five or six sections. Long documents should probably be broken up into separate pages. - Mark important ideas with **bold** or *italics*. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/design) ### Begin with a topic sentence @@ -45,7 +45,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/design/) > > We often write the way we think, putting our premises first and then our conclusion. It may be the natural way to develop thoughts, but we wind up with the topic sentence at the end of the paragraph. Move it up front and let users know where you’re going. Don’t make readers hold a lot of information in their heads before getting to the point. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/organize/have-a-topic-sentence/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/organize/have-a-topic-sentence) ## Choose your words carefully @@ -65,7 +65,7 @@ We should try to avoid abbreviations where possible, but technology is full of a > Unnecessary words waste your audience’s time. Great writing is like a conversation. Omit information that the audience doesn’t need to know. This can be difficult as a subject matter expert so it’s important to have someone look at the information from the audience’s perspective. -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/concise) ## Keep text conversational @@ -77,7 +77,7 @@ Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/concise/) > Active voice makes it clear who is supposed to do what. It eliminates ambiguity about responsibilities. Not “It must be done,” but “You must do it.” -Source: [plainlanguage.gov](https://www.plainlanguage.gov/guidelines/conversational/use-active-voice/) +Source: [plainlanguage.gov](https://plainlanguage.gov/guidelines/conversational/use-active-voice) ### Use "must" for requirements diff --git a/i18n/zh/mobile-browsers.md b/i18n/zh/mobile-browsers.md index 27bb46a8..a03530e6 100644 --- a/i18n/zh/mobile-browsers.md +++ b/i18n/zh/mobile-browsers.md @@ -28,7 +28,7 @@ schema: "@type": MobileApplication name: Safari image: /assets/img/browsers/safari.svg - url: https://www.apple.com/safari/ + url: https://apple.com/safari applicationCategory: Web Browser operatingSystem: - iOS @@ -41,22 +41,22 @@ schema: ## 安卓 -在安卓系统上,火狐的安全性仍然低于基于Chromium的替代品。Mozilla的引擎, [GeckoView](https://mozilla.github.io/geckoview/),还没有支持 [网站隔离](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) 或启用 [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196)。 +On Android, Firefox is still less secure than Chromium-based alternatives: Mozilla's engine, [GeckoView](https://mozilla.github.io/geckoview), has yet to support [site isolation](https://hacks.mozilla.org/2021/05/introducing-firefox-new-site-isolation-security-architecture) or enable [isolatedProcess](https://bugzilla.mozilla.org/show_bug.cgi?id=1565196). ### Brave
-![Brave标识](assets/img/browsers/brave.svg){ align=right } +![Brave logo](assets/img/browsers/brave.svg){ align=right } -**Brave浏览器**包括一个内置的内容拦截器和[隐私功能](https://brave.com/privacy-features/),其中许多功能都是默认启用的。 +**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default. Brave是建立在Chromium网络浏览器项目之上的,所以它应该有熟悉的感觉,而且网站兼容性问题最小。 -[:octicons-home-16: Homepage](https://brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://brave.com/privacy/browser/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.brave.com/){ .card-link title=Documentation} +[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.brave.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
@@ -77,7 +77,7 @@ Tor浏览器是匿名浏览互联网的唯一途径。 当您使用Brave时, ##### 盾 -Brave在其 [Shields](https://support.brave.com/hc/en-us/articles/360022973471-What-is-Shields-) 功能中包括一些防指纹的措施。 我们建议将这些选项配置为 [,在你访问的所有页面上全局](https://support.brave.com/hc/en-us/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings-)。 +Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit. ##### Brave shields global defaults @@ -101,7 +101,7 @@ Brave allows you to select additional content filters within the internal `brave
-1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net/) extension. +1. This option provides functionality similar to uBlock Origin's advanced [blocking modes](https://github.com/gorhill/uBlock/wiki/Blocking-mode) or the [NoScript](https://noscript.net) extension. ##### Clear browsing data @@ -115,7 +115,7 @@ Brave allows you to select additional content filters within the internal `brave
-- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/en-us/articles/360017989132-How-do-I-change-my-Privacy-Settings-#webrtc) +- [x] Select **Disable non-proxied UDP** under [WebRTC IP handling policy](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc) - [ ] Uncheck **Allow sites to check if you have payment methods saved** - [ ] Uncheck **IPFS Gateway** (1) - [x] Select **Close tabs on exit** @@ -129,7 +129,7 @@ Brave allows you to select additional content filters within the internal `brave #### Brave 同步 -[Brave 同步](https://support.brave.com/hc/en-us/articles/360059793111-Understanding-Brave-Sync) 允许你的浏览数据(历史记录、书签等)在你所有的设备上访问,而不需要账户,并以E2EE进行保护。 +[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE. ## iOS @@ -141,10 +141,10 @@ On iOS, any app that can browse the web is [restricted](https://developer.apple. ![Safari logo](assets/img/browsers/safari.svg){ align=right } -**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention/), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. +**Safari** is the default browser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/15.0/ios/15.0) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), Privacy Report, isolated and ephemeral Private Browsing tabs, iCloud Private Relay, fingerprinting protection by randomizing and presenting a simplified version of the system configuration to websites so more devices look identical, and the ability to lock private tabs with your biometrics/PIN. It also allows you to separate your browsing with different profiles. -[:octicons-home-16: Homepage](https://www.apple.com/safari/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.apple.com/legal/privacy/data/en/safari/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary } +[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://support.apple.com/guide/safari/welcome/mac){ .card-link title=Documentation}
@@ -185,7 +185,7 @@ Privacy Report is accessible via the Page Settings menu. - [ ] Disable **Privacy Preserving Ad Measurement** -Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm/) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. +Ad click measurement has traditionally used tracking technology that infringes on user privacy. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy. The feature has little privacy concerns on its own, so while you can choose to leave it on, we consider the fact that it's automatically disabled in Private Browsing to be an indicator for disabling the feature. @@ -201,9 +201,9 @@ Do note that Private Browsing does not save cookies and website data, so it won' ##### iCloud Sync -Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/en-us/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://www.apple.com/legal/privacy/en-ww/). +Synchronization of Safari History, Tab Groups, iCloud Tabs and saved passwords are E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww). -You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/en-us/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. +You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to your **Apple ID name → iCloud → Advanced Data Protection**. - [x] Turn On **Advanced Data Protection** @@ -227,7 +227,7 @@ AdGuard for iOS has some premium features; however, standard Safari content bloc
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1047223162) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1047223162)
diff --git a/i18n/zh/multi-factor-authentication.md b/i18n/zh/multi-factor-authentication.md index b7b33482..d39f9afa 100644 --- a/i18n/zh/multi-factor-authentication.md +++ b/i18n/zh/multi-factor-authentication.md @@ -13,21 +13,21 @@ cover: multi-factor-authentication.webp ![YubiKeys](assets/img/multi-factor-authentication/yubikey.png) -The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP/), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. +The **YubiKeys** are among the most popular security keys. Some YubiKey models have a wide range of features such as: [Universal 2nd Factor (U2F)](https://en.wikipedia.org/wiki/Universal_2nd_Factor), [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online), [Yubico OTP](basics/multi-factor-authentication.md#yubico-otp), [Personal Identity Verification (PIV)](https://developers.yubico.com/PIV), [OpenPGP](https://developers.yubico.com/PGP), [TOTP and HOTP](https://developers.yubico.com/OATH) authentication. -One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://www.yubico.com/quiz/) before purchasing in order to make sure you make the right choice. +One of the benefits of the YubiKey is that one key can do almost everything (YubiKey 5), you could expect from a hardware security key. We do encourage you to take the [quiz](https://yubico.com/quiz) before purchasing in order to make sure you make the right choice. -[:octicons-home-16: Homepage](https://www.yubico.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.yubico.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://yubico.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://yubico.com/support/terms-conditions/privacy-notice){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.yubico.com){ .card-link title=Documentation}
-The [comparison table](https://www.yubico.com/store/compare/) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. +The [comparison table](https://yubico.com/store/compare) shows the features and how the YubiKeys compare. We highly recommend that you select keys from the YubiKey 5 Series. -YubiKeys can be programmed using the [YubiKey Manager](https://www.yubico.com/support/download/yubikey-manager/) or [YubiKey Personalization Tools](https://www.yubico.com/support/download/yubikey-personalization-tools/). For managing TOTP codes, you can use the [Yubico Authenticator](https://www.yubico.com/products/yubico-authenticator/). All of Yubico's clients are open source. +YubiKeys can be programmed using the [YubiKey Manager](https://yubico.com/support/download/yubikey-manager) or [YubiKey Personalization Tools](https://yubico.com/support/download/yubikey-personalization-tools). For managing TOTP codes, you can use the [Yubico Authenticator](https://yubico.com/products/yubico-authenticator). All of Yubico's clients are open source. For models which support HOTP and TOTP, there are 2 slots in the OTP interface which could be used for HOTP and 32 slots to store TOTP secrets. These secrets are stored encrypted on the key and never expose them to the devices they are plugged into. Once a seed (shared secret) is given to the Yubico Authenticator, it will only give out the six-digit codes, but never the seed. This security model helps limit what an attacker can do if they compromise one of the devices running the Yubico Authenticator and make the YubiKey resistant to a physical attacker. @@ -46,17 +46,17 @@ The firmware of YubiKey is not open source and is not updatable. If you want fea **Nitrokey** has a security key capable of [FIDO2 and WebAuthn](basics/multi-factor-authentication.md#fido-fast-identity-online) called the **Nitrokey FIDO2**. For PGP support, you need to purchase one of their other keys such as the **Nitrokey Start**, **Nitrokey Pro 2** or the **Nitrokey Storage 2**. -[:octicons-home-16: Homepage](https://www.nitrokey.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.nitrokey.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://nitrokey.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://nitrokey.com/data-privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.nitrokey.com){ .card-link title=Documentation}
-The [comparison table](https://www.nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. +The [comparison table](https://nitrokey.com/#comparison) shows the features and how the Nitrokey models compare. The **Nitrokey 3** listed will have a combined feature set. -Nitrokey models can be configured using the [Nitrokey app](https://www.nitrokey.com/download). +Nitrokey models can be configured using the [Nitrokey app](https://nitrokey.com/download). For the models which support HOTP and TOTP, there are 3 slots for HOTP and 15 for TOTP. Some Nitrokeys can act as a password manager. They can store 16 different credentials and encrypt them using the same password as the OpenPGP interface. @@ -74,7 +74,7 @@ Resetting the OpenPGP interface on a Nitrokey will also make the password databa -The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://www.coreboot.org/) + [Heads](https://osresearch.net/) firmware. +The Nitrokey Pro 2, Nitrokey Storage 2, and the upcoming Nitrokey 3 supports system integrity verification for laptops with the [Coreboot](https://coreboot.org) + [Heads](https://osresearch.net) firmware. Nitrokey's firmware is open source, unlike the YubiKey. The firmware on modern NitroKey models (except the **NitroKey Pro 2**) is updatable. @@ -127,7 +127,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=io.ente.auth) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/ente-authenticator/id6444121398) +- [:simple-appstore: App Store](https://apps.apple.com/app/id6444121398) - [:simple-github: GitHub](https://github.com/ente-io/ente/releases) - [:octicons-globe-16: Web](https://auth.ente.io) @@ -147,7 +147,7 @@ We highly recommend that you use mobile TOTP apps instead of desktop alternative [:octicons-eye-16:](https://getaegis.app/aegis/privacy.html){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://github.com/beemdevelopment/Aegis/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/beemdevelopment/Aegis){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.buymeacoffee.com/beemdevelopment){ .card-link title=Contribute } +[:octicons-heart-16:](https://buymeacoffee.com/beemdevelopment){ .card-link title=Contribute }
Downloads diff --git a/i18n/zh/news-aggregators.md b/i18n/zh/news-aggregators.md index 40a940e4..a1f5b580 100644 --- a/i18n/zh/news-aggregators.md +++ b/i18n/zh/news-aggregators.md @@ -21,7 +21,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-eye-16:](https://kde.org/privacypolicy-apps){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://docs.kde.org/?application=akregator){ .card-link title=Documentation} [:octicons-code-16:](https://invent.kde.org/pim/akregator){ .card-link title="Source Code" } -[:octicons-heart-16:](https://kde.org/community/donations/){ .card-link title=Contribute } +[:octicons-heart-16:](https://kde.org/community/donations){ .card-link title=Contribute }
Downloads @@ -83,7 +83,7 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k [:octicons-home-16: Homepage](https://hyliu.me/fluent-reader){ .md-button .md-button--primary } [:octicons-eye-16:](https://github.com/yang991178/fluent-reader/wiki/Privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki/){ .card-link title=Documentation} +[:octicons-info-16:](https://github.com/yang991178/fluent-reader/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/yang991178/fluent-reader){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/yang991178){ .card-link title=Contribute } @@ -121,15 +121,15 @@ A [news aggregator](https://en.wikipedia.org/wiki/News_aggregator) is a way to k **NetNewsWire** a free and open-source feed reader for macOS and iOS with a focus on a native design and feature set. It supports the typical feed formats alongside built-in support for Reddit feeds. -[:octicons-home-16: Homepage](https://netnewswire.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://netnewswire.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://netnewswire.com/privacypolicy.html){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://netnewswire.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://netnewswire.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Ranchero-Software/NetNewsWire){ .card-link title="Source Code" }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/us/app/netnewswire-rss-reader/id1480640210) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1480640210) - [:simple-apple: macOS](https://netnewswire.com)
@@ -178,7 +178,7 @@ Reddit allows you to subscribe to subreddits via RSS. Replace `[SUBREDDIT]` with the subreddit you wish to subscribe to. ```text -https://www.reddit.com/r/[SUBREDDIT]/new/.rss +https://reddit.com/r/[SUBREDDIT]/new/.rss ``` @@ -193,7 +193,7 @@ You can subscribe YouTube channels without logging in and associating usage info To subscribe to a YouTube channel with an RSS client, first look for its [channel code](https://support.google.com/youtube/answer/6180214). The channel code can be found on the about page of the YouTube channel you wish to subscribe to, under: **About** > **Share** > **Copy channel ID**. Replace `[CHANNEL ID]` below: ```text -https://www.youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] +https://youtube.com/feeds/videos.xml?channel_id=[CHANNEL ID] ``` diff --git a/i18n/zh/notebooks.md b/i18n/zh/notebooks.md index 2131e5e0..0eb1ebef 100644 --- a/i18n/zh/notebooks.md +++ b/i18n/zh/notebooks.md @@ -34,7 +34,7 @@ If you are currently using an application like Evernote, Google Keep, or Microso - [:simple-windows11: Windows](https://standardnotes.com) - [:simple-apple: macOS](https://standardnotes.com) - [:simple-linux: Linux](https://standardnotes.com) -- [:octicons-globe-16: Web](https://app.standardnotes.com/) +- [:octicons-globe-16: Web](https://app.standardnotes.com)
@@ -46,11 +46,11 @@ If you are currently using an application like Evernote, Google Keep, or Microso ![Notesnook logo](assets/img/notebooks/notesnook.svg){ align=right } -**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com/). +**Notesnook** is a free (as in speech) & open-source note-taking app focused on user privacy & ease of use. It features end-to-end encryption on all platforms with a powerful sync to take your notes on the go. You can easily import your notes from Evernote, OneNote & a lot of other apps using their [official importer](https://importer.notesnook.com). -[:octicons-home-16: Homepage](https://notesnook.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://notesnook.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://notesnook.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.notesnook.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.notesnook.com){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/streetwriters/notesnook){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/streetwriters/notesnook/blob/master/CONTRIBUTING.md){ .card-link title=Contribute } @@ -58,12 +58,12 @@ If you are currently using an application like Evernote, Google Keep, or Microso Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.streetwriters.notesnook) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/notesnook-take-private-notes/id1544027013) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1544027013) - [:simple-github: GitHub](https://github.com/streetwriters/notesnook/releases) - [:simple-windows11: Windows](https://notesnook.com/downloads) - [:simple-apple: macOS](https://notesnook.com/downloads) - [:simple-linux: Linux](https://notesnook.com/downloads) -- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://notesnook.com/notesnook-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/notesnook-web-clipper/kljhpemdlcnjohmfmkogahelkcidieaj)
@@ -80,22 +80,22 @@ Notesnook only allows local note encryption with the [private vault](https://hel **Joplin** is a free, open-source, and fully-featured note-taking and to-do application which can handle a large number of markdown notes organized into notebooks and tags. It offers E2EE and can sync through Nextcloud, Dropbox, and more. It also offers easy import from Evernote and plain-text notes. -[:octicons-home-16: Homepage](https://joplinapp.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://joplinapp.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://joplinapp.org/help/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://joplinapp.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://joplinapp.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://joplinapp.org/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/laurent22/joplin){ .card-link title="Source Code" } -[:octicons-heart-16:](https://joplinapp.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://joplinapp.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.cozic.joplin) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/joplin/id1315599797) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1315599797) - [:simple-github: GitHub](https://github.com/laurent22/joplin-android/releases) - [:simple-windows11: Windows](https://joplinapp.org/#desktop-applications) - [:simple-apple: macOS](https://joplinapp.org/#desktop-applications) - [:simple-linux: Linux](https://joplinapp.org/#desktop-applications) -- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper/) +- [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/joplin-web-clipper) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/joplin-web-clipper/alofnhikmmkdbbbgpnglcpdollgjjfek)
@@ -137,7 +137,7 @@ Cryptee offers 100MB of storage for free, with paid options if you need more. Si ![Org-mode logo](assets/img/notebooks/org-mode.svg){ align=right } -**Org-mode** is a [major mode](https://www.gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. +**Org-mode** is a [major mode](https://gnu.org/software/emacs/manual/html_node/elisp/Major-Modes.html) for GNU Emacs. Org-mode is for keeping notes, maintaining to-do lists, planning projects, and authoring documents with a fast and effective plain-text system. Synchronization is possible with [file synchronization](file-sharing.md#file-sync) tools. [:octicons-home-16: Homepage](https://orgmode.org){ .md-button .md-button--primary } [:octicons-info-16:](https://orgmode.org/manuals.html){ .card-link title=Documentation} diff --git a/i18n/zh/os/android-overview.md b/i18n/zh/os/android-overview.md index a57bcd25..6a897020 100644 --- a/i18n/zh/os/android-overview.md +++ b/i18n/zh/os/android-overview.md @@ -60,7 +60,7 @@ For example, if you want to post a picture to Discord you can open your file man 固件更新是维护安全的关键,没有它们,你的设备就不可能是安全的。 原始设备制造商与他们的合作伙伴有支持协议,在有限的支持期内提供闭源组件。 这些内容详见每月的 [Android安全公告](https://source.android.com/security/bulletin)。 -由于手机的组件,如处理器和无线电技术依赖于闭源组件,更新必须由各自的制造商提供。 因此,重要的是,你要在一个有效的支持周期内购买设备。 [高通公司](https://www.qualcomm.com/news/releases/2020/12/16/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) 和 [三星](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox/) ,对其设备的支持期为4年,而便宜的产品往往支持周期更短。 With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. +由于手机的组件,如处理器和无线电技术依赖于闭源组件,更新必须由各自的制造商提供。 因此,重要的是,你要在一个有效的支持周期内购买设备。 [Qualcomm](https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and) and [Samsung](https://news.samsung.com/us/samsung-galaxy-security-extending-updates-knox) support their devices for 4 years, while cheaper products often have shorter support cycles. With the introduction of the [Pixel 6](https://support.google.com/pixelphone/answer/4457705), Google now makes their own SoC, and they will provide a minimum of 5 years of support. With the introduction of the Pixel 8 series, Google increased that support window to 7 years. 不再受SoC制造商支持的EOL设备无法从OEM供应商或后市场Android分销商处获得固件更新。 这意味着这些设备的安全问题将继续得不到解决。 @@ -97,19 +97,19 @@ Android 13: An app may request a permission for a specific feature it has. For example, any app that can scan QR codes will require the camera permission. Some apps can request more permissions than they need. -[Exodus](https://exodus-privacy.eu.org/) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal. +[Exodus](https://exodus-privacy.eu.org) can be useful when comparing apps that have similar purposes. If an app requires a lot of permissions and has a lot of advertising and analytics this is probably a bad sign. We recommend looking at the individual trackers and reading their descriptions rather than simply **counting the total** and assuming all items listed are equal.

警告

-If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest/) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely. +If an app is mostly a web-based service, the tracking may occur on the server side. [Facebook](https://reports.exodus-privacy.eu.org/en/reports/com.facebook.katana/latest) shows "no trackers" but certainly does track users' interests and behavior across the site. Apps may evade detection by not using standard code libraries produced by the advertising industry, though this is unlikely.

Note

-Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest/) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49/). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics. +Privacy-friendly apps such as [Bitwarden](https://reports.exodus-privacy.eu.org/en/reports/com.x8bit.bitwarden/latest) may show some trackers such as [Google Firebase Analytics](https://reports.exodus-privacy.eu.org/en/trackers/49). This library includes [Firebase Cloud Messaging](https://en.wikipedia.org/wiki/Firebase_Cloud_Messaging) which can provide [push notifications](https://en.wikipedia.org/wiki/Push_technology) in apps. This [is the case](https://fosstodon.org/@bitwarden/109636825700482007) with Bitwarden. That doesn't mean that Bitwarden is using all of the analytics features that are provided by Google Firebase Analytics.
@@ -145,20 +145,20 @@ Android 7 and above supports a VPN kill switch, and it is available without the ### 高级保护计划 -如果你有一个谷歌账户,我们建议注册 [高级保护计划](https://landing.google.com/advancedprotection/)。 任何拥有两个或更多支持 [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) 的硬件安全密钥的人都可以免费使用。 +If you have a Google account we suggest enrolling in the [Advanced Protection Program](https://landing.google.com/advancedprotection). 任何拥有两个或更多支持 [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) 的硬件安全密钥的人都可以免费使用。 高级保护计划提供增强的威胁监控,并支持: - Stricter two-factor authentication; e.g. that [FIDO](../basics/multi-factor-authentication.md#fido-fast-identity-online) **must** be used and disallows the use of [SMS OTPs](../basics/multi-factor-authentication.md#sms-or-email-mfa), [TOTP](../basics/multi-factor-authentication.md#time-based-one-time-password-totp) and [OAuth](https://en.wikipedia.org/wiki/OAuth) - 只有谷歌和经过验证的第三方应用程序可以访问账户数据 - 在 Gmail 帐户上扫描收到的邮件以进行 [钓鱼](https://en.wikipedia.org/wiki/Phishing#Email_phishing) 尝试 -- 更严格的 [安全的浏览器扫描](https://www.google.com/chrome/privacy/whitepaper.html#malware) 与谷歌浏览器 +- Stricter [safe browser scanning](https://google.com/chrome/privacy/whitepaper.html#malware) with Google Chrome - 对丢失凭证的账户有更严格的恢复程序 - 如果你使用非沙盒式的Google Play服务(在股票操作系统上很常见),高级保护计划还带有 [额外的好处](https://support.google.com/accounts/answer/9764949?hl=en) ,例如。 + If you use non-sandboxed Google Play Services (common on stock operating systems), the Advanced Protection Program also comes with [additional benefits](https://support.google.com/accounts/answer/9764949) such as: - Not allowing app installation outside the Google Play Store, the OS vendor's app store, or via [`adb`](https://en.wikipedia.org/wiki/Android_Debug_Bridge) -- 强制性的自动设备扫描与 [Play Protect](https://support.google.com/googleplay/answer/2812853?hl=en#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) +- Mandatory automatic device scanning with [Play Protect](https://support.google.com/googleplay/answer/2812853?#zippy=%2Chow-malware-protection-works%2Chow-privacy-alerts-work) - 警告你有未经验证的应用程序 ### Google Play 系统更新 @@ -169,7 +169,7 @@ Android 7 and above supports a VPN kill switch, and it is available without the ### 广告 ID -所有安装了Google Play服务的设备都会自动生成一个 [广告ID](https://support.google.com/googleplay/android-developer/answer/6048248?hl=en) ,用于定向广告。 禁用此功能以限制收集到的关于你的数据。 +All devices with Google Play Services installed automatically generate an [advertising ID](https://support.google.com/googleplay/android-developer/answer/6048248) used for targeted advertising. 禁用此功能以限制收集到的关于你的数据。 在带有 [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play)的安卓发行上,进入 :gear: **设置** → **应用程序** → **Sandboxed Google Play** → **谷歌设置** → **广告**,并选择 *删除广告 ID*。 diff --git a/i18n/zh/os/ios-overview.md b/i18n/zh/os/ios-overview.md index 16d96862..2cc0de7b 100644 --- a/i18n/zh/os/ios-overview.md +++ b/i18n/zh/os/ios-overview.md @@ -22,7 +22,7 @@ The only source for apps on iOS is Apple's App Store, which requires an Apple ID ### Invasive Telemetry -Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://www.theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://www.theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://www.theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). +Apple has historically had problems with properly anonymizing their telemetry on iOS. [In 2019](https://theguardian.com/technology/2019/jul/26/apple-contractors-regularly-hear-confidential-details-on-siri-recordings), Apple was found to transmit Siri recordings—some containing highly confidential information—to their servers for manual review by third-party contractors. While they temporarily stopped that program after that practice was [widely reported on](https://theverge.com/2019/8/23/20830120/apple-contractors-siri-recordings-listening-1000-a-day-globetech-microsoft-cortana), the problem wasn't completely resolved [until 2021](https://theguardian.com/technology/2021/jun/07/apple-overhauls-siri-to-address-privacy-concerns-and-improve-performance). More recently, Apple has been found to [transmit analytics even when analytics sharing is disabled](https://gizmodo.com/apple-iphone-analytics-tracking-even-when-off-app-store-1849757558) on iOS, and this data [appears](https://twitter.com/mysk_co/status/1594515229915979776) to be easily linked to unique iCloud account identifiers despite supposedly being anonymous. @@ -54,7 +54,7 @@ At the top of the **Settings** app, you'll see your name and profile picture if #### Find My -**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://www.apple.com/legal/privacy/data/en/find-my/) when: +**Find My** is a service that lets you track your Apple devices and share your location with your friends and family. It also allows you to wipe your device remotely in case it is stolen, preventing a thief from accessing your data. Your Find My [location data is E2EE](https://apple.com/legal/privacy/data/en/find-my) when: - Your location is shared with a family member or friend, and you both use iOS 15 or greater. - Your device is offline and is located by the Find My Network. @@ -117,7 +117,7 @@ If you don't want anyone to be able to control your phone with Siri when it is l Setting a strong password on your phone is the most important step you can take for physical device security. You'll have to make tradeoffs here between security and convenience: A longer password will be annoying to type in every time, but a shorter password or PIN will be easier to guess. Setting up Face ID or Touch ID along with a strong password can be a good compromise between usability and security. -Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](https://www.privacyguides.org/basics/passwords-overview/). +Select **Turn Passcode On** or **Change Passcode** > **Passcode Options** > **Custom Alphanumeric Code**. Make sure that you create a [secure password](../basics/passwords-overview.md). If you wish to use Face ID or Touch ID, you can go ahead and set it up now. Your phone will use the password you set up earlier as a fallback in case your biometric verification fails. Biometric unlock methods are primarily a convenience, although they do stop surveillance cameras or people over your shoulder from watching you input your passcode. @@ -129,7 +129,7 @@ On some older devices, you may have to press the power button five times to disa - [x] Select **Turn On Protection** -After enabling stolen data protection, [certain actions](https://support.apple.com/en-us/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. +After enabling stolen data protection, [certain actions](https://support.apple.com/HT212510) will require biometric authentication without a password fallback (in the event that a shoulder surfer has obtained your PIN), such as using password autofill, accessing payment information, and disabling lost mode. It also adds a security delay to certain actions performed away from your home or other "familiar location," such as requiring a 1-hour timer to reset your Apple ID password or sign out of your Apple ID. This delay is intended to give you time to enable Lost Mode and secure your account before a thief can reset your device. **Allow Access When Locked** gives you options for what you can allow when your phone is locked. The more of these options you disable, the less someone without your password can do, but the less convenient it will be for you. Pick and choose which of these you don't want someone to have access to if they get their hands on your phone. @@ -187,7 +187,7 @@ Disable **Personalized Ads** if you don't want targeted ads. Select **Apple Adve - [x] Select **Turn On App Privacy Report** -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/en-us/HT212650) as they do normally. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) is a security setting you can enable to make your phone more resistant to attacks. Be aware that certain apps and features [won't work](https://support.apple.com/HT212650) as they do normally. - [x] Select **Turn On Lockdown Mode** diff --git a/i18n/zh/os/linux-overview.md b/i18n/zh/os/linux-overview.md index dc480977..1878ce8d 100644 --- a/i18n/zh/os/linux-overview.md +++ b/i18n/zh/os/linux-overview.md @@ -15,12 +15,12 @@ Our website generally uses the term “Linux” to describe **desktop** Linux di There are some notable privacy concerns with Linux which you should be aware of. Despite these drawbacks, desktop Linux distributions are still great for most people who want to: - 避免专有操作系统中经常出现的遥测现象 -- 保持 [软件自由](https://www.gnu.org/philosophy/free-sw.en.html#four-freedoms) -- Use privacy focused systems such as [Whonix](https://www.whonix.org) or [Tails](https://tails.boum.org/) +- Maintain [software freedom](https://gnu.org/philosophy/free-sw.en.html#four-freedoms) +- Use privacy focused systems such as [Whonix](https://whonix.org) or [Tails](https://tails.net) ### Open-Source Security -It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security/). +It is a [common misconception](../basics/common-misconceptions.md#open-source-software-is-always-secure-or-proprietary-software-is-more-secure) that Linux and other open-source software is inherently secure simply because the source code is available. There is an expectation that community verification occurs regularly, but this isn’t always [the case](https://seirdy.one/posts/2022/02/02/floss-security). In reality, distro security depends on a number of factors, such as project activity, developer experience, the level of rigor applied to code reviews, and how often attention is given to specific parts of the codebase that may go untouched for years. @@ -30,9 +30,9 @@ At the moment, desktop Linux [falls behind alternatives](https://discussion.fedo - **Verified boot** on Linux is not as robust as alternatives such as Apple’s [Secure Boot](https://support.apple.com/guide/security/secac71d5623/web) or Android’s [Verified Boot](https://source.android.com/security/verifiedboot). Verified boot prevents persistent tampering by malware and [evil maid attacks](https://en.wikipedia.org/wiki/Evil_Maid_attack), but is still largely [unavailable on even the most advanced distributions](https://discussion.fedoraproject.org/t/has-silverblue-achieved-verified-boot/27251/3). -- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020/) which allow most apps to trivially bypass their sandbox. +- **Strong sandboxing** for apps on Linux is severely lacking, even with containerized apps like Flatpaks or sandboxing solutions like Firejail. Flatpak is the most promising sandboxing utility for Linux thus far, but is still deficient in many areas and allows for [unsafe defaults](https://flatkill.org/2020) which allow most apps to trivially bypass their sandbox. -Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code/) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. +Additionally, Linux falls behind in implementing [exploit mitigations](https://madaidans-insecurities.github.io/linux.html#exploit-mitigations) which are now standard on other operating systems, such as Arbitrary Code Guard on Windows or Hardened Runtime on macOS. Also, most Linux programs and Linux itself are coded in memory-unsafe languages. Memory corruption bugs are responsible for the [majority of vulnerabilities](https://msrc.microsoft.com/blog/2019/07/a-proactive-approach-to-more-secure-code) fixed and assigned a CVE. While this is also true for Windows and macOS, they are quickly making progress on adopting memory-safe languages—such as Rust and Swift, respectively—while there is no similar effort to rewrite Linux in a memory-safe language like Rust. ## 选择您的发行版 @@ -42,9 +42,9 @@ Additionally, Linux falls behind in implementing [exploit mitigations](https://m 我们强烈建议你选择与稳定的上游软件版本接近的发行版,通常被称为滚动发行版。 这是因为冻结发布周期的发行版往往不更新软件包版本,并且在安全更新方面落后。 -对于冻结的发行版,如 [Debian](https://www.debian.org/security/faq#handling),软件包维护者被要求回传补丁来修复漏洞,而不是将软件提升到上游开发者发布的 "下一个版本"。 Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. 因此,小的安全修复有时会被推迟到下一个主要版本。 +For frozen distributions such as [Debian](https://debian.org/security/faq#handling), package maintainers are expected to backport patches to fix vulnerabilities rather than bump the software to the “next version” released by the upstream developer. Some security fixes [do not](https://arxiv.org/abs/2105.14565) receive a [CVE ID](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) (particularly less popular software) at all and therefore do not make it into the distribution with this patching model. 因此,小的安全修复有时会被推迟到下一个主要版本。 -我们不认为保留软件包和应用临时补丁是一个好主意,因为它偏离了开发者可能打算让软件工作的方式。 [理查德-布朗](https://rootco.de/aboutme/) ,有一个关于这个问题的介绍。 +我们不认为保留软件包和应用临时补丁是一个好主意,因为它偏离了开发者可能打算让软件工作的方式。 [Richard Brown](https://rootco.de/aboutme) has a presentation about this:
@@ -74,7 +74,7 @@ Arch and Arch-based distributions are not recommended for those new to Linux (re 对于一个安全的系统,你还应该有足够的Linux知识来为他们的系统正确设置安全,如采用 [强制性访问控制](https://en.wikipedia.org/wiki/Mandatory_access_control) 系统,设置 [内核模块](https://en.wikipedia.org/wiki/Loadable_kernel_module#Security) 黑名单,硬化启动参数,操作 [sysctl](https://en.wikipedia.org/wiki/Sysctl) 参数,并知道他们需要哪些组件,如 [Polkit](https://en.wikipedia.org/wiki/Polkit)。 -Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR软件包是社区制作的内容,没有经过任何审查,因此很容易受到软件供应链的攻击,事实上在过去已经发生了 [](https://www.bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository/)。 +Anyone using the [Arch User Repository (AUR)](https://wiki.archlinux.org/title/Arch_User_Repository) **must** be comfortable auditing PKGBUILDs that they download from that service. AUR packages are community-produced content and are not vetted in any way, and therefore are vulnerable to software supply chain attacks, which has in fact happened [in the past](https://bleepingcomputer.com/news/security/malware-found-in-arch-linux-aur-package-repository). The AUR should always be used sparingly, and often there is a lot of bad advice on various pages which direct people to blindly use [AUR helpers](https://wiki.archlinux.org/title/AUR_helpers) without sufficient warning. 类似的警告也适用于在基于Debian的发行版上使用第三方个人软件包档案(PPAs)或在Fedora上使用社区项目(COPR)。 @@ -83,11 +83,11 @@ If you are experienced with Linux and wish to use an Arch-based distribution, we Additionally, we recommend **against** these two Arch derivatives specifically: - **Manjaro**: 这个发行版将软件包保留2周,以确保他们自己的修改不会破坏,而不是确保上游的稳定。 当使用AUR软件包时,它们通常是根据Arch的软件库中最新的 [库构建的](https://en.wikipedia.org/wiki/Library_(computing))。 -- **Garuda**: 他们使用 [Chaotic-AUR](https://aur.chaotic.cx/) ,它自动地、盲目地从AUR编译软件包。 没有验证过程来确保AUR包不会受到供应链的攻击。 +- **Garuda**: They use [Chaotic-AUR](https://aur.chaotic.cx) which automatically and blindly compiles packages from the AUR. 没有验证过程来确保AUR包不会受到供应链的攻击。 ### Linux-libre内核和“Libre”发行版 -We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://www.phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. +We recommend **against** using the Linux-libre kernel, since it [removes security mitigations](https://phoronix.com/news/GNU-Linux-Libre-5.7-Released) and [suppresses kernel warnings](https://news.ycombinator.com/item?id=29674846) about vulnerable microcode. ## 一般建议 @@ -95,7 +95,7 @@ We recommend **against** using the Linux-libre kernel, since it [removes securit 大多数Linux发行版在其安装程序中都有一个选项用于启用 [LUKS](../encryption.md#linux-unified-key-setup) FDE。 如果在安装时没有设置这个选项,你将不得不备份你的数据并重新安装,因为加密是在 [磁盘分区](https://en.wikipedia.org/wiki/Disk_partitioning),但在 [文件系统](https://en.wikipedia.org/wiki/File_system) 被格式化之前应用。 我们还建议安全地删除你的存储设备。 -- [安全数据清除 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure/) +- [安全数据清除 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/05/25/secure-data-erasure) ### Swap @@ -105,15 +105,15 @@ If you require suspend-to-disk (hibernation) functionality, you will still need ### Wayland -We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147/). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. +We recommend using a desktop environment that supports the [Wayland](https://en.wikipedia.org/wiki/Wayland_(display_server_protocol)) display protocol, as it was developed with security [in mind](https://lwn.net/Articles/589147). Its predecessor ([X11](https://en.wikipedia.org/wiki/X_Window_System)) does not support GUI isolation, which allows any window to [record, log, and inject inputs in other windows](https://blog.invisiblethings.org/2011/04/23/linux-security-circus-on-gui-isolation.html), making any attempt at sandboxing futile. While there are options to do nested X11 such as [Xpra](https://en.wikipedia.org/wiki/Xpra) or [Xephyr](https://en.wikipedia.org/wiki/Xephyr), they often come with negative performance consequences, and are neither convenient to set up nor preferable over Wayland. -Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://www.gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://www.phoronix.com/news/X.Org-Maintenance-Mode-Quickly). 如果你使用的是这些环境之一,就像在桌面显示管理器中选择 "Wayland "会话一样简单([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)) 。 +Fortunately, [wayland compositors](https://en.wikipedia.org/wiki/Wayland_(protocol)#Wayland_compositors) such as those included with [GNOME](https://gnome.org) and [KDE Plasma](https://kde.org) now have good support for Wayland along with some other compositors that use [wlroots](https://gitlab.freedesktop.org/wlroots/wlroots/-/wikis/Projects-which-use-wlroots), (e.g. [Sway](https://swaywm.org)). Some distributions like Fedora and Tumbleweed use it by default, and some others may do so in the future as X11 is in [hard maintenance mode](https://phoronix.com/news/X.Org-Maintenance-Mode-Quickly). 如果你使用的是这些环境之一,就像在桌面显示管理器中选择 "Wayland "会话一样简单([GDM](https://en.wikipedia.org/wiki/GNOME_Display_Manager), [SDDM](https://en.wikipedia.org/wiki/Simple_Desktop_Display_Manager)) 。 我们建议 **,反对使用没有Wayland支持的桌面环境或窗口管理器,如Cinnamon(Linux Mint的默认)、Pantheon(Elementary OS的默认)、MATE、Xfce和i3。

### 专有固件(Microcode更新) -Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. 这些漏洞的一些明显例子包括: [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), 以及其他 [硬件漏洞](https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html)。 +Some Linux distributions (such as [Linux-libre](https://en.wikipedia.org/wiki/Linux-libre)-based or DIY distros) don’t come with the proprietary [microcode](https://en.wikipedia.org/wiki/Microcode) updates which patch critical security vulnerabilities. Some notable examples of these vulnerabilities include [Spectre](https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)), [Meltdown](https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)), [SSB](https://en.wikipedia.org/wiki/Speculative_Store_Bypass), [Foreshadow](https://en.wikipedia.org/wiki/Foreshadow), [MDS](https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling), [SWAPGS](https://en.wikipedia.org/wiki/SWAPGS_(security_vulnerability)), and other [hardware vulnerabilities](https://kernel.org/doc/html/latest/admin-guide/hw-vuln/index.html). We **highly recommend** that you install microcode updates, as they contain important security patches for the CPU which can not be fully mitigated in software alone. Fedora和openSUSE都有默认应用的微码更新。 @@ -131,11 +131,11 @@ Some distributions (particularly those aimed at advanced users) are more bare bo Many desktop Linux distributions (Fedora, openSUSE, etc.) come with [NetworkManager](https://en.wikipedia.org/wiki/NetworkManager) to configure Ethernet and Wi-Fi settings. -在使用NetworkManager时,可以随机化 [](https://fedoramagazine.org/randomize-mac-address-nm/) [MAC地址](https://en.wikipedia.org/wiki/MAC_address)。 这在Wi-Fi网络上提供了更多的隐私,因为它使你更难追踪你所连接的网络上的特定设备。 它并不是 [****](https://papers.mathyvanhoef.com/wisec2016.pdf) 让你匿名。 +It is possible to [randomize](https://fedoramagazine.org/randomize-mac-address-nm) the [MAC address](https://en.wikipedia.org/wiki/MAC_address) when using NetworkManager. 这在Wi-Fi网络上提供了更多的隐私,因为它使你更难追踪你所连接的网络上的特定设备。 它并不是 [****](https://papers.mathyvanhoef.com/wisec2016.pdf) 让你匿名。 -我们建议将设置改为 **随机** ,而不是 **稳定**,正如 [文章中建议的那样](https://fedoramagazine.org/randomize-mac-address-nm/)。 +We recommend changing the setting to **random** instead of **stable**, as suggested in the [article](https://fedoramagazine.org/randomize-mac-address-nm). -如果你使用 [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components),你需要设置 [`MACAddressPolicy=random`](https://www.freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) ,这将启用 [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://www.freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=)。 +If you are using [systemd-networkd](https://en.wikipedia.org/wiki/Systemd#Ancillary_components), you will need to set [`MACAddressPolicy=random`](https://freedesktop.org/software/systemd/man/systemd.link.html#MACAddressPolicy=) which will enable [RFC 7844 (Anonymity Profiles for DHCP Clients)](https://freedesktop.org/software/systemd/man/systemd.network.html#Anonymize=). MAC address randomization is primarily beneficial for Wi-Fi connections. For Ethernet connections, randomizing your MAC address provides little (if any) benefit, because a network administrator can trivially identify your device by other means (such as inspecting the port you are connected to on the network switch). 随机化Wi-Fi MAC地址取决于Wi-Fi固件的支持。 @@ -151,6 +151,6 @@ MAC address randomization is primarily beneficial for Wi-Fi connections. For Eth Fedora 项目 [通过使用一个 [`countme`](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting#Detailed_Description) 变量而不是唯一的 ID 来计算](https://fedoraproject.org/wiki/Changes/DNF_Better_Counting) 有多少独特的系统访问它的镜像。 Fedora这样做是为了确定负载并在必要时为更新提供更好的服务器。 -这个 [选项](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) ,目前默认是关闭的。 我们建议将 `countme=false` 添加到 `/etc/dnf/dnf.conf` ,以备将来启用它。 在使用 `rpm-ostree` 的系统上,如Silverblue,通过屏蔽 [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems/) 计时器来禁用 countme 选项。 +这个 [选项](https://dnf.readthedocs.io/en/latest/conf_ref.html#options-for-both-main-and-repo) ,目前默认是关闭的。 我们建议将 `countme=false` 添加到 `/etc/dnf/dnf.conf` ,以备将来启用它。 On systems that use `rpm-ostree` such as Silverblue, the countme option is disabled by masking the [rpm-ostree-countme](https://fedoramagazine.org/getting-better-at-counting-rpm-ostree-based-systems) timer. openSUSE 还使用一个 [唯一的 ID](https://en.opensuse.org/openSUSE:Statistics) 来计算系统,可以通过删除 `/var/lib/zypp/AnonymousUniqueId` 文件来禁用它。 diff --git a/i18n/zh/os/macos-overview.md b/i18n/zh/os/macos-overview.md index ad79023c..d715f7cc 100644 --- a/i18n/zh/os/macos-overview.md +++ b/i18n/zh/os/macos-overview.md @@ -6,7 +6,7 @@ description: macOS is Apple's desktop operating system that works with their har **macOS** is a Unix operating system developed by Apple for their Mac computers. To enhance privacy on macOS, you can disable telemetry features and harden existing privacy and security settings. -Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/en-us/HT211814). +Older Intel-based Macs and Hackintoshes do not support all the security features that macOS offers. To enhance data security, we recommend using a newer Mac with [Apple silicon](https://support.apple.com/HT211814). ## Privacy Notes @@ -22,13 +22,13 @@ macOS performs online checks when you open an app to verify whether an app conta Previously, these checks were performed via an unencrypted OCSP protocol which could leak information about the apps you ran to your network. Apple upgraded their OCSP service to use HTTPS encryption in 2021, and [posted information](https://support.apple.com/HT202491) about their logging policy for this service. They additionally promised to add a mechanism for people to opt-out of this online check, but this has not been added to macOS as of July 2023. -While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private/) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. +While you [can](https://eclecticlight.co/2021/02/23/how-to-run-apps-in-private) manually opt out of this check relatively easily, we recommend against doing so unless you would be badly compromised by the revocation checks performed by macOS, because they serve an important role in ensuring compromised apps are blocked from running. ## 推荐配置 Your account when you first set up your Mac will be an Administrator account, which has higher privileges than a Standard user account. macOS has a number of protections which prevent malware and other programs from abusing your Administrator privileges, so it is generally safe to use this account. -However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass/). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. +However, exploits in protective utilities like `sudo` have been [discovered in the past](https://bogner.sh/2014/03/another-mac-os-x-sudo-password-bypass). If you want to avoid the possibility that programs you run abuse your Administrator privileges, you could consider creating a second, Standard user account which you use for day-to-day operations. This has the added benefit of making it more obvious when an app needs admin access, because it will prompt you for credentials every time. If you do use a second account, it is not strictly required to ever log in to your original Administrator account from the macOS login screen. When you are doing something as a Standard user which requires Administrator permissions, the system should prompt you for authentication, where you can enter your Administrator credentials as your Standard user on a one-time basis. Apple provides [guidance](https://support.apple.com/HT203998) on hiding your Administrator account if you prefer to only see a single account on your login screen. @@ -128,7 +128,7 @@ On older Intel-based Mac computers, FileVault is the only form of disk encryptio ##### Lockdown Mode -[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers/) and [WASM](https://developer.mozilla.org/en-US/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. +[Lockdown Mode](https://blog.privacyguides.org/2022/10/27/macos-ventura-privacy-security-updates/#lockdown-mode) disables some features in order to improve security. Some apps or features won't work the same way they do when it's off, for example, [JIT](https://hacks.mozilla.org/2017/02/a-crash-course-in-just-in-time-jit-compilers) and [WASM](https://developer.mozilla.org/docs/WebAssembly) are disabled in Safari with Lockdown Mode enabled. We recommend enabling Lockdown Mode and seeing whether it significantly impacts your usage, many of the changes it makes are easy to live with. - [x] Click **Turn On** diff --git a/i18n/zh/os/qubes-overview.md b/i18n/zh/os/qubes-overview.md index f1eb74e6..cb40949f 100644 --- a/i18n/zh/os/qubes-overview.md +++ b/i18n/zh/os/qubes-overview.md @@ -4,11 +4,11 @@ icon: simple/qubesos description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security. --- -[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/). +[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://ranum.com/security/computer_security/editorials/dumb). ## Qubes操作系统是如何工作的? -Qubes使用 [分区](https://www.qubes-os.org/intro/) ,以保持系统的安全性。 Qubes是由模板创建的,默认的是Fedora、Debian和 [Whonix](../desktop.md#whonix)。 Qubes OS also allows you to create once-use [disposable](https://www.qubes-os.org/doc/how-to-use-disposables/) *qubes*. +Qubes uses [compartmentalization](https://qubes-os.org/intro) to keep the system secure. Qubes是由模板创建的,默认的是Fedora、Debian和 [Whonix](../desktop.md#whonix)。 Qubes OS also allows you to create once-use [disposable](https://qubes-os.org/doc/how-to-use-disposables) *qubes*.
The term qubes is gradually being updated to avoid referring to them as "virtual machines". @@ -20,7 +20,7 @@ Some of the information here and on the Qubes OS documentation may contain confl ![Qubes架构](../assets/img/qubes/qubes-trust-level-architecture.png)
Qubes架构,信用:什么是Qubes操作系统介绍
-Each qube has a [colored border](https://www.qubes-os.org/screenshots/) that can help you keep track of the domain in which it runs. 例如,你可以为你的银行浏览器使用一种特定的颜色,而对一般的不信任的浏览器使用不同的颜色。 +Each qube has a [colored border](https://qubes-os.org/screenshots) that can help you keep track of the domain in which it runs. 例如,你可以为你的银行浏览器使用一种特定的颜色,而对一般的不信任的浏览器使用不同的颜色。 ![彩色边框](../assets/img/qubes/r4.0-xfce-three-domains-at-work.png)
Qubes窗口边框,图片来源: Qubes截图
@@ -33,7 +33,7 @@ Qubes OS utilizes [dom0](https://wiki.xenproject.org/wiki/Dom0) Xen VM for contr ### 复制和粘贴文本 -你可以 [,使用 `qvm-copy-to-vm` 或下面的说明复制和粘贴文本](https://www.qubes-os.org/doc/how-to-copy-and-paste-text/)。 +You can [copy and paste text](https://qubes-os.org/doc/how-to-copy-and-paste-text) using `qvm-copy-to-vm` or the below instructions: 1. Press **Ctrl+C** to tell the *qube* you're in that you want to copy something. 2. Press **Ctrl+Shift+C** to tell the *qube* to make this buffer available to the global clipboard. @@ -47,16 +47,13 @@ To copy and paste files and directories (folders) from one *qube* to another, yo
Qubes do not have their own filesystems. -You can [copy and move files](https://www.qubes-os.org/doc/how-to-copy-and-move-files/) between *qubes*. 当这样做的时候,改变并不是立即进行的,而且在发生事故的情况下可以很容易地撤消。 When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral. +You can [copy and move files](https://qubes-os.org/doc/how-to-copy-and-move-files) between *qubes*. 当这样做的时候,改变并不是立即进行的,而且在发生事故的情况下可以很容易地撤消。 When you run a *qube*, it does not have a persistent filesystem. You can create and delete files, but these changes are ephemeral.
### 虚拟机之间的相互作用 -The [qrexec framework](https://www.qubes-os.org/doc/qrexec/) is a core part of Qubes which allows communication between domains. 它建立在Xen库 *vchan*的基础上,通过策略,促进了 -隔离。

- - +The [qrexec framework](https://qubes-os.org/doc/qrexec) is a core part of Qubes which allows communication between domains. It is built on top of the Xen library *vchan*, which facilitates [isolation through policies](https://qubes-os.org/news/2020/06/22/new-qrexec-policy-system). ## Connecting to Tor via a VPN @@ -74,14 +71,11 @@ Your qubes should be configured in a manner similar to this: | sys-whonix | Your Whonix Gateway VM | ==sys-proxyvm== | | anon-whonix | Your Whonix Workstation VM | sys-whonix | - - - ## 其它资源 -关于其他信息,我们鼓励你查阅位于 [Qubes OS网站上的大量Qubes OS文档页面](https://www.qubes-os.org/doc/)。 离线拷贝可以从Qubes OS [文档库中下载](https://github.com/QubesOS/qubes-doc)。 +For additional information we encourage you to consult the extensive Qubes OS documentation pages located on the [Qubes OS Website](https://qubes-os.org/doc). 离线拷贝可以从Qubes OS [文档库中下载](https://github.com/QubesOS/qubes-doc)。 -- [Arguably the world's most secure operating system](https://www.opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard/) (Open Technology Fund) +- [Arguably the world's most secure operating system](https://opentech.fund/news/qubes-os-arguably-the-worlds-most-secure-operating-system-motherboard) (Open Technology Fund) - [Software compartmentalization vs. physical separation](https://invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf) (J. Rutkowska) - [Partitioning my digital life into security domains](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html) (J. Rutkowska) -- [Related Articles](https://www.qubes-os.org/news/categories/#articles) (Qubes OS) +- [Related Articles](https://qubes-os.org/news/categories/#articles) (Qubes OS) diff --git a/i18n/zh/passwords.md b/i18n/zh/passwords.md index a6075de6..47bd21a3 100644 --- a/i18n/zh/passwords.md +++ b/i18n/zh/passwords.md @@ -65,7 +65,7 @@ schema: "@type": SoftwareApplication name: KeePassXC image: /assets/img/password-management/keepassxc.svg - url: https://keepassxc.org/ + url: https://keepassxc.org sameAs: https://en.wikipedia.org/wiki/KeePassXC applicationCategory: 密码管理器 operatingSystem: @@ -81,7 +81,7 @@ schema: "@type": SoftwareApplication name: KeePassDX image: /assets/img/password-management/keepassdx.svg - url: https://www.keepassdx.com/ + url: https://keepassdx.com applicationCategory: 密码管理器 operatingSystem: 安卓 subjectOf: @@ -93,7 +93,7 @@ schema: "@type": SoftwareApplication name: Strongbox image: /assets/img/password-management/strongbox.svg - url: https://strongboxsafe.com/ + url: https://strongboxsafe.com applicationCategory: 密码管理器 operatingSystem: iOS subjectOf: @@ -105,7 +105,7 @@ schema: "@type": SoftwareApplication name: gopass image: /assets/img/password-management/gopass.svg - url: https://www.gopass.pw/ + url: https://gopass.pw applicationCategory: 密码管理器 operatingSystem: - Windows 系统 @@ -127,7 +127,7 @@ Password managers allow you to securely store and manage passwords and other cre Built-in password managers in software like browsers and operating systems are sometimes not as good as dedicated password manager software. The advantage of a built-in password manager is good integration with the software, but it can often be very simple and lack privacy and security features standalone offerings have. -For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/en-us/HT202303) offers E2EE by default. +For example, the password manager in Microsoft Edge doesn't offer E2EE at all. Google's password manager has [optional](https://support.google.com/accounts/answer/11350823) E2EE, and [Apple's](https://support.apple.com/HT202303) offers E2EE by default.
@@ -145,14 +145,14 @@ These password managers sync your passwords to a cloud server for easy accessibi [:octicons-home-16: Homepage](https://bitwarden.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://bitwarden.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://bitwarden.com/help/){ .card-link title=Documentation} +[:octicons-info-16:](https://bitwarden.com/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/bitwarden){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.x8bit.bitwarden) -- [:simple-appstore: App Store](https://apps.apple.com/app/bitwarden-password-manager/id1137397744) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1137397744) - [:simple-github: GitHub](https://github.com/bitwarden/mobile/releases) - [:simple-windows11: Windows](https://bitwarden.com/download) - [:simple-linux: Linux](https://bitwarden.com/download) @@ -165,7 +165,7 @@ These password managers sync your passwords to a cloud server for easy accessibi -Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send/), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). +Bitwarden also features [Bitwarden Send](https://bitwarden.com/products/send), which allows you to share text and files securely with [end-to-end encryption](https://bitwarden.com/help/send-encryption). A [password](https://bitwarden.com/help/send-privacy/#send-passwords) can be required along with the send link. Bitwarden Send also features [automatic deletion](https://bitwarden.com/help/send-lifespan). You need the [Premium Plan](https://bitwarden.com/help/about-bitwarden-plans/#compare-personal-plans) to be able to share files. The free plan only allows text sharing. @@ -183,20 +183,20 @@ Bitwarden's server-side code is [open source](https://github.com/bitwarden/serve ![1Password logo](assets/img/password-management/1password.svg){ align=right } -**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up/). 1Password is [audited](https://support.1password.com/security-assessments/) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). +**1Password** is a password manager with a strong focus on security and ease-of-use, which allows you to store passwords, credit cards, software licenses, and any other sensitive information in a secure digital vault. Your vault is hosted on 1Password's servers for a [monthly fee](https://1password.com/sign-up). 1Password is [audited](https://support.1password.com/security-assessments) on a regular basis and provides exceptional customer support. 1Password is closed source; however, the security of the product is thoroughly documented in their [security white paper](https://1passwordstatic.com/files/security/1password-white-paper.pdf). -[:octicons-home-16: Homepage](https://1password.com/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://1password.com/legal/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.1password.com/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://1password.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://1password.com/legal/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.1password.com){ .card-link title=Documentation}
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onepassword.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750?mt=8) -- [:simple-windows11: Windows](https://1password.com/downloads/windows/) -- [:simple-apple: macOS](https://1password.com/downloads/mac/) -- [:simple-linux: Linux](https://1password.com/downloads/linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1511601750) +- [:simple-windows11: Windows](https://1password.com/downloads/windows) +- [:simple-apple: macOS](https://1password.com/downloads/mac) +- [:simple-linux: Linux](https://1password.com/downloads/linux)
@@ -225,7 +225,7 @@ One advantage 1Password has over Bitwarden is its first-class support for native Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.psono.psono) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/psono-password-manager/id1545581224) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1545581224) - [:simple-firefoxbrowser: Firefox](https://addons.mozilla.org/firefox/addon/psono-pw-password-manager) - [:simple-googlechrome: Chrome](https://chrome.google.com/webstore/detail/psonopw-password-manager/eljmjmgjkbmpmfljlmklcfineebidmlo) - [:simple-docker: Docker Hub](https://hub.docker.com/r/psono/psono-client) @@ -276,9 +276,9 @@ These options allow you to manage an encrypted password database locally. [:octicons-home-16: Homepage](https://keepassxc.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://keepassxc.org/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://keepassxc.org/docs/){ .card-link title=Documentation} +[:octicons-info-16:](https://keepassxc.org/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/keepassxreboot/keepassxc){ .card-link title="Source Code" } -[:octicons-heart-16:](https://keepassxc.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassxc.org/donate){ .card-link title=Contribute }
Downloads @@ -304,10 +304,10 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se **KeePassDX** is a lightweight password manager for Android, allows editing encrypted data in a single file in KeePass format and can fill in the forms in a secure way. [Contributor Pro](https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.pro) allows unlocking cosmetic content and non-standard protocol features, but more importantly, it helps and encourages development. -[:octicons-home-16: Homepage](https://www.keepassdx.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://keepassdx.com){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/Kunzisoft/KeePassDX/wiki){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/Kunzisoft/KeePassDX){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.keepassdx.com/#donation){ .card-link title=Contribute } +[:octicons-heart-16:](https://keepassdx.com/#donation){ .card-link title=Contribute }
Downloads @@ -325,24 +325,24 @@ KeePassXC stores its export data as [CSV](https://en.wikipedia.org/wiki/Comma-se ![Strongbox logo](assets/img/password-management/strongbox.svg){ align=right } -**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing/), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison/)—such as biometric authentication—locked behind a subscription or perpetual license. +**Strongbox** is a native, open-source password manager for iOS and macOS. Supporting both KeePass and Password Safe formats, Strongbox can be used in tandem with other password managers, like KeePassXC, on non-Apple platforms. By employing a [freemium model](https://strongboxsafe.com/pricing), Strongbox offers most features under its free tier with more convenience-oriented [features](https://strongboxsafe.com/comparison)—such as biometric authentication—locked behind a subscription or perpetual license. [:octicons-home-16: Homepage](https://strongboxsafe.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://strongboxsafe.com/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://strongboxsafe.com/getting-started/){ .card-link title=Documentation} +[:octicons-eye-16:](https://strongboxsafe.com/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://strongboxsafe.com/getting-started){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/strongbox-password-safe/Strongbox){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/strongbox-password-safe/Strongbox#supporting-development){ .card-link title=Contribute }
Downloads -- [:simple-appstore: App Store](https://apps.apple.com/app/strongbox-keepass-pwsafe/id897283731) +- [:simple-appstore: App Store](https://apps.apple.com/app/id897283731)
-Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/strongbox-keepass-pwsafe/id1581589638). This version is stripped down in an attempt to reduce attack surface. +Additionally, there is an offline-only version offered: [Strongbox Zero](https://apps.apple.com/app/id1581589638). This version is stripped down in an attempt to reduce attack surface. ### Command-line @@ -356,7 +356,7 @@ These products are minimal password managers that can be used within scripting a **gopass** is a password manager for the command line written in Go. It works on all major desktop and server operating systems (Linux, macOS, BSD, Windows). -[:octicons-home-16: Homepage](https://www.gopass.pw){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://gopass.pw){ .md-button .md-button--primary } [:octicons-info-16:](https://github.com/gopasspw/gopass/tree/master/docs){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/gopasspw/gopass){ .card-link title="Source Code" } [:octicons-heart-16:](https://github.com/sponsors/dominikschulz){ .card-link title=Contribute } @@ -364,10 +364,10 @@ These products are minimal password managers that can be used within scripting a
Downloads -- [:simple-windows11: Windows](https://www.gopass.pw/#install-windows) -- [:simple-apple: macOS](https://www.gopass.pw/#install-macos) -- [:simple-linux: Linux](https://www.gopass.pw/#install-linux) -- [:simple-freebsd: FreeBSD](https://www.gopass.pw/#install-bsd) +- [:simple-windows11: Windows](https://gopass.pw/#install-windows) +- [:simple-apple: macOS](https://gopass.pw/#install-macos) +- [:simple-linux: Linux](https://gopass.pw/#install-linux) +- [:simple-freebsd: FreeBSD](https://gopass.pw/#install-bsd)
diff --git a/i18n/zh/photo-management.md b/i18n/zh/photo-management.md index b2519673..546ac7f4 100644 --- a/i18n/zh/photo-management.md +++ b/i18n/zh/photo-management.md @@ -14,9 +14,9 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![ente logo](assets/img/photo-management/ente.svg#only-light){ align=right } ![ente logo](assets/img/photo-management/ente-dark.svg#only-dark){ align=right } -**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit/) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. +**ente** is an end-to-end encrypted photo backup service which supports automatic backups on iOS and Android. Their code is fully open-source, both on the client side and on the server side. It is [self-hostable](https://github.com/ente-io/ente/tree/main/server#self-hosting). It underwent an [audit by Cure53](https://ente.io/blog/cryptography-audit) in March 2023 and by [Fallible](https://ente.io/reports/Fallible-Audit-Report-19-04-2023.pdf) in April 2023. -[:octicons-home-16: Homepage](https://ente.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://ente.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://ente.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://ente.io/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ente-io){ .card-link title="Source Code" } @@ -46,17 +46,17 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho **Stingle** is a gallery and camera application with built-in, end-to-end encrypted backup and sync functionality for your photos and videos. Storage starts at 1GB for free accounts on their cloud, or you can host your own Stingle API server for total independence. -[:octicons-home-16: Homepage](https://stingle.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://stingle.org/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://stingle.org/faq/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://stingle.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://stingle.org/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://stingle.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/stingle){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.stingle.photos) -- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos/) -- [:simple-appstore: App Store](https://apps.apple.com/in/app/stingle-photos/id1582535448) +- [:simple-android: Android](https://f-droid.org/en/packages/org.stingle.photos) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1582535448) - [:simple-github: GitHub](https://github.com/stingle)
@@ -69,11 +69,11 @@ Most cloud photo management solutions like Google Photos, Flickr, and Amazon Pho ![PhotoPrism logo](assets/img/photo-management/photoprism.svg){ align=right } -**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://www.photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. +**PhotoPrism** is a self-hostable platform for managing photos. It supports album syncing and sharing as well as a variety of other [features](https://photoprism.app/features). It does not include E2EE, so it's best hosted on a server that you trust and is under your control. -[:octicons-home-16: Homepage](https://www.photoprism.app){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.photoprism.app/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.photoprism.app/kb){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://photoprism.app){ .md-button .md-button--primary } +[:octicons-eye-16:](https://photoprism.app/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://photoprism.app/kb){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/photoprism){ .card-link title="Source Code" }
diff --git a/i18n/zh/productivity.md b/i18n/zh/productivity.md index 4122db55..7f34fa91 100644 --- a/i18n/zh/productivity.md +++ b/i18n/zh/productivity.md @@ -19,9 +19,9 @@ Most online office suites do not support E2EE, meaning the cloud provider has ac [:octicons-home-16: Homepage](https://nextcloud.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://nextcloud.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://nextcloud.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://nextcloud.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/nextcloud){ .card-link title="Source Code" } -[:octicons-heart-16:](https://nextcloud.com/contribute/){ .card-link title=Contribute } +[:octicons-heart-16:](https://nextcloud.com/contribute){ .card-link title=Contribute }
Downloads @@ -53,8 +53,8 @@ We don't recommend using the [E2EE App](https://apps.nextcloud.com/apps/end_to_e **CryptPad** is a private-by-design alternative to popular office tools. All content on this web service is end-to-end encrypted and can be shared with other users easily. [:octicons-home-16: Homepage](https://cryptpad.fr){ .md-button .md-button--primary } -[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://docs.cryptpad.fr/){ .card-link title=Documentation} +[:octicons-eye-16:](https://cryptpad.fr/pad/#/2/pad/view/GcNjAWmK6YDB3EO2IipRZ0fUe89j43Ryqeb4fjkjehE){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://docs.cryptpad.fr){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/xwiki-labs/cryptpad){ .card-link title="Source Code" } [:octicons-heart-16:](https://opencollective.com/cryptpad){ .card-link title=Contribute } @@ -99,20 +99,20 @@ Our best-case criteria represents what we would like to see from the perfect pro **LibreOffice** is a free and open-source office suite with extensive functionality. -[:octicons-home-16: Homepage](https://www.libreoffice.org){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.libreoffice.org/about-us/privacy/privacy-policy-en/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation/){ .card-link title=Documentation} -[:octicons-code-16:](https://www.libreoffice.org/about-us/source-code){ .card-link title="Source Code" } -[:octicons-heart-16:](https://www.libreoffice.org/donate/){ .card-link title=Contribute } +[:octicons-home-16: Homepage](https://libreoffice.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://libreoffice.org/about-us/privacy/privacy-policy-en){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://documentation.libreoffice.org/en/english-documentation){ .card-link title=Documentation} +[:octicons-code-16:](https://libreoffice.org/about-us/source-code){ .card-link title="Source Code" } +[:octicons-heart-16:](https://libreoffice.org/donate){ .card-link title=Contribute }
Downloads -- [:simple-googleplay: Google Play](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-appstore: App Store](https://www.libreoffice.org/download/android-and-ios/) -- [:simple-windows11: Windows](https://www.libreoffice.org/download/download/) -- [:simple-apple: macOS](https://www.libreoffice.org/download/download/) -- [:simple-linux: Linux](https://www.libreoffice.org/download/download/) +- [:simple-googleplay: Google Play](https://libreoffice.org/download/android-and-ios) +- [:simple-appstore: App Store](https://libreoffice.org/download/android-and-ios) +- [:simple-windows11: Windows](https://libreoffice.org/download/download) +- [:simple-apple: macOS](https://libreoffice.org/download/download) +- [:simple-linux: Linux](https://libreoffice.org/download/download) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.libreoffice.LibreOffice)
@@ -127,7 +127,7 @@ Our best-case criteria represents what we would like to see from the perfect pro **OnlyOffice** is a cloud-based free and open-source office suite with extensive functionality, including integration with Nextcloud. -[:octicons-home-16: Homepage](https://www.onlyoffice.com){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://onlyoffice.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://help.onlyoffice.com/products/files/doceditor.aspx?fileid=5048502&doc=SXhWMEVzSEYxNlVVaXJJeUVtS0kyYk14YWdXTEFUQmRWL250NllHNUFGbz0_IjUwNDg1MDIi0){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://helpcenter.onlyoffice.com/userguides.aspx){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ONLYOFFICE){ .card-link title="Source Code" } @@ -137,9 +137,9 @@ Our best-case criteria represents what we would like to see from the perfect pro - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.onlyoffice.documents) - [:simple-appstore: App Store](https://apps.apple.com/app/id944896972) -- [:simple-windows11: Windows](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-apple: macOS](https://www.onlyoffice.com/download-desktop.aspx) -- [:simple-linux: Linux](https://www.onlyoffice.com/download-desktop.aspx) +- [:simple-windows11: Windows](https://onlyoffice.com/download-desktop.aspx) +- [:simple-apple: macOS](https://onlyoffice.com/download-desktop.aspx) +- [:simple-linux: Linux](https://onlyoffice.com/download-desktop.aspx) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.onlyoffice.desktopeditors)
@@ -176,7 +176,7 @@ In general, we define office suites as applications which could reasonably act a **PrivateBin** is a minimalist, open-source online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256-bit AES. It is the improved version of ZeroBin. [:octicons-home-16: Homepage](https://privatebin.info){ .md-button .md-button--primary } -[:octicons-server-16:](https://privatebin.info/directory/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://privatebin.info/directory){ .card-link title="Public Instances"} [:octicons-info-16:](https://github.com/PrivateBin/PrivateBin/wiki/FAQ){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/PrivateBin/PrivateBin){ .card-link title="Source Code" } diff --git a/i18n/zh/real-time-communication.md b/i18n/zh/real-time-communication.md index 63d3c506..70f0db5b 100644 --- a/i18n/zh/real-time-communication.md +++ b/i18n/zh/real-time-communication.md @@ -22,18 +22,18 @@ cover: real-time-communication.webp **Signal** 是Signal Messenger LLC所研发的一款手机应用。 The app provides instant messaging and calls secured with the Signal Protocol, an extremely secure encryption protocol which supports forward secrecy[^1] and post-compromise security.[^2] -[:octicons-home-16: Homepage](https://signal.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://signal.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://signal.org/legal/#privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.signal.org/hc/en-us){ .card-link title=Documentation} +[:octicons-info-16:](https://support.signal.org){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/signalapp){ .card-link title="Source Code" } -[:octicons-heart-16:](https://signal.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://signal.org/donate){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.thoughtcrime.securesms) - [:simple-appstore: App Store](https://apps.apple.com/app/id874139669) -- [:simple-android: Android](https://signal.org/android/apk/) +- [:simple-android: Android](https://signal.org/android/apk) - [:simple-windows11: Windows](https://signal.org/download/windows) - [:simple-apple: macOS](https://signal.org/download/macos) - [:simple-linux: Linux](https://signal.org/download/linux) @@ -53,13 +53,13 @@ Signal requires your phone number for registration, however you should create a You can optionally change the **Who Can Find Me By Number** setting to **Nobody** as well, if you want to prevent people who already have your phone number from discovering your Signal account/username. -Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. 个人资料也经过加密,并只与你联系过的人共享。 Signal supports [private groups](https://signal.org/blog/signal-private-group-system/), where the server has no record of your group memberships, group titles, group avatars, or group attributes. 只有当 [加密发送(Sealed Sender)](https://signal.org/blog/sealed-sender/)启用时,Signal才会保存最少的元数据。 发信人地址与消息正文一起被加密,只有收信人的地址对服务器可见。 加密发送仅对你联系人列表中的人启用,你也可以对所有收件人启用,但是这么做会增加你收到垃圾邮件的风险。 +Contact lists on Signal are encrypted using your Signal PIN and the server does not have access to them. 个人资料也经过加密,并只与你联系过的人共享。 Signal supports [private groups](https://signal.org/blog/signal-private-group-system), where the server has no record of your group memberships, group titles, group avatars, or group attributes. Signal has minimal metadata when [Sealed Sender](https://signal.org/blog/sealed-sender) is enabled. 发信人地址与消息正文一起被加密,只有收信人的地址对服务器可见。 加密发送仅对你联系人列表中的人启用,你也可以对所有收件人启用,但是这么做会增加你收到垃圾邮件的风险。 -Signal协议在2016年被独立[审计](https://eprint.iacr.org/2016/1013.pdf) 。 该协议的规范可以在他们的[文档](https://signal.org/docs/)查看。 +Signal协议在2016年被独立[审计](https://eprint.iacr.org/2016/1013.pdf) 。 The specification for the Signal protocol can be found in their [documentation](https://signal.org/docs). 我们有一些额外的配置并加固你的Signal安装的建议: -[Signal 配置与加固 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening/) +[Signal 配置与加固 :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/07/07/signal-configuration-and-hardening) ### SimpleX Chat @@ -78,7 +78,7 @@ Signal协议在2016年被独立[审计](https://eprint.iacr.org/2016/1013.pdf) Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=chat.simplex.app) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/simplex-chat/id1605771084) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1605771084) - [:simple-github: GitHub](https://github.com/simplex-chat/simplex-chat/releases) - [:simple-windows11: Windows](https://simplex.chat/downloads/#desktop-app) - [:simple-apple: macOS](https://simplex.chat/downloads/#desktop-app) @@ -98,20 +98,20 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and ![Briar logo](assets/img/messengers/briar.svg){ align=right } -**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works/) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. +**Briar** is an encrypted instant messenger that [connects](https://briarproject.org/how-it-works) to other clients using the Tor Network. Briar can also connect via Wi-Fi or Bluetooth when in local proximity. Briar’s local mesh mode can be useful when internet availability is a problem. -[:octicons-home-16: Homepage](https://briarproject.org/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://briarproject.org/privacy-policy/){ .card-link title="Privacy Policy" } +[:octicons-home-16: Homepage](https://briarproject.org){ .md-button .md-button--primary } +[:octicons-eye-16:](https://briarproject.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://code.briarproject.org/briar/briar/-/wikis/home){ .card-link title=Documentation} [:octicons-code-16:](https://code.briarproject.org/briar/briar){ .card-link title="Source Code" } -[:octicons-heart-16:](https://briarproject.org/){ .card-link title="Donation options are listed on the bottom of the homepage" } +[:octicons-heart-16:](https://briarproject.org){ .card-link title="Donation options are listed on the bottom of the homepage" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.briarproject.briar.android) -- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop/) -- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop/) +- [:simple-windows11: Windows](https://briarproject.org/download-briar-desktop) +- [:simple-linux: Linux](https://briarproject.org/download-briar-desktop) - [:simple-flathub: Flathub](https://flathub.org/apps/details/org.briarproject.Briar)
@@ -120,7 +120,7 @@ SimpleX Chat supports basic group chatting functionality, direct messaging, and To add a contact on Briar, you must both add each other first. You can either exchange `briar://` links or scan a contact’s QR code if they are nearby. -The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit/), and the anonymous routing protocol uses the Tor network which has also been audited. +The client software was independently [audited](https://briarproject.org/news/2017-beta-released-security-audit), and the anonymous routing protocol uses the Tor network which has also been audited. Briar has a fully [published specification](https://code.briarproject.org/briar/briar-spec). @@ -141,11 +141,11 @@ These messengers do not have forward secrecy[^1], and while they fulfill certain ![Element logo](assets/img/messengers/element.svg){ align=right } -**Element** is the reference [client](https://matrix.org/ecosystem/clients/) for the [Matrix](https://matrix.org/docs/guides/introduction) protocol, an [open standard](https://matrix.org/docs/spec) for secure decentralized real-time communication. +**Element** is the reference [client](https://matrix.org/ecosystem/clients) for the [Matrix](https://matrix.org/docs/chat_basics/matrix-for-im) protocol, an [open standard](https://spec.matrix.org/latest) for secure decentralized real-time communication. Messages and files shared in private rooms (those which require an invite) are by default E2EE as are one to one voice and video calls. -[:octicons-home-16: Homepage](https://element.io/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://element.io){ .md-button .md-button--primary } [:octicons-eye-16:](https://element.io/privacy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://element.io/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/element-hq){ .card-link title="Source Code" } @@ -154,11 +154,11 @@ Messages and files shared in private rooms (those which require an invite) are b Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=im.vector.app) -- [:simple-appstore: App Store](https://apps.apple.com/app/vector/id1083446067) -- [:simple-github: GitHub](https://github.com/vector-im/element-android/releases) -- [:simple-windows11: Windows](https://element.io/get-started) -- [:simple-apple: macOS](https://element.io/get-started) -- [:simple-linux: Linux](https://element.io/get-started) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1083446067) +- [:simple-github: GitHub](https://github.com/element-hq/element-android/releases) +- [:simple-windows11: Windows](https://element.io/download) +- [:simple-apple: macOS](https://element.io/download) +- [:simple-linux: Linux](https://element.io/download) - [:octicons-globe-16: Web](https://app.element.io)
@@ -171,7 +171,7 @@ Group voice and video calls are [not](https://github.com/vector-im/element-web/i The Matrix protocol itself [theoretically supports forward secrecy](https://gitlab.matrix.org/matrix-org/olm/blob/master/docs/megolm.md#partial-forward-secrecy)[^1], however this is [not currently supported in Element](https://github.com/vector-im/element-web/issues/7101) due to it breaking some aspects of the user experience such as key backups and shared message history. -The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest/). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption/) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet/). +The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matrixs-olm-end-to-end-encryption-security-assessment-released-and-implemented-cross-platform-on-riot-at-last) in 2016. The specification for the Matrix protocol can be found in their [documentation](https://spec.matrix.org/latest). The [Olm cryptographic ratchet](https://matrix.org/docs/matrix-concepts/end-to-end-encryption) used by Matrix is an implementation of Signal’s [Double Ratchet algorithm](https://signal.org/docs/specifications/doubleratchet). ### Session @@ -181,9 +181,9 @@ The protocol was independently [audited](https://matrix.org/blog/2016/11/21/matr **Session** is a decentralized messenger with a focus on private, secure, and anonymous communications. Session offers support for direct messages, group chats, and voice calls. -Session uses the decentralized [Oxen Service Node Network](https://oxen.io/) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. +Session uses the decentralized [Oxen Service Node Network](https://oxen.io) to store and route messages. Every encrypted message is routed through three nodes in the Oxen Service Node Network, making it virtually impossible for the nodes to compile meaningful information on those using the network. -[:octicons-home-16: Homepage](https://getsession.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://getsession.org){ .md-button .md-button--primary } [:octicons-eye-16:](https://getsession.org/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://getsession.org/faq){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/oxen-io){ .card-link title="Source Code" } diff --git a/i18n/zh/router.md b/i18n/zh/router.md index e583ed58..1454438c 100644 --- a/i18n/zh/router.md +++ b/i18n/zh/router.md @@ -35,10 +35,10 @@ You can consult OpenWrt's [table of hardware](https://openwrt.org/toh/start) to **OPNsense** is an open-source, FreeBSD-based firewall and routing platform which incorporates many advanced features such as traffic shaping, load balancing, and VPN capabilities, with many more features available in the form of plugins. OPNsense is commonly deployed as a perimeter firewall, router, wireless access point, DHCP server, DNS server, and VPN endpoint. -[:octicons-home-16: Homepage](https://opnsense.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://opnsense.org){ .md-button .md-button--primary } [:octicons-info-16:](https://docs.opnsense.org/index.html){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/opnsense){ .card-link title="Source Code" } -[:octicons-heart-16:](https://opnsense.org/donate/){ .card-link title=Contribute } +[:octicons-heart-16:](https://opnsense.org/donate){ .card-link title=Contribute }
diff --git a/i18n/zh/search-engines.md b/i18n/zh/search-engines.md index dad96708..243659b9 100644 --- a/i18n/zh/search-engines.md +++ b/i18n/zh/search-engines.md @@ -10,7 +10,7 @@ Use a search engine that doesn't build an advertising profile based on your sear The recommendations here are based on the merits of each service's privacy policy. There is **no guarantee** that these privacy policies are honored. -Consider using a [VPN](vpn.md) or [Tor](https://www.torproject.org/) if your threat model requires hiding your IP address from the search provider. +Consider using a [VPN](vpn.md) or [Tor](tor.md) if your threat model requires hiding your IP address from the search provider. ## Brave Search @@ -24,7 +24,7 @@ Brave Search includes unique features such as Discussions, which highlights conv We recommend you disable [Anonymous usage metrics](https://search.brave.com/help/usage-metrics) as it is enabled by default and can be disabled within settings. -[:octicons-home-16: Homepage](https://search.brave.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://search.brave.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://search.brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://search.brave.com/help/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://search.brave.com/help){ .card-link title=Documentation} @@ -41,14 +41,14 @@ Brave Search is based in the United States. Their [privacy policy](https://searc ![DuckDuckGo logo](assets/img/search-engines/duckduckgo.svg){ align=right } -**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features/). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources/) for instant answers and other non-primary results. +**DuckDuckGo** is one of the more mainstream private search engine options. Notable DuckDuckGo search features include [bangs](https://duckduckgo.com/bang) and many [instant answers](https://help.duckduckgo.com/duckduckgo-help-pages/features/instant-answers-and-other-features). The search engine relies on a commercial Bing API to serve most results, but it does use numerous [other sources](https://help.duckduckgo.com/results/sources) for instant answers and other non-primary results. DuckDuckGo is the default search engine for the Tor Browser and is one of the few available options on Apple’s Safari browser. [:octicons-home-16: Homepage](https://duckduckgo.com){ .md-button .md-button--primary } [:simple-torbrowser:](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion){ .card-link title="Onion Service" } [:octicons-eye-16:](https://duckduckgo.com/privacy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://help.duckduckgo.com/){ .card-link title=Documentation} +[:octicons-info-16:](https://help.duckduckgo.com){ .card-link title=Documentation}
@@ -56,7 +56,7 @@ DuckDuckGo is the default search engine for the Tor Browser and is one of the fe DuckDuckGo is based in the United States. Their [privacy policy](https://duckduckgo.com/privacy) states they **do** log your searches for product improvement purposes, but not your IP address or any other personally identifying information. -DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript/) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. +DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non-javascript) of their search engine, both of which do not require JavaScript. These versions do lack features, however. These versions can also be used in conjunction with their [Tor onion address](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion) by appending [/lite](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/lite) or [/html](https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/html) for the respective version. ## SearXNG @@ -67,7 +67,7 @@ DuckDuckGo offers two [other versions](https://help.duckduckgo.com/features/non- **SearXNG** is an open-source, self-hostable, metasearch engine, aggregating the results of other search engines while not storing any information itself. It is an actively maintained fork of [SearX](https://github.com/searx/searx). [:octicons-home-16: Homepage](https://searxng.org){ .md-button .md-button--primary } -[:octicons-server-16:](https://searx.space/){ .card-link title="Public Instances"} +[:octicons-server-16:](https://searx.space){ .card-link title="Public Instances"} [:octicons-code-16:](https://github.com/searxng/searxng){ .card-link title="Source Code" }
@@ -87,11 +87,11 @@ When you are using a SearXNG instance, be sure to go read their privacy policy. ![Startpage logo](assets/img/search-engines/startpage.svg#only-light){ align=right } ![Startpage logo](assets/img/search-engines/startpage-dark.svg#only-dark){ align=right } -**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/en-us/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing-) search results. One of Startpage's unique features is the [Anonymous View](https://www.startpage.com/en/anonymous-view/), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/en-us/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. +**Startpage** is a private search engine known for serving [Google and Bing](https://support.startpage.com/hc/articles/4522435533844-What-is-the-relationship-between-Startpage-and-your-search-partners-like-Google-and-Microsoft-Bing) search results. One of Startpage's unique features is the [Anonymous View](https://startpage.com/en/anonymous-view), which puts forth efforts to standardize user activity to make it more difficult to be uniquely identified. The feature can be useful for hiding [some](https://support.startpage.com/hc/articles/4455540212116-The-Anonymous-View-Proxy-technical-details) network and browser properties. Unlike the name suggests, the feature should not be relied upon for anonymity. If you are looking for anonymity, use the [Tor Browser](tor.md#tor-browser) instead. -[:octicons-home-16: Homepage](https://www.startpage.com){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://support.startpage.com/hc/en-us/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://startpage.com){ .md-button .md-button--primary } +[:octicons-eye-16:](https://startpage.com/en/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://support.startpage.com/hc/categories/4481917470356-Startpage-Search-Engine){ .card-link title=Documentation}
@@ -104,9 +104,9 @@ Startpage regularly limits service access to certain IP addresses, such as IPs r -Startpage is based in the Netherlands. According to their [privacy policy](https://www.startpage.com/en/privacy-policy/), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. +Startpage is based in the Netherlands. According to their [privacy policy](https://startpage.com/en/privacy-policy), they log details such as: operating system, type of browser, and language. They do not log your IP address, search queries, or other personally identifying information. -Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage/) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. +Startpage's majority shareholder is System1 who is an adtech company. We don't believe that to be an issue as they have a distinctly separate [privacy policy](https://system1.com/terms/privacy-policy). The Privacy Guides team reached out to Startpage [back in 2020](https://web.archive.org/web/20210118031008/https://blog.privacytools.io/relisting-startpage) to clear up any concerns with System1's sizeable investment into the service. We were satisfied with the answers we received. ## Criteria diff --git a/i18n/zh/tools.md b/i18n/zh/tools.md index 26db040d..fa0b251b 100644 --- a/i18n/zh/tools.md +++ b/i18n/zh/tools.md @@ -9,7 +9,7 @@ description: Privacy Guides is the most transparent and reliable website for fin 如果你正在寻找某项具体解决方案,这里是一些我们推荐的各种类别的软硬件工具。 我们推荐的隐私工具主要依据它们的安全功能来选择,另外还强调了去中心化和开源。 They are applicable to a variety of threat models ranging from protection against global mass surveillance programs and avoiding big tech companies to mitigating attacks, but only you can determine what will work best for your needs. -If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net/) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! +If you want assistance figuring out the best privacy tools and alternative programs for your needs, start a discussion on our [forum](https://discuss.privacyguides.net) or our [Matrix](https://matrix.to/#/#privacyguides:matrix.org) community! 关于每个项目的更多相关细节, 为什么选择它们以及我们提议的一些额外的使用提示或技巧,请点击每个部分的 "了解详情" 链接, 或者也可以点击推荐项本身来转到具体的页面部分。 @@ -89,7 +89,7 @@ If you want assistance figuring out the best privacy tools and alternative progr #### 加密DNS代理 -We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net/) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. +We [recommend](dns.md#recommended-providers) a number of encrypted DNS servers based on a variety of criteria, such as [Mullvad](https://mullvad.net/en/help/dns-over-https-and-dns-over-tls) and [Quad9](https://quad9.net) amongst others. We recommend for you to read our pages on DNS before choosing a provider. In many cases, using an alternative DNS provider is not recommended. [了解更多 :hero-arrow-circle-right-fill:](dns.md) diff --git a/i18n/zh/tor.md b/i18n/zh/tor.md index 0374a4fd..4b5c15fd 100644 --- a/i18n/zh/tor.md +++ b/i18n/zh/tor.md @@ -10,7 +10,7 @@ schema: "@type": SoftwareApplication name: Tor浏览器 image: /assets/img/browsers/tor.svg - url: https://www.torproject.org + url: https://torproject.org sameAs: https://en.wikipedia.org/wiki/Tor_(network) applicationCategory: Web Browser operatingSystem: @@ -27,11 +27,11 @@ schema: **Tor** 网络是一组由志愿者操作的服务器,允许您免费连接以提高您的互联网的隐私和安全。 个人和组织也可以通过Tor网络与".onion隐藏服务"分享信息,而不损害其隐私。 由于Tor流量难以阻止和跟踪,因此Tor是一种有效的审查规避工具。 -[:octicons-home-16:](https://www.torproject.org){ .card-link title=Homepage } +[:octicons-home-16:](https://torproject.org){ .card-link title=Homepage } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation} +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/core/tor){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } Tor的工作原理是通过这些志愿者操作的服务器路由您的互联网流量,而不是直接连接到您试图访问的网站。 这会混淆流量的来源,并且连接路径中的任何服务器都无法看到流量来自和流向的完整路径,这意味着即使您用于连接的服务器也无法打破您的匿名性。 @@ -60,20 +60,20 @@ If more complete anonymity is paramount to your situation, you should **only** b * * Tor浏览器* *是您需要匿名时的选择,它为您提供了对Tor网络和网桥的访问权限,并且它包括默认安全的默认设置和扩展: *标准* , *更安全*和*最安全*。 -[:octicons-home-16: Homepage](https://www.torproject.org){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://torproject.org){ .md-button .md-button--primary } [:simple-torbrowser:](http://2gzyxa5ihm7nsggfxnu52rck2vv4rvmdlkiu3zzui5du4xyclen53wid.onion){ .card-link title="Onion Service" } -[:octicons-info-16:](https://tb-manual.torproject.org/){ .card-link title=Documentation } +[:octicons-info-16:](https://tb-manual.torproject.org){ .card-link title=Documentation } [:octicons-code-16:](https://gitlab.torproject.org/tpo/applications/tor-browser){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.torbrowser) -- [:simple-android: Android](https://www.torproject.org/download/#android) -- [:simple-windows11: Windows](https://www.torproject.org/download/) -- [:simple-apple: macOS](https://www.torproject.org/download/) -- [:simple-linux: Linux](https://www.torproject.org/download/) +- [:simple-android: Android](https://torproject.org/download/#android) +- [:simple-windows11: Windows](https://torproject.org/download) +- [:simple-apple: macOS](https://torproject.org/download) +- [:simple-linux: Linux](https://torproject.org/download)
@@ -86,7 +86,7 @@ You should **never** install any additional extensions on Tor Browser or edit `a -Tor浏览器旨在防止指纹识别,或根据您的浏览器配置识别您。 Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings/). +Tor浏览器旨在防止指纹识别,或根据您的浏览器配置识别您。 Therefore, it is imperative that you do **not** modify the browser beyond the default [security levels](https://tb-manual.torproject.org/security-settings). In addition to installing Tor Browser on your computer directly, there are also operating systems designed specifically to connect to the Tor network such as [Whonix](desktop.md#whonix) on [Qubes OS](desktop.md#qubes-os), which provide even greater security and protections than the standard Tor Browser alone. @@ -98,7 +98,7 @@ In addition to installing Tor Browser on your computer directly, there are also **Orbot** is a free Tor VPN for smartphones which routes traffic from any app on your device through the Tor network. -[:octicons-home-16: Homepage](https://orbot.app/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://orbot.app){ .md-button .md-button--primary } [:octicons-eye-16:](https://orbot.app/privacy-policy){ .card-link title="Privacy Policy" } [:octicons-info-16:](https://orbot.app/faqs){ .card-link title=Documentation} [:octicons-code-16:](https://orbot.app/code){ .card-link title="Source Code" } @@ -108,7 +108,7 @@ In addition to installing Tor Browser on your computer directly, there are also Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) -- [:simple-appstore: App Store](https://apps.apple.com/us/app/orbot/id1609461599) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1609461599) - [:simple-github: GitHub](https://github.com/guardianproject/orbot/releases) @@ -134,7 +134,7 @@ All versions are signed using the same signature so they should be compatible wi ![Onion Browser logo](assets/img/self-contained-networks/onion_browser.svg){ align=right } -**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser/). +**Onion Browser** is an open-source browser that lets you browse the web anonymously over the Tor network on iOS devices and is endorsed by the [Tor Project](https://support.torproject.org/glossary/onion-browser). [:octicons-home-16: Homepage](https://onionbrowser.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://onionbrowser.com/privacy-policy){ .card-link title="Privacy Policy" } @@ -164,10 +164,10 @@ All versions are signed using the same signature so they should be compatible wi People who are censored can use Snowflake proxies to connect to the Tor network. Snowflake is a great way to contribute to the network even if you don't have the technical know-how to run a Tor relay or bridge. -[:octicons-home-16: Homepage](https://snowflake.torproject.org/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://snowflake.torproject.org){ .md-button .md-button--primary } [:octicons-info-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/Technical%20Overview){ .card-link title=Documentation} [:octicons-code-16:](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake){ .card-link title="Source Code" } -[:octicons-heart-16:](https://donate.torproject.org/){ .card-link title=Contribute } +[:octicons-heart-16:](https://donate.torproject.org){ .card-link title=Contribute } @@ -181,4 +181,4 @@ Snowflake does not increase your privacy in any way, nor is it used to connect t Running a Snowflake proxy is low-risk, even moreso than running a Tor relay or bridge which are already not particularly risky endeavours. However, it does still proxy traffic through your network which can be impactful in some ways, especially if your network is bandwidth-limited. Make sure you understand [how Snowflake works](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/wikis/home) before deciding whether to run a proxy. -[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://www.whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. +[^1]: The `IsolateDestAddr` setting is discussed on the [Tor mailing list](https://lists.torproject.org/pipermail/tor-talk/2012-May/024403.html) and [Whonix's Stream Isolation documentation](https://whonix.org/wiki/Stream_Isolation), where both projects suggest that it is usually not a good approach for most people. diff --git a/i18n/zh/vpn.md b/i18n/zh/vpn.md index d10fffa0..d00fb330 100644 --- a/i18n/zh/vpn.md +++ b/i18n/zh/vpn.md @@ -25,7 +25,7 @@ If you are looking for **anonymity**, you should use the Tor Browser. 如果你在寻求增进**安全**, 你应该始终确保在使用 HTTPS连接到网站。 VPN不是良好安全实践的替代品。 -[Download Tor](https://www.torproject.org/){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } +[Download Tor](https://torproject.org){ .md-button .md-button--primary } [Tor Myths & FAQ](advanced/tor-overview.md){ .md-button } @@ -43,19 +43,19 @@ If you are looking for **anonymity**, you should use the Tor Browser. **Proton VPN**是VPN领域的强有力竞争者,他们自2016年以来一直保持运营。 Proton AG总部位于瑞士,提供有限制的免费使用等级,以及更具特色的高级选项。 -[:octicons-home-16: Homepage](https://protonvpn.com/){ .md-button .md-button--primary } +[:octicons-home-16: Homepage](https://protonvpn.com){ .md-button .md-button--primary } [:octicons-eye-16:](https://protonvpn.com/privacy-policy){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://protonvpn.com/support/){ .card-link title=Documentation} +[:octicons-info-16:](https://protonvpn.com/support){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ProtonVPN){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android) -- [:simple-appstore: App Store](https://apps.apple.com/app/apple-store/id1437005085) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1437005085) - [:simple-github: GitHub](https://github.com/ProtonVPN/android-app/releases) - [:simple-windows11: Windows](https://protonvpn.com/download-windows) -- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup/) +- [:simple-linux: Linux](https://protonvpn.com/support/linux-vpn-setup)
@@ -72,7 +72,7 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -截至2020年1月,Proton VPN已经接受了SEC咨询公司的独立审计。 SEC Consult在Proton VPN的Windows、Android和iOS应用程序中发现了一些中度和低度风险的漏洞,在报告发布前,Proton VPN都已经 "妥善修复"。 所发现的问题中没有任何一个能让攻击者远程访问你的设备或流量。 You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source/). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit/) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). +截至2020年1月,Proton VPN已经接受了SEC咨询公司的独立审计。 SEC Consult在Proton VPN的Windows、Android和iOS应用程序中发现了一些中度和低度风险的漏洞,在报告发布前,Proton VPN都已经 "妥善修复"。 所发现的问题中没有任何一个能让攻击者远程访问你的设备或流量。 You can view individual reports for each platform at [protonvpn.com](https://protonvpn.com/blog/open-source). In April 2022 Proton VPN underwent [another audit](https://protonvpn.com/blog/no-logs-audit) and the report was [produced by Securitum](https://protonvpn.com/blog/wp-content/uploads/2022/04/securitum-protonvpn-nologs-20220330.pdf). A [letter of attestation](https://proton.me/blog/security-audit-all-proton-apps) was provided for Proton VPN's apps on 9th November 2021 by [Securitum](https://research.securitum.com). #### :material-check:{ .pg-green } Open-Source Clients @@ -84,31 +84,31 @@ Proton VPN, in addition to accepting credit/debit cards, PayPal, and [Bitcoin](a #### :material-check:{ .pg-green } WireGuard Support -Proton VPN主要支持WireGuard®协议。 [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). 此外, WireGuard旨在更简单、更高效。 +Proton VPN主要支持WireGuard®协议。 [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). 此外, WireGuard旨在更简单、更高效。 -Proton VPN [recommends](https://protonvpn.com/blog/wireguard/) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols/) for the protocol is not present in their Linux app. +Proton VPN [recommends](https://protonvpn.com/blog/wireguard) the use of WireGuard with their service. On Proton VPN's Windows, macOS, iOS, Android, ChromeOS, and Android TV apps, WireGuard is the default protocol; however, [support](https://protonvpn.com/support/how-to-change-vpn-protocols) for the protocol is not present in their Linux app. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding/) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup/). Torrent applications often support NAT-PMP natively. +Proton VPN currently only supports ephemeral remote [port forwarding](https://protonvpn.com/support/port-forwarding) via NAT-PMP, with 60 second lease times. The Windows app provides an easy to access option for it, while on other operating systems you'll need to run your own [NAT-PMP client](https://protonvpn.com/support/port-forwarding-manual-setup). Torrent applications often support NAT-PMP natively. #### :material-information-outline:{ .pg-orange } Censorship Circumvention -Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol/) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. +Proton VPN has their [Stealth](https://protonvpn.com/blog/stealth-vpn-protocol) protocol which *may* help in situations where VPN protocols like OpenVPN or Wireguard are blocked with various rudimentary techniques. Stealth encapsulates the VPN tunnel in TLS session in order to look like more generic internet traffic. Unfortunately it does not work very well in countries where sophisticated filters are deployed that analyze all outgoing traffic in an attempt to discover encrypted tunnels. Stealth is also not yet available on [Windows](https://github.com/ProtonVPN/win-app/issues/64) or Linux. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android&hl=en_US), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, Proton VPN has mobile clients for [App Store](https://apps.apple.com/app/id1437005085), [Google Play](https://play.google.com/store/apps/details?id=ch.protonvpn.android), and [GitHub](https://github.com/ProtonVPN/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://www.torproject.org/) for this purpose. +Proton VPN clients support two factor authentication on all platforms except Linux at the moment. Proton VPN has their own servers and datacenters in Switzerland, Iceland and Sweden. They offer content blocking and known-malware blocking with their DNS service. Additionally, Proton VPN also offers "Tor" servers allowing you to easily connect to onion sites, but we still strongly recommend using [the official Tor Browser](https://torproject.org) for this purpose. #### :material-alert-outline:{ .pg-orange } Killswitch feature is broken on Intel-based Macs -System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch/) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. +System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-switch) on Intel-based Macs when using the VPN killswitch. If you require this feature, and you are using a Mac with Intel chipset, you should consider using another VPN service. ### IVPN @@ -118,9 +118,9 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit **IVPN**是另一个高级VPN供应商,他们自2009年以来一直在运营。 挑一个拥有离你最近的服务器的VPN供应商将减少你的网络流量的发送延迟。 -[:octicons-home-16: Homepage](https://www.ivpn.net/){ .md-button .md-button--primary } -[:octicons-eye-16:](https://www.ivpn.net/privacy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://www.ivpn.net/knowledgebase/general/){ .card-link title=Documentation} +[:octicons-home-16: Homepage](https://ivpn.net){ .md-button .md-button--primary } +[:octicons-eye-16:](https://ivpn.net/privacy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://ivpn.net/knowledgebase/general){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/ivpn){ .card-link title="Source Code" }
@@ -128,10 +128,10 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client) - [:octicons-moon-16: Accrescent](https://accrescent.app/app/net.ivpn.client) -- [:simple-appstore: App Store](https://apps.apple.com/app/ivpn-serious-privacy-protection/id1193122683) -- [:simple-windows11: Windows](https://www.ivpn.net/apps-windows/) -- [:simple-apple: macOS](https://www.ivpn.net/apps-macos/) -- [:simple-linux: Linux](https://www.ivpn.net/apps-linux/) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1193122683) +- [:simple-windows11: Windows](https://ivpn.net/apps-windows) +- [:simple-apple: macOS](https://ivpn.net/apps-macos) +- [:simple-linux: Linux](https://ivpn.net/apps-linux)
@@ -139,7 +139,7 @@ System crashes [may occur](https://protonvpn.com/support/macos-t2-chip-kill-swit #### :material-check:{ .pg-green } 37 Countries -IVPN has [servers in 37 countries](https://www.ivpn.net/server-locations).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. 这是因为到达目的地的路由较短(跳数较少)。 +IVPN has [servers in 37 countries](https://ivpn.net/status).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. 这是因为到达目的地的路由较短(跳数较少)。 { .annotate } 1. Last checked: 2023-12-21 @@ -148,11 +148,11 @@ We also think it's better for the security of the VPN provider's private keys if #### :material-check:{ .pg-green } Independently Audited -IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://www.ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://www.ivpn.net/blog/ivpn-apps-security-audit-2022-concluded/) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). +IVPN has undergone a [no-logging audit from Cure53](https://cure53.de/audit-report_ivpn.pdf) which concluded in agreement with IVPN's no-logging claim. IVPN has also completed a [comprehensive pentest report Cure53](https://cure53.de/summary-report_ivpn_2019.pdf) in January 2020. IVPN has also said they plan to have [annual reports](https://ivpn.net/blog/independent-security-audit-concluded) in the future. A further review was conducted [in April 2022](https://ivpn.net/blog/ivpn-apps-security-audit-2022-concluded) and was produced by Cure53 [on their website](https://cure53.de/pentest-report_IVPN_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients -As of February 2020 [IVPN applications are now open source](https://www.ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). +As of February 2020 [IVPN applications are now open source](https://ivpn.net/blog/ivpn-applications-are-now-open-source). Source code can be obtained from their [GitHub organization](https://github.com/ivpn). #### :material-check:{ .pg-green } Accepts Cash and Monero @@ -160,25 +160,25 @@ In addition to accepting credit/debit cards and PayPal, IVPN accepts Bitcoin, ** #### :material-check:{ .pg-green } WireGuard Support -IVPN supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). 此外, WireGuard旨在更简单、更高效。 +IVPN supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). 此外, WireGuard旨在更简单、更高效。 -IVPN [recommends](https://www.ivpn.net/wireguard/) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +IVPN [recommends](https://ivpn.net/wireguard) the use of WireGuard with their service and, as such, the protocol is the default on all of IVPN's apps. IVPN also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -IVPN previously supported port forwarding, but removed the option in [June 2023](https://www.ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +IVPN previously supported port forwarding, but removed the option in [June 2023](https://ivpn.net/blog/gradual-removal-of-port-forwarding). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention -IVPN has obfuscation modes using the [v2ray](https://www.v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://www.ivpn.net/knowledgebase/ios/v2ray/). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. +IVPN has obfuscation modes using the [v2ray](https://v2ray.com/en/index.html) project which helps in situations where VPN protocols like OpenVPN or Wireguard are blocked. Currently this feature is only available on Desktop and [iOS](https://ivpn.net/knowledgebase/ios/v2ray). It has two modes where it can use [VMess](https://guide.v2fly.org/en_US/basics/vmess.html) over QUIC or TCP connections. QUIC is a modern protocol with better congestion control and therefore may be faster with reduced latency. The TCP mode makes your data appear as regular HTTP traffic. #### :material-check:{ .pg-green } Mobile Clients -In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/us/app/ivpn-serious-privacy-protection/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. +In addition to providing standard OpenVPN configuration files, IVPN has mobile clients for [App Store](https://apps.apple.com/app/id1193122683), [Google Play](https://play.google.com/store/apps/details?id=net.ivpn.client), and [GitHub](https://github.com/ivpn/android-app/releases) allowing for easy connections to their servers. #### :material-information-outline:{ .pg-blue } Additional Functionality -IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://www.ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. +IVPN clients support two factor authentication (Mullvad's clients do not). IVPN also provides "[AntiTracker](https://ivpn.net/antitracker)" functionality, which blocks advertising networks and trackers from the network level. ### Mullvad @@ -190,19 +190,19 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN [:octicons-home-16: Homepage](https://mullvad.net){ .md-button .md-button--primary } [:simple-torbrowser:](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion){ .card-link title="Onion Service" } -[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy/){ .card-link title="Privacy Policy" } -[:octicons-info-16:](https://mullvad.net/en/help/){ .card-link title=Documentation} +[:octicons-eye-16:](https://mullvad.net/en/help/privacy-policy){ .card-link title="Privacy Policy" } +[:octicons-info-16:](https://mullvad.net/en/help){ .card-link title=Documentation} [:octicons-code-16:](https://github.com/mullvad){ .card-link title="Source Code" }
Downloads - [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) -- [:simple-appstore: App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) +- [:simple-appstore: App Store](https://apps.apple.com/app/id1488466513) - [:simple-github: GitHub](https://github.com/mullvad/mullvadvpn-app/releases) -- [:simple-windows11: Windows](https://mullvad.net/en/download/windows/) -- [:simple-apple: macOS](https://mullvad.net/en/download/macos/) -- [:simple-linux: Linux](https://mullvad.net/en/download/linux/) +- [:simple-windows11: Windows](https://mullvad.net/en/download/windows) +- [:simple-apple: macOS](https://mullvad.net/en/download/macos) +- [:simple-linux: Linux](https://mullvad.net/en/download/linux)
@@ -210,7 +210,7 @@ IVPN clients support two factor authentication (Mullvad's clients do not). IVPN #### :material-check:{ .pg-green } 40 Countries -Mullvad has [servers in 40 countries](https://mullvad.net/servers/).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. 这是因为到达目的地的路由较短(跳数较少)。 +Mullvad has [servers in 40 countries](https://mullvad.net/servers).(1) Picking a VPN provider with a server nearest to you will reduce latency of the network traffic you send. 这是因为到达目的地的路由较短(跳数较少)。 { .annotate } 1. Last checked: 2023-12-21 @@ -223,11 +223,11 @@ Mullvad's VPN clients have been audited by Cure53 and Assured AB in a pentest re > Cure53 and Assured AB are happy with the results of the audit and the software leaves an overall positive impression. With security dedication of the in-house team at the Mullvad VPN compound, the testers have no doubts about the project being on the right track from a security standpoint. -In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: +In 2020 a second audit [was announced](https://mullvad.net/blog/2020/6/25/results-available-audit-mullvad-app) and the [final audit report](https://cure53.de/pentest-report_mullvad_2020_v2.pdf) was made available on Cure53's website: > The results of this May-June 2020 project targeting the Mullvad complex are quite positive. [...] The overall application ecosystem used by Mullvad leaves a sound and structured impression. The overall structure of the application makes it easy to roll out patches and fixes in a structured manner. More than anything, the findings spotted by Cure53 showcase the importance of constantly auditing and re-assessing the current leak vectors, in order to always ensure privacy of the end-users. With that being said, Mullvad does a great job protecting the end-user from common PII leaks and privacy related risks. -In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit/) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data/) and is available on [Assured's website](https://www.assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). +In 2021 an infrastructure audit [was announced](https://mullvad.net/en/blog/2021/1/20/no-pii-or-privacy-leaks-found-cure53s-infrastructure-audit) and the [final audit report](https://cure53.de/pentest-report_mullvad_2021_v1.pdf) was made available on Cure53's website. Another report was commissioned [in June 2022](https://mullvad.net/en/blog/2022/6/22/vpn-server-audit-found-no-information-leakage-or-logging-of-customer-data) and is available on [Assured's website](https://assured.se/publications/Assured_Mullvad_relay_server_audit_report_2022.pdf). #### :material-check:{ .pg-green } Open-Source Clients @@ -239,17 +239,17 @@ Mullvad, in addition to accepting credit/debit cards and PayPal, accepts Bitcoin #### :material-check:{ .pg-green } WireGuard Support -Mullvad supports the WireGuard® protocol. [WireGuard](https://www.wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://www.wireguard.com/protocol/). 此外, WireGuard旨在更简单、更高效。 +Mullvad supports the WireGuard® protocol. [WireGuard](https://wireguard.com) is a newer protocol that uses state-of-the-art [cryptography](https://wireguard.com/protocol). 此外, WireGuard旨在更简单、更高效。 -Mullvad [recommends](https://mullvad.net/en/help/why-wireguard/) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app/) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://www.wireguard.com/install/). +Mullvad [recommends](https://mullvad.net/en/help/why-wireguard) the use of WireGuard with their service. It is the default or only protocol on Mullvad's Android, iOS, macOS, and Linux apps, but on Windows you have to [manually enable](https://mullvad.net/en/help/how-turn-wireguard-mullvad-app) WireGuard. Mullvad also offers a WireGuard configuration generator for use with the official WireGuard [apps](https://wireguard.com/install). #### :material-check:{ .pg-green } IPv6 Support -Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support/), as opposed to other providers which block IPv6 connections. +Mullvad allows you to [access services hosted on IPv6](https://mullvad.net/en/blog/2014/9/15/ipv6-support), as opposed to other providers which block IPv6 connections. #### :material-alert-outline:{ .pg-orange } Remote Port Forwarding -Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. +Mullvad previously supported port forwarding, but removed the option in [May 2023](https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports). Missing this feature could negatively impact certain applications, especially peer-to-peer applications like torrent clients. #### :material-check:{ .pg-green } Censorship Circumvention @@ -257,11 +257,11 @@ Mullvad has obfuscation an mode using [Shadowsocks with v2ray](https://mullvad.n #### :material-check:{ .pg-green } Mobile Clients -Mullvad has published [App Store](https://apps.apple.com/app/mullvad-vpn/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). +Mullvad has published [App Store](https://apps.apple.com/app/id1488466513) and [Google Play](https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn) clients, both supporting an easy-to-use interface as opposed to requiring you to manually configure your WireGuard connection. The Android client is also available on [GitHub](https://github.com/mullvad/mullvadvpn-app/releases). #### :material-information-outline:{ .pg-blue } Additional Functionality -Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers/). They use [ShadowSocks](https://shadowsocks.org/) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). +Mullvad is very transparent about which nodes they [own or rent](https://mullvad.net/en/servers). They use [ShadowSocks](https://shadowsocks.org) in their ShadowSocks + OpenVPN configuration, making them more resistant against firewalls with [Deep Packet Inspection](https://en.wikipedia.org/wiki/Deep_packet_inspection) trying to block VPNs. Supposedly, [China has to use a different method to block ShadowSocks servers](https://github.com/net4people/bbs/issues/22). Mullvad's website is also accessible via Tor at [o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion](http://o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion). ## Criteria